FWSM# sh run : Saved : FWSM Version 2.3(2)4 nameif vlan888 TRS_DC_IN security90 nameif vlan777 low_secure_intf security10 nameif vlan134 DCB_CP security90 nameif vlan210 CSR_CL security90 nameif vlan211 CSR_CG security90 nameif vlan252 CFV_DC security90 nameif vlan10 TMP_CG security90 nameif vlan14 TMP_RS security90 nameif vlan200 ITC_NW security90 nameif vlan201 WOR_DC security90 nameif vlan255 MGT_DC security90 nameif vlan2530 ENM_DC security90 nameif vlan16 TMP_SZ security90 nameif vlan17 TMP_SZ1 security90 nameif vlan128 STA_AS security90 nameif vlan129 CCL_AS security90 nameif vlan13 TMP_CM security90 nameif vlan2531 ENR_DC security90 nameif vlan11 TMP_AS security90 nameif vlan12 TMP_A2 security90 nameif vlan131 DCB_AS security90 nameif vlan2532 EMS_DC security90 nameif vlan132 DCB_CM security90 nameif vlan18 TMP_SZ2 security90 nameif vlan136 DCB_RHL security90 nameif vlan137 STA_CP security90 nameif vlan138 ILO_DC security90 enable password E2s.P4E5SczXfKIH encrypted passwd 13iA5MFtRBVNqkLv encrypted hostname FWSM domain-name capitaland.com ftp mode passive fixup protocol dns maximum-length 512 fixup protocol ftp 21 fixup protocol h323 H225 1720 fixup protocol h323 ras 1718-1719 fixup protocol rsh 514 fixup protocol sip 5060 no fixup protocol sip udp 5060 fixup protocol skinny 2000 no fixup protocol smtp 25 fixup protocol sqlnet 1521 names name 10.150.203.4 Aragorn name 10.61.12.150 Ariel name 10.61.12.27 Arien name 10.153.148.12 AS_NZ_HIS_148_12 name 10.153.50.11 AS_VNDEIMOS1 name 10.153.51.11 AS_VNDEIMOS2 name 10.153.38.64 Ascott_CHN_DC name 10.153.38.11 Ascott_CHN_DC1 name 10.153.35.11 Ascott_CHN_DC2 name 10.153.35.17 Ascott_CHN_H1 name 10.153.36.17 Ascott_CHN_H2 name 10.153.37.17 Ascott_CHN_H3 name 10.153.38.17 Ascott_CHN_H4 name 10.153.39.17 Ascott_CHN_H5 name 10.153.40.17 Ascott_CHN_H6 name 10.153.38.3 Ascott_CHN_SQLServ name 10.153.38.4 Ascott_CHN_SQLSvr name 10.153.2.48 Ascott_H1 name 10.153.2.46 Ascott_H2 name 10.153.1.45 Ascott_H3 name 10.153.2.45 Ascott_H4 name 10.153.2.43 Ascott_Host_2-43 name 10.153.138.11 Ascott_HQ_H1 name 10.153.138.15 Ascott_HQ_H2 name 10.153.138.7 Ascott_HQ_H3 name 10.150.170.101 Ascott_Netscreen name 10.153.145.7 Ascott_NR_H1 name 10.153.146.7 Ascott_OCW_H1 name 10.153.150.7 Ascott_ODH_H1 name 10.153.140.7 Ascott_OGP_H1 name 10.153.139.7 Ascott_OGT_H1 name 10.153.141.7 Ascott_OOC_H1 name 10.153.142.7 Ascott_OOL_H1 name 10.153.148.7 Ascott_OOS_H1 name 10.153.149.7 Ascott_OOTP_H1 name 10.153.143.7 Ascott_OTM_H1 name 10.153.144.7 Ascott_SE_H1 name 10.153.151.7 Ascott_SHP_H1 name 10.153.147.7 Ascott_SK_H1 name 10.61.12.173 Ascott_SQL_VIP name 10.150.178.2 Ascott_TL_Router name 10.153.1.42 Ascott_TT_Host_42 name 10.153.1.43 Ascott_TT_Host_43 name 10.153.1.44 Ascott_TT_Host_44 name 10.153.1.46 Ascott_TT_Host_46 name 10.153.1.47 Ascott_TT_Host_47 name 10.150.150.101 Ascott-BPE-Srv name 64.80.158.51 AscottCitrixDemo name 64.80.158.49 AscottCitrixDemo1 name 203.208.252.137 AScott-resonance name 10.153.74.11 ASTL_DEIMOS1 name 10.153.71.17 ASTL_H10-153-71-17 name 10.153.73.17 ASTL_H10-153-73-17 name 10.153.74.17 ASTL_H10-153-74-17 name 10.150.202.101 Aumida name 10.61.12.65 Cat3524XL name 10.154.1.41 CCL_Rogue name 195.35.121.18 Celeris_18 name 195.35.121.6 Celeris_6 name 10.150.203.6 Check_Point name 61.152.241.235 China_iNotes name 10.153.38.52 CHN_Test_Host name 10.61.12.18 Chripa name 10.61.12.5 Cisco7204_HSRP name 10.61.12.3 Cisco7204_Pri name 10.154.4.10 Comm_Host_4-10 name 10.154.4.120 Comm_SISV_Client name 202.83.106.236 Comm_Web_Server name 10.154.63.105 COMM-CONTROL1 name 10.154.11.12 CommHost_11-12 name 10.154.11.25 CommHost_11-25 name 10.150.200.128 ControlPC1 name 10.150.200.129 ControlPC2 name 10.150.200.130 ControlPC3 name 10.61.12.19 Corde name 10.150.120.187 Corp_Bloomberg name 10.150.120.63 Corp_Host_120-63 name 10.150.120.70 Corp_Host_120-70 name 10.150.120.73 Corp_Host_120-73 name 10.150.120.77 Corp_Host_120-77 name 10.150.122.101 Corp_Host_122-101 name 10.150.122.193 Corp_Host_122-193 name 10.150.122.205 Corp_Host_122-205 name 10.150.122.22 Corp_Host_122-22 name 10.150.122.30 Corp_Host_122-30 name 192.170.83.116 CRL_FTP_Client name 10.156.2.25 Crl_ftpclient name 10.150.119.102 CT_CA_Console name 10.61.12.200 Cyclops name 10.156.202.122 DanielTan name 10.150.211.112 Dashade name 10.150.200.101 DCPC name 64.94.52.140 Digital_China1 name 64.94.52.150 Digital_China2 name 10.61.12.81 Durin name 10.150.203.5 Elendil name 202.79.195.29 Equinix_HelpDesk name 10.61.12.31 Evanzan name 10.61.12.33 Evanzon name 202.79.193.20 Flamingo_SMTPRelay name 205.247.137.57 Freemarkets-com name 10.150.120.64 FujiXerox405_CT name 10.150.200.75 GALA name 10.150.252.1 Galactip name 10.61.12.32 Galadriel name 10.61.12.89 Galaxy name 10.61.12.83 Gasgano name 216.231.201.92 GRIC_Site name 10.153.1.107 H_10-153-1-107 name 220.255.9.41 H_220-255-9-41 name 10.153.1.114 H-10-153-1-114 name 10.61.12.198 Havok name 202.79.205.108 HBEX_NEW_IP_01 name 202.79.222.52 Hbex_Web_Server name 202.79.222.41 Hbex_Web_Server2 name 10.61.12.42 Holocam name 192.168.181.220 hos192_168_181_220 name 172.24.20.12 host_172_24_20_12 name 10.0.0.110 host10_0_0_110 name 10.150.122.97 host10_150_122_97 name 10.150.200.98 host10_150_200_98 name 10.153.100.203 host10_153_100_203 name 10.153.100.225 host10_153_100_225 name 10.153.100.229 host10_153_100_229 name 10.154.32.99 host10_154_32_99 name 10.154.33.99 host10_154_33_99 name 10.154.34.99 host10_154_34_99 name 10.154.36.99 host10_154_36_99 name 10.154.37.99 host10_154_37_99 name 10.154.39.99 host10_154_39_99 name 10.154.4.122 host10_154_4_122 name 10.154.40.99 host10_154_40_99 name 10.156.129.74 host10_156_129_74 name 10.156.134.139 host10_156_134_139 name 10.156.134.19 host10_156_134_19 name 10.156.138.139 host10_156_138_139 name 10.156.2.19 host10_156_2_19 name 10.200.5.3 host10_200_5_3 name 10.200.5.6 host10_200_5_6 name 10.61.12.15 host10_61_12_15 name 10.61.12.44 host10_61_12_44 name 10.61.12.49 host10_61_12_49 name 10.61.12.50 host10_61_12_50 name 10.61.12.51 host10_61_12_51 name 10.61.12.6 host10_61_12_6 name 192.168.18.220 host192_168_18_220 name 192.168.5.10 Host192_168_5_10 name 192.170.75.69 HP_CODA_Mgt_Svr name 192.170.75.68 HP_MWA_Mgt_Svr name 192.170.75.53 HP_Pri_OVO_MgtSvr name 192.170.75.54 HP_Sec_OVO_MgtSvr name 16.130.67.196 HP_VPN_Server1 name 16.130.67.197 HP_VPN_Server2 name 192.170.75.35 HPMon1 name 192.170.75.231 HPMon3 name 10.61.12.39 HPMS1 name 10.61.12.40 HPMS2 name 10.61.12.199 Iceman name 10.150.211.114 IMS_Database_Srv name 209.133.92.120 Intiqua_EmailSvr name 10.153.2.70 Intiqua_Host1 name 10.153.2.71 Intiqua_Host2 name 10.156.202.112 JamesKoh name 10.156.9.36 JaniceQuek_TT name 203.126.180.75 KAM_Access name 10.61.12.16 Lobot name 203.92.86.252 Lucas_MailSvr name 10.61.12.30 Luthien name 10.61.12.88 Mail_Relay name 10.61.12.201 Maverick name 202.172.226.199 mediacorpradio1 name 202.172.226.198 mediacorpradio2 name 202.172.226.200 mediacorpradio3 name 202.172.226.201 mediacorpradio4 name 10.150.200.70 Melasia1 name 10.61.12.82 Merlin name 10.150.200.105 Mgt_Console2 name 10.61.12.86 Miranda name 207.46.104.20 MSN_Messenger_Site name 202.157.136.206 myMCSB_Test_Server name 10.61.12.156 Neptune name 203.116.162.163 Net_Trust_Server name 203.116.162.137 Netrust_LDAP name 10.61.12.38 Neucleus1 name 10.153.148.11 NewZealand-Deimos1 name 203.169.117.73 Office_CVS_Server name 10.61.12.28 Orome name 10.61.12.197 Phoenix name 10.150.177.4 PIX_VPN_Inside_int name 10.150.177.5 PIX_VPN_SEC name 202.79.217.55 Postman201-smts name 10.155.224.133 Prema_Host_224-133 name 10.155.224.136 Prema_Host_224-136 name 10.155.224.202 Prema_Host_224-202 name 10.155.240.10 Prema_Host_240-10 name 10.155.240.18 Prema_Host_240-18 name 10.155.17.10 Premas_Host_17-10 name 10.155.17.12 Premas_Host_17-12 name 10.155.17.13 Premas_Host_17-13 name 10.155.17.14 Premas_Host_17-14 name 10.155.17.15 Premas_Host_17-15 name 10.155.17.19 Premas_host_17-19 name 10.155.240.3 Premas_Host_240-3 name 10.155.240.8 Premas_Host_240-8 name 10.155.240.9 Premas_Host_240-9 name 10.155.39.21 Premas_Host_39-21 name 10.155.39.41 Premas_Host_39-41 name 10.155.39.42 Premas_Host_39-42 name 10.150.203.101 PriSrvZone1_Temp name 10.150.203.102 PriSvrZone2_Temp name 10.61.12.148 Prospero name 10.153.2.155 Prototype name 10.157.12.5 Raffle_Host_12-5 name 165.21.100.88 Raffles_DNS1 name 165.21.83.88 Raffles_DNS2 name 10.61.12.84 Raffles_FW1 name 10.157.100.71 Raffles_FW2 name 10.157.0.2 Raffles_Host_02 name 10.157.0.3 Raffles_Host_03 name 10.157.13.4 Raffles_Host_13-4 name 10.157.3.1 Raffles_Host1 name 10.157.3.11 Raffles_Host11 name 10.157.3.12 Raffles_Host12 name 10.157.3.13 Raffles_Host13 name 10.157.13.51 Raffles_Host13-51 name 10.157.13.52 Raffles_Host13-52 name 10.157.13.53 Raffles_Host13-53 name 10.157.13.54 Raffles_Host13-54 name 10.157.13.55 Raffles_Host13-55 name 10.157.13.56 Raffles_Host13-56 name 10.157.13.57 Raffles_Host13-57 name 10.157.3.14 Raffles_Host14 name 10.157.3.15 Raffles_Host15 name 10.157.3.16 Raffles_Host16 name 10.157.3.17 Raffles_Host17 name 10.157.3.18 Raffles_Host18 name 10.157.3.19 Raffles_Host19 name 10.157.3.2 Raffles_Host2 name 10.157.3.20 Raffles_Host20 name 10.157.3.3 Raffles_Host3 name 10.157.3.31 Raffles_Host31 name 10.157.3.10 Raffles_Host3-10 name 10.157.3.32 Raffles_Host32 name 10.157.3.4 Raffles_Host4 name 10.157.3.5 Raffles_Host5 name 10.157.3.6 Raffles_Host6 name 10.157.3.7 Raffles_Host7 name 10.157.100.72 Raffles_Host72 name 10.157.100.73 Raffles_Host73 name 10.157.3.8 Raffles_Host8 name 10.157.3.9 Raffles_Host9 name 63.236.27.78 Raffles_Server name 24.120.38.130 Raffles_Server1 name 24.120.38.131 Raffles_Server2 name 67.106.229.34 Raffles_Server3 name 67.106.229.35 Raffles_Server4 name 209.170.218.130 Raffles_Server5 name 209.170.218.131 Raffles_Server6 name 63.236.27.68 Raffles_Webtrends2 name 63.236.27.76 Raffles-com name 10.157.0.6 RafflesDNS name 10.157.17.222 RafflesHost-17-222 name 203.120.115.39 RafflesRightAccPro name 203.172.225.44 RafflesRightAccSta name 10.193.19.108 RCH_Host19108 name 10.193.19.109 RCH_Host19109 name 10.193.19.110 RCH_Host19110 name 10.193.19.111 RCH_Host19111 name 10.193.19.112 RCH_Host19112 name 10.154.32.10 Re_Sta_Host32_10 name 10.154.33.10 Re_Sta_Host33_10 name 10.154.34.10 Re_Sta_Host34_10 name 10.154.35.10 Re_Sta_Host35_10 name 10.154.36.10 Re_Sta_Host36_10 name 10.154.37.10 Re_Sta_Host37_10 name 10.154.39.10 Re_Sta_Host39_10 name 10.154.40.10 Re_Sta_Host40_10 name 10.154.49.10 Re_Sta_Host49_10 name 10.154.50.10 Re_Sta_Host50_10 name 10.154.51.10 Re_Sta_Host51_10 name 10.154.52.10 Re_Sta_Host52_10 name 10.154.53.10 Re_Sta_Host53_10 name 10.154.54.10 Re_Sta_Host54_10 name 10.154.55.10 Re_Sta_Host55_10 name 10.156.1.100 RESI_APPS_Server name 10.156.2.13 Resi_AS400Server name 10.156.2.11 Resi_Host_2-11 name 10.156.2.16 Resi_Host_2-16 name 10.156.2.201 Resi_Host_2-201 name 10.156.2.202 Resi_Host_2-202 name 10.156.2.204 Resi_Host_2-204 name 10.156.2.221 Resi_Host_2-221 name 10.156.2.223 Resi_Host_2-223 name 10.156.2.224 Resi_Host_2-224 name 10.156.2.226 Resi_Host_2-226 name 10.156.2.8 Resi_Host_2-8 name 10.156.3.90 Resi_Host_CHN_MX name 10.156.2.23 Resi_Host2-23 name 10.61.12.213 Resi_Jaguar_Server name 10.61.12.212 Resi_Proche_Server name 10.156.3.3 Residential_SISV name 10.156.9.12 ResiHost912 name 10.156.9.28 ResiHost928 name 10.154.32.1 Retail_Net_GW32_1 name 10.154.33.1 Retail_Net_GW33_1 name 10.154.34.1 Retail_Net_GW34_1 name 10.154.35.1 Retail_Net_GW35_1 name 10.154.36.1 Retail_Net_GW36_1 name 10.154.37.1 Retail_Net_GW37_1 name 10.154.39.1 Retail_Net_GW39_1 name 10.154.40.1 Retail_Net_GW40_1 name 10.154.49.1 Retail_Net_GW49_1 name 10.154.50.1 Retail_Net_GW50_1 name 10.154.51.1 Retail_Net_GW51_1 name 10.154.52.1 Retail_Net_GW52_1 name 10.154.55.1 Retail_Net_GW55_1 name 10.154.63.102 RP_CA_console name 10.154.1.10 RP_Exinda_Opt name 202.172.226.202 S_202-172-226-202 name 202.172.226.203 S_202-172-226-203 name 10.61.12.11 Sagoro name 10.150.131.114 SGCalypso3 name 10.150.131.115 SGCalypso4 name 10.150.131.113 SGCalypso5 name 10.150.131.112 SGCalypso6 name 10.150.131.111 SGCalypso7 name 10.150.131.110 SGCalypso8 name 10.61.12.167 SGDeimos1 name 10.61.12.168 SGDeimos2 name 10.150.131.116 SGOrion1 name 10.150.131.117 SGOrion2 name 10.150.128.4 SGTitan1 name 10.150.128.5 SGTitan2 name 10.61.12.48 Sicrus_Server name 10.157.176.11 Sinc1ctx1 name 10.157.176.12 Sinc1ctx2 name 10.157.176.13 Sinc1ctx3 name 10.157.176.14 Sinc1svrpsa1 name 10.157.176.16 Sinc1svrpsn1 name 10.157.176.17 Sinc1svrpsn2 name 10.157.176.15 Sinc1svrpst1 name 10.157.176.26 Sinc1svrsun1 name 10.157.176.27 Sinc1svrsun2 name 10.157.176.22 Sinc1svrweb2 name 165.21.101.200 Singnet_SMTP name 202.172.241.151 SIS_Server1 name 202.172.241.152 SIS_Server2 name 202.172.241.153 SIS_Server3 name 202.172.241.133 SIS_Server4 name 202.79.218.68 SIS_Station_Site1 name 202.79.218.69 SIS_Station_Site2 name 203.92.103.10 SISV_SQL_Server name 10.150.211.113 Skyworld name 202.79.193.34 SMTP_Relay_Server name 10.61.12.13 Snitkin name 10.200.1.1 STNMC005 name 10.200.1.2 STNMC105 name 65.213.68.11 Stockton name 10.61.12.72 Tarkin name 10.61.12.76 Tarkin2 name 10.61.12.91 Tarkin3 name 10.150.203.200 Temp_delete name 10.150.170.128 TEST______ name 10.153.7.62 TEST_H_10-153-7-62 name 10.150.203.218 TEST_PRIV_SERV name 138.113.4.212 tools-pegsinc-com name 10.61.12.36 Trendmicro name 10.156.201.108 TT_Monitoring_Host name 10.156.202.29 TT_XeroxPrinter name 10.61.12.80 varda name 61.151.251.88 Video_Conf_Server name 10.153.50.17 VN_JAVEN_T1 name 10.153.51.17 VN_JAVEN_T2 name 10.153.52.17 VN_JAVEN_T3 name 10.153.53.17 VN_JAVEN_T4 name 10.150.203.103 VPN_Aventail name 205.188.213.249 Web_ICQ_Server name 10.150.252.102 Webcache name 10.61.12.93 Whiphid name 24.244.148.121 www_kazza_com name 204.228.229.160 www_stockton_com1 name 204.228.229.168 www_stockton_com2 name 204.228.229.169 www_stockton_com3 name 204.228.229.170 www_stockton_com4 name 204.228.229.172 www_stockton_com5 name 204.228.229.176 www_stockton_com6 name 63.68.55.188 www-bonzi-com name 61.132.138.83 xastu_site name 10.150.200.76 Xavier name 10.61.12.26 Yavin name 10.150.252.44 Zalina_PC name 172.16.67.1 Zurich_Host1 name 172.16.67.2 Zurich_Host2 name 10.150.211.115 Warrick name 10.156.202.168 TEST_HP_VPN_FIX name 10.150.120.68 CT_10-150-120-68 name 10.150.200.65 Marlex name 10.150.134.103 CLNT07 name 10.150.240.0 ip-pool1 name 10.150.242.0 ip-pool2 name 10.153.2.8 Ascott_Mediaring_Qbox name 10.157.0.28 Raffles-Proxy-Server name 10.154.8.10 CCL_HB_StagingHost name 10.154.11.10 CCL_IMM_StagingHost name 10.153.50.12 VNpluto1 name 10.153.52.12 VNpluto2 name 10.153.120.11 AEDeimos1 name 10.153.120.17 AE_Javen_Test name 210.52.213.43 MediaRing_Host7 name 202.8.41.81 MediaRing_Host5 name 202.8.43.164 MediaRing_Host6 name 202.8.40.12 MediaRing_Host3 name 61.152.115.101 MediaRing_Host1 name 202.8.41.116 MediaRing_Host8 name 202.8.40.116 MediaRing_Host4 name 10.150.130.50 Acklay name 10.150.128.66 CCL_Bishop name 10.150.130.51 Wandrella name 10.150.210.104 Dianoga name 10.150.210.105 Worrt name 10.156.201.102 Control_DT_102 name 10.156.201.101 Control_DT_101 name 10.150.120.42 BACKUPCLNS name 10.150.120.31 CLNS01 name 10.61.12.43 Rodian name 66.35.195.194 MediaRing_Host2 name 10.61.12.166 SGCalyso2 name 10.61.12.165 SGCalyso1 name 10.150.130.116 Iarwain name 10.156.202.144 CSLucas_Host4 name 10.156.202.143 CSLucas_Host3 name 10.156.202.142 CSLucas_Host2 name 10.156.202.141 CSLucas_Host1 name 10.154.1.45 Calisto name 10.150.211.116 Anakin name 10.61.12.52 RP_Martin_Tan name 10.61.12.53 RP_Zalina name 10.61.12.172 SGStephno2 name 10.61.12.171 SGStephno1 name 10.61.12.157 Saturn name 10.61.12.155 Acapulco name 10.61.12.152 Phobos1 name 10.153.56.17 ASKR_TEST name 10.153.56.11 ASKR_Deimos1 name 10.154.1.24 Jubilee name 10.156.2.26 CRLNT10 name 10.150.178.10 CCL2M name 10.150.178.18 AscottRT name 10.153.1.89 DPRStephano1 name 10.153.56.35 ASKR_Printer name 10.153.56.12 ASKR_Pluto1 name 10.200.3.6 CLG001 name 10.200.3.7 CLG101 name 10.150.255.105 Exindar_MonitorUnit name 10.153.9.0 AS_TAS name 10.153.5.0 AS_Bencoolen name 10.153.4.0 AS_Orchard name 10.153.7.0 AS_Compass name 10.153.3.0 AS_Grand_Carnhill name 10.153.2.47 Thomas_PC name 10.153.2.44 Blandine_PC name 10.153.2.42 Jason_PC name 10.153.2.80 AS_Oracle_Admin2 name 10.153.2.78 AS_Oracle_AdmHost1 name 10.153.2.72 AS_Oracle_Admin1 name 10.153.2.40 AS_SG_Admin name 10.153.75.0 ASTL_NET_10-153-75 name 10.153.74.12 ASTL_Printserver name 10.153.75.17 ASTL_SuperIP name 10.153.1.40 AScott_Admin_TT name 10.153.45.11 ASML_Deimos1 name 10.153.45.17 ASML_SuperIP name 10.153.45.12 ASML_PrintServer name 10.150.122.208 Corp_JenniferWong name 10.156.2.4 CRLNT09 name 10.156.2.3 CRLNT02 name 202.199.199.199 TEST name 10.156.3.80 Hui_Juien_PC name 10.156.9.200 KC_IP name 10.154.41.10 RE_Sta_Host41_10 name 10.154.41.1 Retail_Net_GW41_1 name 10.150.134.102 Falleen name 10.150.120.0 Corp_BU_Net name 10.61.12.46 Monitor-PC name 10.153.1.0 AScott_TT name 10.153.1.28 SGpluto1 name 10.150.203.104 VPN_Aventail2 name 10.150.119.6 CA_Staging_CT name 10.61.12.29 Brocade_Switch name 10.150.210.0 CSR_CL_subnet name 10.150.134.0 DCB_CP_Subnet name 10.150.211.0 CSR_CG_Subnet name 10.61.12.0 TMP_CG_subnet name 10.61.12.208 TMP_RS_Subnet name 10.150.200.0 ITC_NW_subnet name 10.150.201.0 WOR_DC_Subnet name 10.150.130.112 TMP_SZ_Subnet name 10.150.130.0 TMP_SZ1_Subnet name 10.150.128.0 STA_AS_Subnet name 10.150.128.64 CCL_AS_Subnet name 10.61.12.192 TMP_CM_Subnet name 10.61.12.144 TMP_AS_Subnet name 10.61.12.160 TMP_A2_Subnet name 10.150.131.0 DCB_AS_Subnet name 10.150.253.16 EMS_DC_Subnet name 10.150.255.0 MGT_DC_Subnet name 10.61.12.204 Gambit name 10.61.12.202 Caliban name 10.154.0.0 Comm_BU_Net name 10.156.0.0 Resi_BU_Net name 10.193.0.0 Raffles_RCH name 172.22.22.0 Corp_PIX_Outside_Net name 10.32.172.0 Raffles-Swissotel name 10.153.0.0 Ascott_BU_Net name 10.157.0.0 Raffles_BU_Net name 172.24.8.0 IPQ_Subnet name 10.150.119.0 Corp_Control_Subnet name 10.150.122.112 Tham_Kui_Seng name 10.61.12.205 TEST_PC name 10.150.132.0 DCB_CM_Subnet name 10.200.3.105 CLGServer101 name 10.200.3.103 CLGServer001 name 10.150.130.67 ArchivalTest name 10.150.132.109 Dazzler name 10.153.120.0 Ascott_Dubai name 10.153.45.0 Ascott_Malaysia name 10.153.56.0 Ascot_Korea name 10.150.255.106 Optimizer_DC name 10.153.1.87 DPRCalypso1 name 10.153.1.88 DPRCalypso2 name 10.150.122.121 JoanneTan name 10.150.130.64 TMP_SZ2 name 10.150.252.0 VLAN252 name 10.150.205.0 VLAN888 name 10.150.177.0 PIXVPN name 10.61.12.64 DMZ name 10.150.253.0 EMC_DC name 10.150.178.0 Ascott_SG_Transit name 10.150.203.0 Pri_Svr_Zone name 10.150.202.0 Security_Ctrl_Zone name 10.200.32.208 ENR_DC name 172.24.20.0 Core_Rtr_Zone name 10.150.211.117 Ackbar name 10.156.201.104 Control_DT_104 name 10.156.201.103 Control_DT_103 name 10.150.201.105 DC_105 name 10.156.201.105 Control_DT_105 name 10.150.130.68 DUALITY name 10.156.122.0 Net_10_156_122_0 name 10.156.132.0 Net_10_156_132_0 name 10.156.121.0 Net_10_156_121_0 name 10.156.139.0 Net_10_156_139_0 name 10.156.120.0 Net_10_156_120_0 name 10.156.133.0 Net_10_156_133_0 name 10.150.150.0 Buz_Partner name 10.154.1.44 CannonBall name 10.153.35.12 Ascott_CHN_35_12 name 10.153.38.51 Ascott_CHN_38_51 name 10.153.38.50 Ascott_CHN_38_50 name 10.153.38.12 Ascott_CHN_38_12 name 10.153.35.51 Ascott_CHN_35_51 name 10.153.35.50 Ascott_CHN_35_50 name 10.154.34.98 Junct8_traffic_count name 10.154.4.52 FootFall_PC name 63.208.196.171 FootFall_Svr2 name 62.3.128.25 Footfall_Svrs1 name 10.153.32.0 ASCN_Net_10-153-32 name 10.153.30.0 ASCN_Net_10-153-30 name 10.153.33.0 ASCN_Net_10-153-33 name 10.153.31.0 ASCN_Net_10-153-31 name 10.153.34.0 ASCN_Net_10-153-34 name 10.153.31.12 AS_CN_FileServer2 name 10.153.30.13 AS_CN_FileServer3 name 10.153.30.12 AS_CN_FileServer1 name 10.153.34.12 AS_CN_FileServer5 name 10.154.244.0 Aventail_VPN_Pool name 10.61.12.12 Bigatom name 202.79.195.93 AscottExchange3 name 202.79.195.92 AscottExchange2 name 202.79.195.91 AscottExchange1 name 10.153.84.0 Ascott_CN_84_85 name 10.153.76.0 Ascott_CN_76_79 name 10.153.46.79 ASML_Host_46_79 name 10.153.46.64 ASML_46_65-78 name 10.153.45.79 ASML_Host_45_79 name 10.153.45.64 ASML_45_65-78 name 10.150.130.69 Tessek_ name 10.150.130.53 Tessek name 10.150.244.0 Secura_VPN_Pool1 name 10.150.245.0 Secura_VPN_Pool2 name 10.154.37.98 Lot1_Traffic_Count name 10.155.0.0 Net_RHL name 10.150.211.121 ManWe name 10.150.127.11 GeralLee_Corp name 10.155.0.8 RHLSVRNOM1 name 172.16.67.9 RHLSVRNOA1 name 192.168.1.0 Susie_Home_VPN name 10.150.136.102 Alavar name 10.150.136.101 Callista name 10.150.130.52 Dengar name 10.156.129.73 CLG_CN_DNS name 10.150.132.110 Colossus name 10.150.132.112 Trance name 10.150.132.111 Corsair name 10.150.210.112 SarDBCIVirt name 10.150.210.111 SarCIAPPSVirt name 10.150.210.108 SarDBVirt name 10.154.1.30 FIN2-NTS name 10.150.132.114 Cosmo name 10.150.132.113 Elixir name 10.61.12.87 Sidaster name 10.150.128.71 Cosmo_ name 10.150.253.19 Anakin_ name 10.201.50.8 CLG201 name 10.150.200.74 Muftakia name 10.150.211.125 BARADA2 name 10.150.211.124 BARADA1 name 10.150.211.123 Saelt2 name 10.150.211.122 Saelt1 name 10.150.136.0 DCB_RHL_Subnet name 10.153.82.0 Ascott_PH_SSM name 10.153.80.0 Ascott_PH_SMM name 10.153.81.0 Ascott_PH_SOM name 10.153.80.79 PH_SMM_79 name 10.153.80.64 PH_SMM_64-78 name 10.153.82.79 PH_SSM_79 name 10.153.82.64 PH_SSM_64-78 name 10.153.81.79 PH_SOM_79 name 10.153.81.64 PH_SOM_64-78 name 10.156.202.190 TT_10-156-202-190 name 10.156.131.0 Net-10-156-131-0_0-32 name 10.61.12.94 DEMOCRM name 10.156.201.115 Control_PC_TT_115 name 10.156.201.114 Control_PC_TT_114 name 10.156.201.113 Control_PC_TT_113 name 10.156.201.112 Control_PC_TT_112 name 10.156.201.111 Control_PC_TT_111 name 10.156.201.110 Control_DC_110 name 10.150.200.71 Trebor name 10.150.211.128 Frixgrizz name 10.153.160.0 AS_Paris_Net name 10.153.160.62 AS_Paris_Citrix name 10.153.160.130 AS_Paris_Router name 10.154.1.31 Cable name 10.154.1.25 Magneto name 10.154.32.0 Funan name 10.150.210.109 Sarlac2 name 10.150.210.106 Sarlac1 name 193.238.160.62 eMessenger_net name 68.142.194.15 Yahoo_Messenger name 65.54.239.212 MSN_Messenger name 10.156.202.100 HP_Working_PC name 10.150.252.6 Fortigate name 10.153.120.79 AS_AE_120_79 name 10.153.120.78 AS_AE_120_78 name 10.153.120.77 AS_AE_120_77 name 10.153.120.76 AS_AE_120_76 name 10.153.120.75 AS_AE_120_75 name 10.153.120.74 AS_AE_120_74 name 10.153.120.73 AS_AE_120_73 name 10.153.120.72 AS_AE_120_72 name 10.153.120.71 AS_AE_120_71 name 10.153.120.70 AS_AE_120_70 name 10.153.120.69 AS_AE_120_69 name 10.153.120.68 AS_AE_120_68 name 10.153.120.67 AS_AE_120_67 name 10.153.120.66 AS_AE_120_66 name 10.153.120.65 AS_AE_120_65 name 10.153.120.64 AS_NET_120_64 name 10.153.118.11 ASJP_Deimos1 name 10.153.118.0 ASJP_Net_118 name 10.153.119.0 ASJP_Net_119 name 10.153.119.12 ASJP_Printserver2 name 10.153.118.12 ASJP_Printserver1 name 10.154.54.99 host10_154_54_99 name 10.154.54.1 Retail_Net_GW54_1 name 10.154.53.99 host10_154_53_99 name 10.154.53.1 Retail_Net_GW53_1 name 10.150.211.129 WibroAX name 10.150.131.123 SGMars2 name 10.150.131.122 SGMars1 name 10.150.131.118 SGVenus1 name 10.150.128.8 SGSun name 172.200.0.0 ILO_Net name 10.150.131.121 SGVenus name 10.150.131.120 SQLvenus name 10.150.131.119 SGvenus2 name 10.150.178.20 Nobelie name 10.1.1.1 Tes10111 same-security-traffic permit inter-interface same-security-traffic permit intra-interface object-group network CL_SBUs network-object Corp_BU_Net 255.255.248.0 network-object Ascott_BU_Net 255.255.0.0 network-object Comm_BU_Net 255.255.224.0 network-object Resi_BU_Net 255.255.0.0 network-object Raffles_BU_Net 255.255.0.0 network-object Net_RHL 255.255.248.0 object-group network IT_Control_Hosts description BU_Control_Hosts network-object host COMM-CONTROL1 network-object host Control_DT_101 network-object host Control_DT_102 network-object host CT_CA_Console network-object host Control_DT_103 network-object host Control_DT_104 network-object host Control_DT_105 object-group service Omniback_Ports tcp description Ports for Ominiback access port-object eq 5555 port-object range 6000 6099 object-group service AD_TCP_Services tcp port-object eq 135 port-object eq netbios-ssn port-object eq ldap port-object eq 445 port-object eq 464 port-object eq 1078 port-object eq 88 port-object eq ldaps port-object range 1025 1026 object-group service AD_UDP_Services udp port-object eq 88 port-object range netbios-ns netbios-dgm port-object eq 389 port-object eq ntp port-object eq 464 port-object eq domain port-object eq 135 object-group network CCL_Retail_Sites object-group network CSR_CL_Servers description CL_Shared_Resources_Zone network-object host 10.150.210.103 network-object host Dianoga network-object host Worrt object-group network CLG_SHARED_Servers description CLB Shared Server Zone network-object host Dashade network-object host Skyworld network-object host IMS_Database_Srv network-object host Warrick network-object host Anakin network-object host Ackbar object-group network RESI_Server_Zone description Residential Server Zone network-object host Resi_Proche_Server network-object host Resi_Jaguar_Server object-group network Internal_DNS description CL DC internal name servers network-object host Orome network-object host Galadriel object-group network HP_Monitoring_Hosts description HP Monitoring Servers network-object host HP_Pri_OVO_MgtSvr network-object host HP_Sec_OVO_MgtSvr network-object host HP_MWA_Mgt_Svr network-object host HP_CODA_Mgt_Svr object-group network CL_Treasury_Zone description Treasury Server Zone network-object host Acklay network-object host Wandrella network-object host Iarwain object-group service Nucleus1_Video tcp description SCRS 809 Videoconferencing port-object range 8081 8082 port-object eq 8084 port-object eq 1533 object-group network Ascott_Carinhill network-object AS_Grand_Carnhill 255.255.255.0 object-group network Ascott_Compass network-object AS_Compass 255.255.255.0 object-group network Ascott_Liang_Court network-object 10.153.2.0 255.255.255.0 object-group network Ascott_Orchard network-object AS_Orchard 255.255.255.0 object-group network Ascott_TAS network-object AS_TAS 255.255.255.0 object-group network Ascott_TT network-object AScott_TT 255.255.255.0 object-group network Ascott_Singapore_Networks group-object Ascott_Carinhill group-object Ascott_Compass group-object Ascott_Liang_Court group-object Ascott_Orchard group-object Ascott_TAS group-object Ascott_TT object-group network Bloomberg_Site1 network-object 205.216.112.0 255.255.255.0 object-group network Bloomberg_Site2 network-object 206.156.53.0 255.255.255.0 object-group network Bloomberg_Site3 network-object 160.43.0.0 255.255.255.0 object-group network Bloomberg_Site4 network-object 208.22.56.0 255.255.255.0 object-group network Bloomberg_Group group-object Bloomberg_Site1 group-object Bloomberg_Site2 group-object Bloomberg_Site3 group-object Bloomberg_Site4 object-group network Citrix_And_Frango_Servers network-object host Chripa network-object host Corde network-object host Evanzan network-object host Evanzon network-object host Havok network-object host Iceman network-object host Sagoro network-object host Snitkin network-object host Lobot object-group network HP_Remote_Monitoring_Server network-object host HP_Pri_OVO_MgtSvr network-object host HP_Sec_OVO_MgtSvr network-object host HPMon3 object-group network intranet network-object TMP_CG_subnet 255.255.255.192 object-group network NET_ASCOTT network-object Ascott_BU_Net 255.255.0.0 object-group network NET_COMMERCIAL network-object Comm_BU_Net 255.255.224.0 object-group network NET_CORPORATE network-object Corp_BU_Net 255.255.248.0 object-group network NET_PREMA_INT network-object Net_RHL 255.255.248.0 object-group network NET_RAFFLES network-object Raffles_BU_Net 255.255.0.0 object-group network NET_RCH network-object Raffles_RCH 255.255.0.0 object-group network NET_RCH_Subnetwork network-object 10.193.16.0 255.255.252.0 object-group network NET_RESIDENTIAL network-object Resi_BU_Net 255.255.0.0 object-group network NET_Swissotel network-object Raffles-Swissotel 255.255.252.0 object-group network CT_BMO network-object 10.154.64.0 255.255.255.0 object-group network DC_Working_ZONE network-object WOR_DC_Subnet 255.255.255.0 object-group network NAT_10_150_252_0 network-object VLAN252 255.255.255.0 object-group network INTERNAL_NET group-object intranet group-object NET_ASCOTT group-object NET_COMMERCIAL group-object NET_CORPORATE group-object NET_PREMA_INT group-object NET_RAFFLES group-object NET_RCH group-object NET_RCH_Subnetwork group-object NET_RESIDENTIAL group-object NET_Swissotel group-object CT_BMO group-object DC_Working_ZONE group-object NAT_10_150_252_0 object-group network Intiqua_Group network-object host Intiqua_Host1 network-object host Intiqua_Host2 object-group network Mediacorpradio_Sites network-object host mediacorpradio1 network-object host mediacorpradio2 network-object host mediacorpradio3 network-object host mediacorpradio4 object-group network Raffles_DNS network-object host Raffles_DNS1 network-object host Raffles_DNS2 object-group network Raffles_Group13-51_13-57 network-object host Raffles_Host13-51 network-object host Raffles_Host13-52 network-object host Raffles_Host13-53 network-object host Raffles_Host13-54 network-object host Raffles_Host13-55 network-object host Raffles_Host13-56 network-object host Raffles_Host13-57 object-group network Raffles_Group3-1_20 network-object host Raffles_Host1 network-object host Raffles_Host11 network-object host Raffles_Host12 network-object host Raffles_Host13 network-object host Raffles_Host14 network-object host Raffles_Host15 network-object host Raffles_Host16 network-object host Raffles_Host17 network-object host Raffles_Host18 network-object host Raffles_Host19 network-object host Raffles_Host2 network-object host Raffles_Host20 network-object host Raffles_Host3 network-object host Raffles_Host4 network-object host Raffles_Host5 network-object host Raffles_Host6 network-object host Raffles_Host7 network-object host Raffles_Host8 object-group network Raffles_Group3-11_20 network-object host Raffles_Host11 network-object host Raffles_Host12 network-object host Raffles_Host13 network-object host Raffles_Host14 network-object host Raffles_Host15 network-object host Raffles_Host16 network-object host Raffles_Host17 network-object host Raffles_Host18 network-object host Raffles_Host19 network-object host Raffles_Host20 object-group network Raffles_Group3-31_32 network-object host Raffles_Host31 network-object host Raffles_Host32 object-group network RCH_Group1 network-object host RCH_Host19108 network-object host RCH_Host19109 network-object host RCH_Host19110 network-object host RCH_Host19111 network-object host RCH_Host19112 object-group network Resi_Printer_Hosts network-object host Resi_Host_2-201 network-object host Resi_Host_2-202 network-object host Resi_Host_2-204 network-object host Resi_Host_2-221 network-object host Resi_Host_2-223 network-object host Resi_Host_2-224 network-object host Resi_Host_2-226 object-group network SIS_Station_Site network-object host SIS_Server1 network-object host SIS_Server2 network-object host SIS_Server3 network-object host SIS_Server4 network-object host SIS_Station_Site1 network-object host SIS_Station_Site2 object-group network SIStation_Hosts network-object host Corp_Host_122-205 network-object host Corp_Host_122-22 network-object host Corp_Host_122-30 network-object host Corp_Host_122-101 network-object host ResiHost912 network-object host ResiHost928 network-object host Corp_Host_122-193 object-group network SMTP_Hosts network-object host Resi_Host2-23 network-object host Resi_Host_2-8 network-object host Resi_Host_2-11 network-object host Resi_Jaguar_Server network-object host Resi_Proche_Server network-object host Sicrus_Server object-group network Ascott_Host_2-4x network-object host Ascott_Host_2-43 network-object host Blandine_PC network-object host Ascott_H4 object-group network Ascott_Citrix_Demo_Site1-2 network-object host AscottCitrixDemo network-object host AscottCitrixDemo1 object-group network myMCSB_KAM network-object host myMCSB_Test_Server network-object host KAM_Access object-group network Hbex_Web_Server1-2 network-object host Hbex_Web_Server network-object host Hbex_Web_Server2 object-group network Resi_Hosts_FA_10x network-object 10.156.10.0 255.255.255.0 object-group network Resi_Hosts_FA_9x network-object 10.156.9.0 255.255.255.0 object-group network Resi_Host_FA_9x-10x group-object Resi_Hosts_FA_10x group-object Resi_Hosts_FA_9x object-group network Raffles_Host_02_03 network-object host Raffles_Host_02 network-object host Raffles_Host_03 object-group network Raffles-com_Webtrends network-object host Raffles-com network-object host Raffles_Webtrends2 network-object host Raffles_Server object-group network SISV_Client network-object host Residential_SISV network-object host Comm_SISV_Client object-group network Flamingo_Postman201 network-object host Flamingo_SMTPRelay network-object host Postman201-smts object-group network Trendmicro_WebCache network-object host Webcache network-object host Trendmicro object-group network MSN_ICQ network-object host Web_ICQ_Server network-object host MSN_Messenger_Site object-group network Ban_Sites network-object host www-bonzi-com network-object host www_stockton_com1 network-object host www_stockton_com2 network-object host www_stockton_com3 network-object host www_stockton_com4 network-object host www_stockton_com5 network-object host www_stockton_com6 network-object host www_kazza_com network-object host xastu_site object-group network Checkpoint_EFM network-object host Aragorn network-object host Elendil object-group network LDAP_Servers network-object host Orome network-object host Arien object-group network Miranda_Earth_Galaxy network-object host Miranda network-object host Sidaster network-object host Galaxy object-group network Miranda_Earth network-object host Miranda network-object host Sidaster object-group network SGDeimos1-2_SGCalypso1 network-object host SGDeimos1 network-object host SGDeimos2 network-object host SGCalyso1 object-group network SGDeimos1-2_SGCalypso1-2 network-object host SGDeimos1 network-object host SGDeimos2 network-object host SGCalyso1 network-object host SGCalyso2 object-group network Ascott_H1-H4 network-object host Ascott_H1 network-object host Ascott_H2 network-object host Ascott_H3 network-object host Ascott_H4 object-group network SGCalypso1-2 network-object host SGCalyso1 network-object host SGCalyso2 object-group network SGDeimos1-2 network-object host SGDeimos1 network-object host SGDeimos2 object-group network Prospero_Prototype_Titania network-object host Prospero network-object host 10.61.12.169 network-object host Prototype network-object host Ascott-BPE-Srv object-group network Mike_KahMing_Leon network-object host Ascott_Host_2-43 network-object host Jason_PC network-object host Thomas_PC object-group network FlamingoSMTPRelaySvr network-object host SMTP_Relay_Server network-object host Flamingo_SMTPRelay object-group network Raffles_FW2_Host72-73 network-object host Raffles_FW2 network-object host Raffles_Host72 network-object host Raffles_Host73 object-group network Celeris_6_18 network-object host Celeris_6 network-object host Celeris_18 object-group network Zurich_Host1-2 network-object host Zurich_Host1 network-object host Zurich_Host2 object-group network HPMon1-2 network-object host HPMon1 network-object host HP_Sec_OVO_MgtSvr object-group network HPMon1-3_Test_PC network-object host HPMon1 network-object host HPMon3 network-object host Monitor-PC network-object host HP_Sec_OVO_MgtSvr object-group network Luthien_Galadriel network-object host Luthien network-object host Galadriel object-group network Tarkin1-3 network-object host Tarkin3 network-object host Tarkin2 network-object host Tarkin object-group network Ph_Ya_Oro_Ma_Cyc network-object host Phoenix network-object host Yavin network-object host Orome network-object host Maverick network-object host Cyclops object-group network varda_durin network-object host Durin network-object host varda object-group network DC_Mgmt_Host network-object ControlPC1 255.255.255.252 object-group network DC_Mgmt_Host_TestPC network-object host Monitor-PC group-object DC_Mgmt_Host object-group network DMZ network-object DMZ 255.255.255.192 object-group network RIL_Server_Farm network-object 10.157.176.0 255.255.255.0 object-group network DMZ_RIL_Server_Farm group-object DMZ group-object RIL_Server_Farm object-group network HPMon4-5 network-object host HP_MWA_Mgt_Svr network-object host HP_CODA_Mgt_Svr object-group network Management_PC network-object host DCPC network-object host HPMS1 network-object host HPMS2 network-object host Mgt_Console2 network-object host Monitor-PC object-group network ControlPC network-object host ControlPC1 network-object host ControlPC2 network-object host ControlPC3 object-group network ip-pool1 network-object ip-pool1 255.255.254.0 object-group network ip-pool2 network-object ip-pool2 255.255.254.0 object-group network IP-Pool group-object ip-pool1 group-object ip-pool2 object-group network Raffles_Server_Group network-object host Raffles_Server1 network-object host Raffles_Server2 network-object host Raffles_Server3 network-object host Raffles_Server4 network-object host Raffles_Server5 network-object host Raffles_Server6 object-group network Ascott_HQ network-object 10.153.138.0 255.255.255.0 object-group network Ascott_OGT network-object 10.153.139.0 255.255.255.0 object-group network Ascott_HQ_OGT group-object Ascott_HQ group-object Ascott_OGT object-group network Ascott_OGP network-object 10.153.140.0 255.255.255.0 object-group network Ascott_NR network-object 10.153.145.0 255.255.255.0 object-group network Ascott_OCW network-object 10.153.146.0 255.255.255.0 object-group network Ascott_ODH network-object 10.153.150.0 255.255.255.0 object-group network Ascott_OOC network-object 10.153.141.0 255.255.255.0 object-group network Ascott_OOL network-object 10.153.142.0 255.255.255.0 object-group network Ascott_OOS network-object 10.153.148.0 255.255.255.0 object-group network Ascott_OOTP network-object 10.153.149.0 255.255.255.0 object-group network Ascott_OTM network-object 10.153.143.0 255.255.255.0 object-group network Ascott_SE network-object 10.153.144.0 255.255.255.0 object-group network Ascott_SHP network-object 10.153.151.0 255.255.255.0 object-group network Ascott_SK network-object 10.153.147.0 255.255.255.0 object-group network Ascott_VPN group-object Ascott_HQ group-object Ascott_OGT group-object Ascott_OGP group-object Ascott_NR group-object Ascott_OCW group-object Ascott_ODH group-object Ascott_OOC group-object Ascott_OOL group-object Ascott_OOS group-object Ascott_OOTP group-object Ascott_OTM group-object Ascott_SE group-object Ascott_SHP group-object Ascott_SK object-group network Ascott_HQ_H1-H2 network-object host Ascott_HQ_H1 network-object host Ascott_HQ_H2 object-group network Ascott_H1_HQ_H3 network-object host Ascott_HQ_H3 network-object host Ascott_OGT_H1 network-object host Ascott_OGP_H1 network-object host Ascott_OOC_H1 network-object host Ascott_OOL_H1 network-object host Ascott_OTM_H1 network-object host Ascott_SE_H1 network-object host Ascott_NR_H1 network-object host Ascott_OCW_H1 network-object host Ascott_SK_H1 network-object host Ascott_OOS_H1 network-object host Ascott_OOTP_H1 network-object host Ascott_ODH_H1 network-object host Ascott_SHP_H1 object-group network Ascott_HQ_254 network-object 10.153.138.0 255.255.254.0 object-group network Ascott_OGP_252 network-object 10.153.140.0 255.255.252.0 object-group network Ascott_SE_252 network-object 10.153.144.0 255.255.252.0 object-group network Ascott_OOS_252 network-object 10.153.148.0 255.255.252.0 object-group network Ascott_Variable_Mask group-object Ascott_HQ_254 group-object Ascott_OGP_252 group-object Ascott_SE_252 group-object Ascott_OOS_252 object-group network Premas_SMTP_Hosts network-object host Premas_Host_17-10 network-object host Premas_Host_17-12 network-object host Premas_Host_17-13 network-object host Premas_Host_17-14 network-object host Premas_Host_17-15 network-object host Premas_host_17-19 network-object host Prema_Host_224-133 network-object host Prema_Host_224-136 network-object host Prema_Host_224-202 network-object host Prema_Host_240-10 network-object host Prema_Host_240-18 network-object host Premas_Host_240-3 network-object host Premas_Host_240-8 network-object host Premas_Host_240-9 network-object host Premas_Host_39-21 network-object host Premas_Host_39-41 network-object host Premas_Host_39-42 object-group network Ascott_CHN1 network-object 10.153.35.0 255.255.255.0 object-group network Ascott_CHN2 network-object 10.153.36.0 255.255.252.0 object-group network Ascott_CHN3 network-object 10.153.40.0 255.255.255.0 object-group network Ascott_CHN group-object Ascott_CHN1 group-object Ascott_CHN2 group-object Ascott_CHN3 object-group network CHN_Citrix_Servers network-object host SGCalypso3 network-object host SGCalypso4 object-group network Ascott_ExchgSvr network-object host AscottExchange1 network-object host AscottExchange2 network-object host AscottExchange3 object-group network Ascott_Host_2-46-48 network-object host Ascott_H1 network-object host Ascott_H2 object-group network Ascott_TT_Hosts network-object host Ascott_TT_Host_42 network-object host Ascott_TT_Host_43 network-object host Ascott_TT_Host_47 object-group network Ascott_CHN_AdminHosts network-object host Ascott_CHN_H1 network-object host Ascott_CHN_H2 network-object host Ascott_CHN_H3 network-object host Ascott_CHN_H4 network-object host Ascott_CHN_H5 network-object host Ascott_CHN_H6 object-group network Ascott_Hosts network-object host Blandine_PC network-object host Ascott_H4 network-object host Jason_PC object-group network Ascott_CHN_DCSVR network-object host Ascott_CHN_DC1 network-object host Ascott_CHN_DC2 object-group network SGCalypso3-4s network-object host SGCalypso3 network-object host SGCalypso4 object-group network Ascott_AU group-object Ascott_HQ_254 group-object Ascott_OGP_252 group-object Ascott_SE_252 group-object Ascott_OOS_252 object-group network HBEX_NEW_IP network-object host HBEX_NEW_IP_01 network-object host Net_Trust_Server object-group network RAFL-12-5_17-222 network-object host Raffle_Host_12-5 network-object host RafflesHost-17-222 object-group network RP_Developer_Hosts network-object host 10.154.4.107 network-object host 10.154.4.108 network-object host 10.154.4.109 object-group network Ascot_SGTitan_SGOrion network-object host SGOrion2 network-object host SGOrion1 network-object host SGTitan1 network-object host SGTitan2 object-group network HP_VPN_Group network-object host HP_VPN_Server1 network-object host HP_VPN_Server2 object-group network Ascott_BU network-object Ascott_BU_Net 255.255.0.0 object-group network Ascott_VLAN_11 network-object TMP_AS_Subnet 255.255.255.240 object-group network Ascott_VLAN_12 network-object TMP_A2_Subnet 255.255.255.240 object-group network Ascott_VLAN_128 network-object STA_AS_Subnet 255.255.255.0 object-group network Ascott_VLAN_131 network-object DCB_AS_Subnet 255.255.255.0 object-group network Ascott_Access_SCRS417 group-object Ascott_BU group-object Ascott_VLAN_11 group-object Ascott_VLAN_12 group-object Ascott_VLAN_128 group-object Ascott_VLAN_131 object-group network Ascott_Admin_G1 network-object AScott_Admin_TT 255.255.255.248 object-group network AScott_Admin_G2 network-object AS_SG_Admin 255.255.255.248 object-group network Ascott_Admin_Group group-object Ascott_Admin_G1 group-object AScott_Admin_G2 object-group network NET_10_154_32_0 network-object Funan 255.255.255.0 object-group network NET_10_154_33_0 network-object 10.154.33.0 255.255.255.0 object-group network NET_10_154_34_0 network-object 10.154.34.0 255.255.255.0 object-group network NET_10_154_35_0 network-object 10.154.35.0 255.255.255.0 object-group network NET_10_154_36_0 network-object 10.154.36.0 255.255.255.0 object-group network NET_10_154_37_0 network-object 10.154.37.0 255.255.255.0 object-group network NET_10_154_39_0 network-object 10.154.39.0 255.255.255.0 object-group network NET_10_154_40_0 network-object 10.154.40.0 255.255.255.0 object-group network NET_10_154_49_0 network-object 10.154.49.0 255.255.255.0 object-group network NET_10_154_50_0 network-object 10.154.50.0 255.255.255.0 object-group network NET_10_154_51_0 network-object 10.154.51.0 255.255.255.0 object-group network NET_10_154_52_0 network-object 10.154.52.0 255.255.255.0 object-group network NET_10_154_53_0 network-object 10.154.53.0 255.255.255.0 object-group network NET_10_154_54_0 network-object 10.154.54.0 255.255.255.0 object-group network NET_10_154_55_0 network-object 10.154.55.0 255.255.255.0 object-group network NET_192_168_181_0 network-object 192.168.181.0 255.255.255.0 object-group network NET_10_153_100_0 network-object 10.153.100.0 255.255.255.0 object-group network NET_10_156_128_0 network-object 10.156.128.0 255.255.255.0 object-group network NET_10_156_129_0 network-object 10.156.129.0 255.255.255.0 object-group network NET_10_156_131_0 network-object Net-10-156-131-0_0-32 255.255.255.0 object-group network NET_10_156_132_0 network-object Net_10_156_132_0 255.255.255.0 object-group network NET_10_156_133_0 network-object Net_10_156_133_0 255.255.255.0 object-group network NET_10_156_134_0 network-object 10.156.134.0 255.255.255.0 object-group network NET_10_156_137_0 network-object 10.156.137.0 255.255.255.0 object-group network NET_10_156_139_0 network-object Net_10_156_139_0 255.255.255.0 object-group network VPN_BU_PIX-GRP_TMP group-object NET_10_154_32_0 group-object NET_10_154_33_0 group-object NET_10_154_34_0 group-object NET_10_154_35_0 group-object NET_10_154_36_0 group-object NET_10_154_37_0 group-object NET_10_154_39_0 group-object NET_10_154_40_0 group-object NET_10_154_49_0 group-object NET_10_154_50_0 group-object NET_10_154_51_0 group-object NET_10_154_52_0 group-object NET_10_154_53_0 group-object NET_10_154_54_0 group-object NET_10_154_55_0 group-object NET_192_168_181_0 group-object NET_10_153_100_0 group-object NET_10_156_128_0 group-object NET_10_156_129_0 group-object NET_10_156_131_0 group-object NET_10_156_132_0 group-object NET_10_156_133_0 group-object NET_10_156_134_0 group-object NET_10_156_137_0 group-object NET_10_156_139_0 object-group network RIL_SQL_Svr network-object host Sinc1svrpsn1 network-object host Sinc1svrpsn2 network-object host Sinc1svrsun1 network-object host Sinc1svrsun2 object-group network STMS network-object 10.200.0.0 255.254.0.0 object-group network PIX_ANY_ICMP network-object host Ariel network-object host HPMS2 network-object host Cisco7204_HSRP group-object STMS network-object host Prototype network-object host HPMS1 network-object host host10_61_12_51 network-object host Control_DT_102 network-object host Control_DT_101 network-object host host10_150_122_97 network-object host host10_61_12_44 network-object host host10_150_200_98 network-object host Monitor-PC network-object host COMM-CONTROL1 object-group network PIX_host44to50 network-object host host10_61_12_44 network-object host host10_61_12_49 network-object host host10_61_12_50 object-group network AS_SCRS454_Group network-object host Ariel network-object host Blandine_PC network-object host Ascott_H4 object-group network PIX_Kah_Mike_admin network-object host Ascott_H4 network-object host Blandine_PC network-object host Jason_PC network-object host Thomas_PC network-object host Ascott_Host_2-43 object-group network PIX_Areil_Ascott_H2_44_H4 network-object host Ariel network-object host Ascott_H4 network-object host Blandine_PC object-group network PIX_host_200_5_3and6 network-object host host10_200_5_3 network-object host host10_200_5_6 object-group network telnet_host32-99to40-99 network-object host host10_154_32_99 network-object host host10_154_33_99 network-object host host10_154_34_99 network-object host host10_154_36_99 network-object host host10_154_37_99 network-object host host10_154_39_99 network-object host host10_154_40_99 object-group network PIX-GRP-CORP group-object NET_COMMERCIAL group-object NET_CORPORATE network-object host host_172_24_20_12 network-object host HPMS1 network-object host Monitor-PC object-group network PIX_Host_TEST_PC network-object host host10_61_12_51 network-object host Monitor-PC network-object host COMM-CONTROL1 object-group network Retail_Staging_Host network-object host Re_Sta_Host40_10 network-object host Re_Sta_Host50_10 network-object host Re_Sta_Host51_10 network-object host Re_Sta_Host52_10 network-object host CCL_IMM_StagingHost network-object host CCL_HB_StagingHost network-object host RE_Sta_Host41_10 object-group network RP_CT_CA_Console network-object host RP_CA_console network-object host CT_CA_Console object-group network Corp_Ctrl_Zone network-object Corp_Control_Subnet 255.255.255.0 object-group network DC_WORK_CORP_CTRL_Zone group-object DC_Working_ZONE group-object Corp_Ctrl_Zone object-group network CCL_IMM_Net network-object 10.154.8.0 255.255.255.0 object-group network CCL_Habor_Net network-object 10.154.11.0 255.255.255.0 object-group network Retails_Net group-object NET_10_154_32_0 group-object NET_10_154_33_0 group-object NET_10_154_34_0 group-object NET_10_154_35_0 group-object NET_10_154_36_0 group-object NET_10_154_37_0 group-object NET_10_154_39_0 group-object NET_10_154_40_0 group-object NET_10_154_49_0 group-object NET_10_154_50_0 group-object NET_10_154_51_0 group-object NET_10_154_52_0 group-object NET_10_154_53_0 group-object NET_10_154_54_0 group-object NET_10_154_55_0 group-object CCL_IMM_Net group-object CCL_Habor_Net network-object 10.154.41.0 255.255.255.0 object-group network Retail_Net_GW network-object host Retail_Net_GW40_1 network-object host Retail_Net_GW50_1 network-object host Retail_Net_GW52_1 network-object host Retail_Net_GW51_1 object-group network PIX_ICMP_DCtoBU_zone group-object NET_192_168_181_0 network-object host host10_156_138_139 network-object host host192_168_18_220 object-group network PIX_Resi_Orome_Grp network-object host Orome network-object host Host192_168_5_10 network-object host host10_156_2_19 network-object host Resi_AS400Server object-group network NET_10_156_120_0 network-object Net_10_156_120_0 255.255.255.0 object-group network NET_10_156_121_0 network-object Net_10_156_121_0 255.255.255.0 object-group network NET_10_156_122_0 network-object Net_10_156_122_0 255.255.255.0 object-group network CRL_CHN_VPN group-object NET_10_156_128_0 group-object NET_10_156_129_0 group-object NET_10_156_131_0 group-object NET_10_156_133_0 group-object NET_10_156_137_0 group-object NET_10_156_139_0 group-object NET_10_156_134_0 group-object NET_10_156_132_0 group-object NET_10_156_120_0 group-object NET_10_156_121_0 group-object NET_10_156_122_0 object-group network SVR_Yavin_Arien network-object host Yavin network-object host Arien object-group network Net10_200_0_0 network-object 10.200.0.0 255.254.0.0 object-group network LotusNote_SVRs_Grp network-object host Orome group-object Net10_200_0_0 network-object host Iarwain object-group network Galadriel_Orome_Grp network-object host Galadriel network-object host Orome object-group network Net10_61_12_192 network-object TMP_CM_Subnet 255.255.255.240 object-group network PIX_SVR_Grp_SVCE524 network-object host Arien network-object host Orome group-object Net10_61_12_192 group-object NET_COMMERCIAL object-group network Net10_156_128_240 network-object 10.156.128.0 255.255.240.0 object-group network PIX_ICMP_Net_Host_Grp network-object host host10_153_100_203 network-object host hos192_168_181_220 network-object host host10_156_134_19 network-object host Retail_Net_GW32_1 network-object host Retail_Net_GW33_1 network-object host Retail_Net_GW34_1 network-object host Retail_Net_GW35_1 network-object host Retail_Net_GW36_1 network-object host Retail_Net_GW37_1 network-object host Retail_Net_GW39_1 network-object host Retail_Net_GW40_1 network-object host Retail_Net_GW49_1 network-object host Retail_Net_GW50_1 network-object host Retail_Net_GW52_1 network-object host Retail_Net_GW53_1 network-object host Retail_Net_GW54_1 network-object host Retail_Net_GW55_1 network-object host Retail_Net_GW51_1 network-object host host10_156_129_74 network-object host host10_153_100_225 network-object host host10_156_134_139 group-object Net10_156_128_240 object-group network PIX_ICMP_Host_GRP network-object host Prototype network-object host host10_61_12_51 network-object host host10_200_5_3 network-object host host10_200_5_6 network-object host COMM-CONTROL1 network-object host Monitor-PC object-group network PIX_WWW_HTTPS_Grp network-object host Holocam network-object host host_172_24_20_12 network-object host Trendmicro network-object host Iarwain object-group network Net_Corp_Comm_Intranet group-object NET_COMMERCIAL group-object NET_CORPORATE group-object intranet object-group network Ascott_AU_Admin_Hosts network-object host Ascott_HQ_H1 network-object host Ascott_HQ_H2 network-object host Ascott_HQ_H3 network-object host Ascott_OGT_H1 network-object host Ascott_OGP_H1 network-object host Ascott_OOC_H1 network-object host Ascott_OOL_H1 network-object host Ascott_OTM_H1 network-object host Ascott_SE_H1 network-object host Ascott_NR_H1 network-object host Ascott_OCW_H1 network-object host Ascott_OOS_H1 network-object host Ascott_OOTP_H1 network-object host Ascott_ODH_H1 object-group network PIX_VPN network-object host PIX_VPN_Inside_int network-object host PIX_VPN_SEC object-group network SCRS_479_GROUP network-object host Xavier network-object host Control_DT_101 network-object host Control_DT_102 network-object host GALA object-group network ASTL_NET_10-153-71 network-object 10.153.71.0 255.255.255.0 object-group network ASTL_NET_10-153-74 network-object 10.153.74.0 255.255.255.0 object-group network ASTL_NET_10-153-73 network-object 10.153.73.0 255.255.255.0 object-group network ASTL_NET_10-153-75 network-object ASTL_NET_10-153-75 255.255.255.0 object-group network AS_Thailand_NET group-object ASTL_NET_10-153-71 group-object ASTL_NET_10-153-74 group-object ASTL_NET_10-153-73 group-object ASTL_NET_10-153-75 object-group network AS_TL_Javen network-object host ASTL_H10-153-71-17 network-object host ASTL_H10-153-73-17 network-object host ASTL_H10-153-74-17 object-group network BUS_VPN_device_Group network-object host Ascott_TL_Router network-object host PIX_VPN_Inside_int network-object host PIX_VPN_SEC object-group network SCRS_620_GRP network-object host H_10-153-1-107 network-object host H-10-153-1-114 network-object host Ascott_H1 object-group network HP_ITO_Servers network-object host HP_MWA_Mgt_Svr network-object host HP_CODA_Mgt_Svr network-object host HP_Pri_OVO_MgtSvr network-object host HP_Sec_OVO_MgtSvr object-group network BU_VPN_ITO_Mnged_Devs network-object host Ascott_TL_Router network-object host PIX_VPN_Inside_int network-object host PIX_VPN_SEC network-object host CCL2M network-object host AscottRT object-group network ASVN_NET_10-153-50 network-object 10.153.50.0 255.255.255.0 object-group network ASVN_NET_10-153-51 network-object 10.153.51.0 255.255.255.0 object-group network ASVN_NET_10-153-52 network-object 10.153.52.0 255.255.255.0 object-group network ASVN_NET_10-153-53 network-object 10.153.53.0 255.255.255.0 object-group network ASVN_NET group-object ASVN_NET_10-153-50 group-object ASVN_NET_10-153-51 group-object ASVN_NET_10-153-52 group-object ASVN_NET_10-153-53 object-group network VNSGCALPYSO_GR network-object host SGCalypso5 network-object host SGCalyso1 network-object host SGCalyso2 network-object host SGCalypso6 network-object host SGCalypso7 network-object host SGCalypso8 object-group network Daniel_James_TT network-object host DanielTan network-object host JamesKoh object-group network Orome_Yavin_Maverick network-object host Orome network-object host Yavin network-object host Maverick object-group network Phoenix_Arien network-object host Phoenix network-object host Arien object-group network SGcalypso-5to6 network-object host SGCalypso5 network-object host SGCalypso6 object-group network Varda_Durin_Whiphid network-object host Durin network-object host Whiphid network-object host varda object-group network Banned_Streaming_Sites network-object host S_202-172-226-203 network-object host S_202-172-226-202 network-object host mediacorpradio1 network-object host mediacorpradio4 network-object host mediacorpradio2 network-object host mediacorpradio3 object-group network VN_JAVEN_TEST_GR network-object host VN_JAVEN_T1 network-object host VN_JAVEN_T2 network-object host VN_JAVEN_T3 network-object host VN_JAVEN_T4 object-group network CL_Citrix_Servers network-object host Chripa network-object host Corde network-object host Evanzan network-object host Evanzon network-object host Havok network-object host Iceman network-object host CCL_Rogue object-group network AS_Admin_47 network-object host Thomas_PC network-object host Ascott_TT_Host_47 object-group network AS_Admin_42 network-object host Jason_PC network-object host Ascott_TT_Host_42 object-group network AS_Admin_43 network-object host Ascott_Host_2-43 network-object host Ascott_TT_Host_43 object-group network Galaxy_Miranda network-object host Galaxy network-object host Miranda object-group network AS_Admin_GR_47_42_43 network-object host Ascott_Host_2-43 network-object host Ascott_TT_Host_42 network-object host Ascott_TT_Host_43 network-object host Ascott_TT_Host_47 network-object host Thomas_PC network-object host Jason_PC object-group network RIL_DC_Servers network-object host Sinc1ctx1 network-object host Sinc1ctx2 network-object host Sinc1ctx3 network-object host Sinc1svrpsa1 network-object host Sinc1svrpst1 network-object host Sinc1svrpsn1 network-object host Sinc1svrpsn2 network-object host Sinc1svrweb2 network-object host Sinc1svrsun1 network-object host Sinc1svrsun2 object-group network HP_OVA_Mgt_Svrs network-object host HP_Pri_OVO_MgtSvr network-object host HP_Sec_OVO_MgtSvr object-group network HP_Mon_ICMP_Svrs network-object host HP_Pri_OVO_MgtSvr network-object host HP_Sec_OVO_MgtSvr network-object host HPMon3 object-group network Comm_Copier_GR network-object host Comm_Host_4-10 network-object host CCL_IMM_StagingHost network-object host CommHost_11-25 network-object host CommHost_11-12 object-group network Internal_All network-object 0.0.0.0 0.0.0.0 object-group network External_All network-object 0.0.0.0 0.0.0.0 object-group network Coporate_BU network-object 10.150.0.0 255.255.128.0 object-group network Commercial_BU network-object Comm_BU_Net 255.255.0.0 object-group network Premas_BU network-object Net_RHL 255.255.0.0 object-group network Raffles_BU network-object Raffles_BU_Net 255.255.0.0 object-group network Residential_BU network-object Resi_BU_Net 255.255.0.0 object-group network DC_Internal network-object STA_AS_Subnet 255.255.128.0 object-group network PhaseI_DC network-object TMP_CG_subnet 255.255.255.192 object-group network PhaseI_BU network-object 10.61.12.128 255.255.255.128 object-group network Security_Control network-object Security_Ctrl_Zone 255.255.255.0 object-group network Private_Server network-object Pri_Svr_Zone 255.255.255.0 object-group network BU_VPN_Ascott network-object 10.150.170.0 255.255.255.0 object-group network BU_VPN_Commercial network-object 10.150.171.0 255.255.255.0 object-group network EXT_VPN_Ascott network-object 10.150.160.0 255.255.255.0 object-group network EXT_VPN_Commercial network-object 10.150.161.0 255.255.255.0 object-group network Internet network-object 0.0.0.0 0.0.0.0 object-group network BuzPart_Ascott network-object Buz_Partner 255.255.255.0 object-group network BuzPart_Commercial network-object 10.150.151.0 255.255.255.0 object-group network BuzPart_Residentia network-object 10.150.152.0 255.255.255.0 object-group network BuzPart_Corporate network-object 10.150.153.0 255.255.255.0 object-group network BuzPart_Raffles network-object 10.150.154.0 255.255.255.0 object-group network BuzPart_Premas network-object 10.150.155.0 255.255.255.0 object-group network BuzPart_CL network-object 10.150.156.0 255.255.255.0 object-group network BuzPart_CG network-object 10.150.157.0 255.255.255.0 object-group network BU_VPN_Residential network-object 10.150.172.0 255.255.255.0 object-group network BU_VPN_Corporate network-object 10.150.173.0 255.255.255.0 object-group network BU_VPN_Raffles network-object 10.150.174.0 255.255.255.0 object-group network BU_VPN_Premas network-object 10.150.175.0 255.255.255.0 object-group network BU_VPN_CL network-object 10.150.176.0 255.255.255.0 object-group network BU_VPN_CG network-object PIXVPN 255.255.255.0 object-group network EXT_VPN_Residentia network-object 10.150.162.0 255.255.255.0 object-group network EXT_VPN_Corporate network-object 10.150.163.0 255.255.255.0 object-group network EXT_VPN_Raffles network-object 10.150.164.0 255.255.255.0 object-group network EXT_VPN_Premas network-object 10.150.165.0 255.255.255.0 object-group network EXT_VPN_CL network-object 10.150.166.0 255.255.255.0 object-group network EXT_VPN_CG network-object 10.150.167.0 255.255.255.0 object-group network Public_Server network-object DMZ 255.255.255.192 object-group network Any network-object 0.0.0.0 0.0.0.0 object-group network Mgt_Console1 network-object ControlPC1 255.255.255.252 object-group network Ascott_VLAN network-object TMP_A2_Subnet 255.255.255.240 object-group network Raffles_100 network-object 10.157.100.0 255.255.255.0 object-group network SBU network-object 10.144.0.0 255.240.0.0 object-group network Zurich network-object Raffles-Swissotel 255.255.252.0 object-group network Zurich_Net network-object 172.16.67.0 255.255.255.0 object-group network Kah_Ming_254 network-object Jason_PC 255.255.255.254 object-group network Any-DataCenter network-object 0.0.0.0 0.0.0.0 object-group network Celeris_IT network-object 195.35.121.0 255.255.255.0 object-group network Raf_NaiLertPark network-object 10.74.4.0 255.255.252.0 object-group network BU_VPN_ANY network-object 0.0.0.0 0.0.0.0 object-group network Corp_Titania_Gp network-object 10.150.122.0 255.255.255.0 object-group network HP_TT_Fix_IP network-object 10.156.202.240 255.255.255.240 object-group network IT_Control_Zone network-object ITC_NW_subnet 255.255.255.0 object-group network Net10_150_244_0 network-object Secura_VPN_Pool1 255.255.255.240 object-group network Net10_156_17_0 network-object 10.156.17.0 255.255.255.0 object-group network ASTL_NET_10-153-72 network-object 10.153.72.0 255.255.255.0 object-group network ANY-SEC-CONTROL network-object 0.0.0.0 0.0.0.0 object-group network ANY_Buz_Partner network-object 0.0.0.0 0.0.0.0 object-group network CCL_China_Mail_GR network-object 10.154.4.16 255.255.255.254 object-group service Aventail_Mng_ports tcp port-object eq 8443 port-object eq ssh object-group network CL_CC_CR_BUs network-object Corp_BU_Net 255.255.248.0 network-object Comm_BU_Net 255.255.0.0 network-object Resi_BU_Net 255.255.0.0 object-group service BB_TCP tcp port-object range 8194 8294 port-object range 1025 6025 object-group service BB_TCP2 tcp port-object range 1025 6025 object-group service BB_UDP udp port-object range 48129 48192 object-group service Chat tcp port-object eq 1863 object-group service HTTP_8080 tcp port-object eq 8080 object-group service HTTP-81 tcp port-object eq 81 object-group service HTTP-82 tcp port-object eq 82 object-group service HTTP-85 tcp port-object eq 85 object-group service IRC-Custom tcp port-object range 6660 6670 port-object eq 7000 object-group service Kazaa tcp port-object eq 1214 object-group service Lotus tcp port-object eq lotusnotes object-group service MS-SQL-Server tcp port-object eq 1433 object-group service Raffles_1000 tcp port-object eq 1000 object-group service Raffles_9080 tcp port-object eq 9080 object-group service Raffless_FTP tcp port-object eq 1000 object-group service Raffles_Right_Acc udp port-object eq 259 object-group service TCP_1099 tcp port-object eq 1099 object-group service TCP_1494 tcp port-object eq citrix-ica object-group service TCP_3090 tcp port-object eq 3090 object-group service TCP_3091 tcp port-object eq 3091 object-group service TCP_8383 tcp port-object eq 8383 object-group service TCP_8443 tcp port-object eq 8443 object-group service TCP_9000 tcp port-object eq 9000 object-group service TCP_9090 tcp port-object eq 9090 object-group service TCP_9192 tcp port-object eq 9192 object-group service TCP2393 tcp port-object eq 2393 object-group service TCP2394 tcp port-object eq 2394 object-group service TCP85 tcp port-object eq 85 object-group service TCP8665 tcp port-object eq 8665 object-group service TCP99 tcp port-object eq 99 object-group service VC_TCP_Ports tcp port-object range 8100 8250 object-group service VC_UDP_Ports udp port-object range 8168 8177 object-group service Yahoo_Messenger tcp port-object eq 5050 object-group service echo tcp-udp port-object eq echo object-group service ftp-data tcp port-object eq ftp-data object-group service MirandaP2 tcp port-object eq 99 object-group service DCE tcp-udp port-object eq 135 object-group service ProfileN tcp-udp port-object eq 136 object-group service netbios-ns tcp-udp port-object eq 137 object-group service netbios-dgm tcp-udp port-object eq 138 object-group service netbios-ssn tcp-udp port-object eq 139 object-group service RAP tcp port-object eq 256 object-group service esro-gen udp port-object eq 259 object-group service bgmp tcp port-object eq 264 object-group service HP_Managed_Node tcp port-object eq 382 object-group service MS_RPC tcp port-object eq 445 object-group service isakmp udp port-object eq isakmp object-group service syslog-tcp tcp port-object eq cmd object-group service NCP tcp port-object eq 524 object-group service LDAPS tcp port-object eq ldaps object-group service GalaxyP1 tcp-udp port-object eq 1039 object-group service DDT tcp-udp port-object eq 1052 object-group service SQL tcp port-object range 1433 1434 object-group service citrix-ica tcp port-object eq citrix-ica object-group service ica-browser udp port-object eq 1604 object-group service Radius tcp-udp port-object eq 1812 object-group service Tarkin3P1 tcp port-object eq 1959 object-group service Tarkin3P2 tcp port-object eq 2222 object-group service Citrixadmin tcp port-object eq 2513 object-group service ms_OLAP tcp port-object eq 2725 object-group service cpudpencap tcp port-object eq 2746 object-group service GalaxyP2 tcp port-object eq 3850 object-group service Omniback_Backup tcp port-object eq 5555 object-group service VNC tcp port-object eq 5900 object-group service Arc_Serve_Backup tcp-udp port-object eq 6050 object-group service NetOps tcp-udp port-object eq 6502 object-group service WebCache tcp port-object eq 8081 object-group service MirandaP1 tcp port-object eq 8888 object-group service Webmin tcp port-object eq 10000 object-group service HP_Remote_Monitor tcp port-object range 10000 10200 object-group service CelerisITP1 tcp port-object eq 11965 object-group service CelerisITP2 tcp port-object eq 11966 object-group service HP_Monitoring_Svr tcp port-object range 14001 14010 object-group service DataWarehouse tcp port-object eq 14999 object-group service Celeris6P1 tcp port-object eq 18190 object-group service RafflesDNSP2 udp port-object eq 18234 object-group service RafflesDNSP1 tcp port-object eq 18264 object-group service ichain tcp port-object eq 51100 object-group service Omniback_Backup2 tcp port-object range 6000 6099 object-group service SGDeimos_Services tcp-udp port-object range 135 139 port-object eq 445 port-object range 137 139 object-group service TCP_6900 tcp port-object eq 6900 object-group service TCP_6901 tcp port-object eq 6901 object-group service OmniBack-2 tcp port-object range 6000 6099 object-group service TCP_8888 tcp port-object eq 8888 object-group service Kerberos tcp-udp port-object eq 88 object-group service TCP_1026 tcp port-object eq 1026 object-group service UDP_2967 udp port-object eq 2967 object-group service TCP_993 tcp port-object eq 993 object-group service LDAP_UDP udp port-object eq 389 object-group service K2-NET_admin tcp port-object eq 5252 object-group service PServer tcp-udp port-object eq 2401 object-group service Globl_Catalog_LDAP tcp port-object eq 3268 object-group service WebCast_1755 tcp-udp port-object eq 1755 object-group service RTSP tcp port-object eq 554 object-group service Streaming tcp port-object eq 1755 object-group service Globl_Catlog_SLDAP tcp port-object eq 3269 object-group service MS_RPC_UDP udp port-object eq 445 object-group service WINS_Resolution tcp-udp port-object eq 1512 object-group service WINS_Replication tcp-udp port-object eq 42 object-group service TCP-1105 tcp port-object eq 1105 object-group service TCP-1126 tcp port-object eq 1126 object-group service TCP_3306 tcp port-object eq 3306 object-group service UDP_3306 udp port-object eq 3306 object-group service Pserver1 tcp-udp port-object eq 2402 object-group service TCP_1521 tcp port-object eq sqlnet object-group service TCP_1522 tcp port-object eq 1522 object-group service TCP-1523 tcp port-object eq 1523 object-group service TCP_1626 tcp port-object eq 1626 object-group service TCP_1627 tcp port-object eq 1627 object-group service TCP_1628 tcp port-object eq 1628 object-group service TCP-8000 tcp port-object eq 8000 object-group service TCP_8001 tcp port-object eq 8001 object-group service TCP_8002 tcp port-object eq 8002 object-group service TCP_9001 tcp port-object eq 9001 object-group service TCP_9002 tcp port-object eq 9002 object-group service TCP4725 tcp port-object eq 4725 object-group service TCP9081 tcp port-object eq 9081 object-group service TCP808 tcp port-object eq 808 object-group service TCP799-800 tcp port-object range 799 800 object-group service Unicenter-RC1 tcp-udp port-object eq 797 port-object eq 799 port-object eq 4105 port-object eq 4724 port-object eq 800 port-object eq 4104 object-group service Unicenter_SD1_RC1 tcp-udp port-object eq 797 port-object eq 789 port-object eq 4721 port-object eq 4725 port-object eq 8198 port-object eq 8222 port-object eq 1433 port-object range 8037 8044 port-object eq 798 object-group service SNMPTRAP udp port-object eq snmptrap object-group service TCP51080 tcp port-object eq 51080 object-group service TCP1078 tcp port-object eq 1078 object-group service MS-OLAP3 tcp-udp port-object eq 2382 object-group service MS-OLAP4 tcp-udp port-object eq 2383 object-group service MS-OLAP1 tcp-udp port-object eq 2393 object-group service MS-OLAP2 tcp-udp port-object eq 2394 object-group service Custom_Syslog udp port-object eq 1688 object-group service FW_LEA tcp port-object eq 18184 object-group service TCP_135 tcp port-object eq 135 object-group service HP_ITO_Services tcp-udp port-object eq 135 port-object eq 381 port-object range 10000 10200 port-object range 14000 14200 port-object eq 161 object-group service Rodian_Domain tcp-udp port-object eq 135 port-object eq 137 port-object eq 139 port-object eq 389 port-object eq 445 port-object eq 1025 port-object eq 88 port-object eq 138 object-group service TCP_1645 tcp port-object eq 1645 object-group service TCP_1812 tcp port-object eq 1812 object-group service OmniBackup tcp port-object eq 5555 port-object range 6000 6099 object-group service UDP_137 udp port-object eq netbios-ns object-group service MS-OLAP tcp port-object eq 2725 port-object range 2382 2383 port-object range 2393 2394 object-group service UDP_1645 udp port-object eq radius object-group service System_Analyser tcp-udp port-object range 10817 10818 port-object eq 135 port-object eq 445 port-object range 137 139 object-group service OVO_Mgt_Ports tcp port-object eq 135 port-object range 10000 10200 object-group service MWA_Mgt_Ports tcp port-object range 14001 14002 object-group service CODA_Mgt_Ports tcp port-object eq 381 object-group service SNMP_Ports udp port-object range snmp snmptrap object-group service TCP85_TCP99 tcp-udp port-object eq 85 port-object eq 99 object-group service TCP2393-2394 tcp-udp port-object eq 2393 port-object eq 2394 object-group service TCP9090_TCP9192 tcp-udp port-object eq 9090 port-object eq 9192 object-group service VC_Ports tcp-udp port-object range 8100 8250 port-object range 8168 8177 object-group service TCP3090_TCP3091 tcp-udp port-object eq 3090 port-object eq 3091 object-group service BB_Ports tcp-udp port-object range 8194 8294 port-object range 48129 48192 object-group service Raffles_9080_1000 tcp-udp port-object eq 9080 port-object eq 1000 object-group service Raffles_TCP_1099 tcp-udp port-object eq 9080 port-object eq 1000 port-object eq 1099 object-group service HttpHttpsHttp8080 tcp-udp port-object eq 8080 port-object eq www port-object eq 443 object-group service Ban_Services tcp-udp port-object eq 1863 port-object range 6660 6670 port-object eq 7000 port-object eq 5050 port-object eq 1214 object-group service Internet_Services tcp-udp port-object eq www port-object eq 443 port-object eq 8080 port-object range 20 21 object-group service Trendmicro_Service tcp-udp port-object eq www port-object eq 443 port-object range 20 21 port-object eq 25 port-object eq 8080 object-group service Netbios tcp-udp port-object eq 137 port-object eq 138 port-object eq 139 object-group service Miranda_Services tcp-udp port-object eq 22 port-object eq 99 port-object eq 8888 port-object eq 1052 port-object eq 135 object-group service Galaxy_Services tcp-udp port-object eq 135 port-object eq 1039 port-object eq 3850 object-group service Mike_KM_Leon_Svs tcp-udp port-object eq 445 port-object eq 636 port-object eq 389 port-object eq 5900 port-object eq 1604 port-object eq 1494 port-object eq 2513 port-object range 5631 5632 object-group service FTP-all tcp-udp port-object range 20 21 port-object eq 20 object-group service Raffles_FW1-2_Svs tcp-udp port-object eq 256 port-object eq 500 object-group service Raffles_DNS_Svcs tcp-udp port-object eq 264 port-object eq 18234 port-object eq 18264 port-object eq 500 port-object eq 2746 port-object eq 259 object-group service STMS_Services tcp-udp port-object eq 1352 object-group service Raffles100_Service tcp-udp port-object eq 22 port-object eq 11965 port-object eq 11966 object-group service Tarkin3_Services tcp-udp port-object eq 1959 port-object eq 2222 port-object eq 524 port-object range 20 21 port-object eq 51100 object-group service Arien_Services tcp-udp port-object eq 389 port-object eq 636 port-object eq 1812 object-group service RIL_Server_Farm_Sv tcp-udp port-object eq 22 port-object eq 6502 port-object eq 1494 port-object range 5631 5632 object-group service Ext_Net_Mon1 tcp-udp port-object eq 135 port-object range 10000 10200 object-group service Ext_Net_Mon2 tcp-udp port-object eq 135 port-object eq 382 port-object range 14001 14010 object-group service ftp-ssh tcp-udp port-object range 20 21 port-object eq 22 object-group service Ascott-BPE-ports tcp-udp port-object eq www port-object eq 443 port-object eq 25 port-object eq 99 port-object eq 8888 object-group service TCP8888_TCP99 tcp-udp port-object eq 8888 port-object eq 99 object-group service CHN_Citrix_Svcs tcp-udp port-object eq 135 port-object eq 445 port-object range 137 139 port-object eq 2513 port-object eq 1604 port-object eq 1494 object-group service HTTP_HTTPS tcp-udp port-object eq www port-object eq 443 object-group service Domain_Login tcp-udp port-object eq 445 port-object eq 389 port-object eq 135 port-object eq 1026 port-object eq 2967 port-object eq 88 object-group service AD_Replication tcp-udp port-object eq 135 port-object eq 137 port-object eq 138 port-object eq 139 port-object eq 445 port-object eq 88 port-object eq domain port-object eq 389 port-object eq 1026 port-object eq 3268 port-object eq 636 port-object eq 3269 port-object eq 1512 port-object eq 42 port-object eq 123 port-object eq 1105 port-object eq 1126 object-group service WebCast tcp-udp port-object eq 1755 port-object eq 554 object-group service Citrix_Svcs tcp-udp port-object eq 2513 port-object eq 1494 port-object eq 1604 object-group service Dashade_Services tcp-udp port-object eq 22 port-object eq 3306 object-group service AscottRS tcp-udp port-object eq 1604 port-object eq 1494 port-object eq 5900 port-object eq 2513 port-object range 5631 5632 object-group service RAS_Ctrl tcp-udp port-object eq 5900 port-object range 5631 5632 object-group service HP_VPN_Services tcp-udp port-object eq 500 object-group service CVS_Ports tcp-udp port-object eq 2401 port-object eq 2402 object-group service Ascott_Oracle_Mail tcp-udp port-object eq 25 port-object eq 443 port-object eq 993 object-group service AS_Oracle_Services tcp-udp port-object eq 8000 port-object eq 8001 port-object eq 8002 port-object eq 9000 port-object eq 9001 port-object eq 9002 port-object eq 1521 port-object eq 1522 port-object eq 1523 port-object eq 1626 port-object eq 1627 port-object eq 1628 port-object eq www port-object eq 443 object-group service PIX_445_DNS tcp-udp port-object eq domain port-object eq 445 object-group service PIX_GRP_CORP tcp-udp port-object eq www port-object eq 9081 port-object eq 808 object-group service CHN_VPN_SRV_GRP tcp-udp port-object eq 524 port-object eq www port-object eq 445 port-object eq 137 port-object eq 138 port-object eq 139 port-object eq 51080 object-group service GRP_DCE_TCP1078 tcp-udp port-object eq 135 port-object eq 1078 object-group service ASTL_CitrixService tcp-udp port-object eq 1494 port-object eq 1604 port-object eq 2513 port-object eq 135 port-object eq 445 port-object range 137 139 object-group service MS_OLAP_1-4 tcp-udp port-object eq 2382 port-object eq 2383 port-object eq 2393 port-object eq 2394 object-group service MS-NEtbios tcp-udp port-object eq 137 port-object eq 139 port-object eq 138 port-object eq 135 port-object eq 445 object-group service SSH_TCP8443 tcp-udp port-object eq 22 port-object eq 8443 object-group service MRTG_ACCESS tcp-udp port-object eq 161 port-object eq www object-group service HTTP tcp port-object eq www object-group service HTTPS tcp port-object eq https object-group service FTP tcp port-object range ftp-data ftp object-group service SMTP tcp port-object eq smtp object-group service SSH tcp port-object eq ssh object-group service PC-Anywhere tcp-udp port-object range 5631 5632 object-group service WINFRAME tcp port-object eq citrix-ica object-group service LDAP tcp port-object eq ldap object-group network PIX_SVR_Prospero_Orome network-object host Prospero network-object host Orome object-group network PhaseI_DC_real network-object 10.154.4.64 255.255.255.192 object-group network CLL_CCL_CRL_BUs network-object Resi_BU_Net 255.255.0.0 network-object Comm_BU_Net 255.255.224.0 network-object Corp_BU_Net 255.255.248.0 object-group network USPSD_clients network-object host DanielTan network-object host 10.156.202.182 object-group service USPSD tcp-udp description SCRS 845 port-object eq 2365 port-object range 2100 2150 object-group service USPSD_Web tcp port-object eq 2300 port-object range 2100 2105 object-group network HP_VPN_Access_Group network-object WOR_DC_Subnet 255.255.255.0 network-object 10.156.202.240 255.255.255.240 network-object host TEST_HP_VPN_FIX network-object host CT_10-150-120-68 object-group network DC_Control_Hosts network-object host ControlPC3 network-object host ControlPC2 network-object host ControlPC1 object-group service Sys_Analyzer_TCP_Svcs tcp port-object eq 135 port-object eq 445 object-group service Sys_Analyzer_TCP_UDP_Svcs tcp-udp port-object range 137 139 object-group service NREMS tcp description Real Estate Management Ports port-object range 4010 4010 port-object range 22050 22050 port-object range 3372 3372 port-object range 4020 4020 port-object range 4000 4000 port-object range 3000 3004 port-object range 22210 22210 port-object range 22220 22220 object-group network HP_Mon_Hosts network-object host HP_Pri_OVO_MgtSvr network-object host HP_Sec_OVO_MgtSvr network-object host HP_MWA_Mgt_Svr network-object host HP_CODA_Mgt_Svr network-object host HPMon3 object-group service KVM_IP_Mng tcp port-object eq www port-object eq 2068 port-object eq 3211 port-object eq 8023 port-object range 8189 8190 object-group service KVM_IP tcp port-object eq 2068 port-object eq 8192 object-group network SBU_Control_Hosts network-object host CT_CA_Console network-object host COMM-CONTROL1 network-object host Control_DT_101 network-object host Control_DT_102 network-object host Control_DT_103 network-object host Control_DT_104 network-object host Control_DT_105 network-object host 10.156.202.102 network-object host 10.156.202.220 object-group network VPN_IP_Pools description Remark-----SecureRemote VPN access to CLNS01---------- network-object ip-pool1 255.255.254.0 network-object ip-pool2 255.255.254.0 object-group service MediaRing-TCP tcp description For Ascott MediaRing VOIP TCP ports port-object eq 8080 port-object range 7989 7998 port-object eq 31720 port-object eq telnet port-object range 51720 51721 port-object range h323 1721 object-group service MediaRing-UDP udp port-object range 8000 8900 port-object range 7989 7998 port-object eq 51719 port-object eq 1719 port-object eq 1800 object-group service Raffles-Proxy tcp port-object eq 8080 port-object eq 37 port-object eq h323 port-object eq citrix-ica port-object eq ldap port-object eq ssh port-object eq www port-object eq https object-group service Raffles-Proxy-UDP udp port-object eq time port-object eq domain object-group network CCL_IMM_Habour_Net group-object CCL_IMM_Net group-object CCL_Habor_Net object-group network Yavin-Havok network-object host Yavin network-object host Havok object-group service CCL_IM_Habour_Phoenix_Tcp tcp port-object eq 524 port-object eq netbios-ssn port-object eq 445 port-object eq www object-group service CCL_IM_Habour_Phoenix_Udp udp port-object eq netbios-ns object-group network SGCalypso1-8 network-object host SGCalyso1 network-object host SGCalyso2 network-object host SGCalypso3 network-object host SGCalypso4 network-object host SGCalypso5 network-object host SGCalypso6 network-object host SGCalypso7 network-object host SGCalypso8 object-group network VNpluto1-2 network-object host VNpluto1 network-object host VNpluto2 object-group service NetbiosTcpIP tcp-udp port-object eq 139 port-object eq 138 port-object eq 137 port-object eq 445 port-object range 137 137 object-group network CCL_Intranet network-object host Orome network-object host Yavin network-object host 10.150.130.113 network-object host Holocam network-object host Trendmicro object-group network AS_AE_NET network-object host Ascott_Dubai object-group network MediaRing_Svr_Group network-object host MediaRing_Host1 network-object host 66.35.195.190 network-object host MediaRing_Host4 network-object host MediaRing_Host6 network-object host MediaRing_Host7 network-object host MediaRing_Host5 network-object host MediaRing_Host2 object-group network SBU_Novell_Servers description Business Unit Novell Servers network-object host CLNS01 network-object host BACKUPCLNS network-object host Jubilee object-group service NAV_CLIENT_DAT udp port-object eq 38293 port-object eq 38037 port-object eq 2967 object-group network Intranet_Citrix_Svrs description Intranet Zone Citrix Servers network-object host Chripa network-object host Evanzan network-object host Evanzon network-object host Holocam network-object host Corde network-object host Yavin object-group network CCL_DC_Citrix_Svrs description Commercial DC Citrix Servers network-object host Havok network-object host Iceman object-group network CCL_Retails_Net description Commercial Retail network network-object 10.154.40.0 255.255.255.0 network-object 10.154.50.0 255.255.255.0 network-object 10.154.51.0 255.255.255.0 network-object 10.154.52.0 255.255.255.0 network-object 10.154.8.0 255.255.255.0 network-object 10.154.11.0 255.255.255.0 object-group service BBSG1 tcp description Bloomberg Service Group 1 port-object range 8194 8294 object-group service BBSG2 tcp description Bloomberg Service Group 2 port-object range 1025 6025 object-group service BBSG3 udp description Bloomberg Service Group 3 port-object range 48129 48192 object-group network Bloomberg_Sites description Bloomberg Group Terminal network-object 202.216.112.0 255.255.255.0 network-object 206.156.53.0 255.255.255.0 network-object 160.43.0.0 255.255.0.0 network-object 208.22.56.0 255.255.255.0 object-group service Bloomberg_Services_TCP tcp group-object BBSG2 group-object BBSG1 port-object range 3140 3150 port-object range 3050 3100 port-object range 3400 3499 object-group network Bloomberg_Nets network-object 69.184.0.0 255.255.0.0 network-object 69.191.192.0 255.255.192.0 network-object 160.43.250.0 255.255.255.0 network-object 199.105.176.0 255.255.248.0 network-object 199.105.184.0 255.255.254.0 network-object 205.183.246.0 255.255.255.0 network-object 205.216.112.0 255.255.255.0 network-object 206.156.53.0 255.255.255.0 network-object 208.22.56.0 255.255.255.0 network-object 208.22.57.0 255.255.255.0 network-object 208.134.161.0 255.255.255.0 object-group network Ascott_Thailand network-object 10.153.71.0 255.255.255.0 network-object 10.153.73.0 255.255.255.0 network-object 10.153.74.0 255.255.255.0 network-object 10.153.72.0 255.255.255.0 network-object ASTL_NET_10-153-75 255.255.255.0 object-group network Ascott_Vietnam network-object 10.153.50.0 255.255.255.0 network-object 10.153.51.0 255.255.255.0 network-object 10.153.52.0 255.255.255.0 network-object 10.153.53.0 255.255.255.0 network-object 10.153.54.0 255.255.255.0 object-group network Ascott_SGCalys3-8 network-object host SGCalypso8 network-object host SGCalypso7 network-object host SGCalypso6 network-object host SGCalypso5 network-object host SGCalypso3 network-object host SGCalypso4 object-group network Ascott_SGCalyso1-2 network-object host SGCalyso1 network-object host SGCalyso2 object-group network Ascott_SGCalyso5-6 network-object host SGCalypso6 network-object host SGCalypso5 object-group network Ascott_China network-object 10.153.35.0 255.255.255.0 network-object 10.153.36.0 255.255.252.0 network-object 10.153.40.0 255.255.255.0 object-group network Raffles_Bloomberg_Hosts network-object host Raffles_Host11 network-object host Raffles_Host12 network-object host Raffles_Host13 network-object host Raffles_Host14 network-object host Raffles_Host15 network-object host Raffles_Host16 network-object host Raffles_Host17 network-object host Raffles_Host18 network-object host Raffles_Host19 network-object host Raffles_Host20 object-group network Corp_Treasury_Hosts description Corporate Treasury Dept network-object host 10.150.122.9 network-object host 10.150.122.11 network-object host 10.150.122.20 network-object host 10.150.122.103 network-object host 10.150.122.105 network-object host 10.150.122.107 network-object host 10.150.122.116 network-object host 10.150.122.128 network-object host 10.150.122.149 network-object host 10.150.122.200 network-object host 10.150.122.217 network-object host 10.150.122.221 network-object host 10.150.122.223 network-object host 10.150.122.224 network-object host 10.150.122.232 network-object host 10.150.122.238 network-object host 10.150.122.236 network-object host 10.150.122.241 network-object host 10.150.122.244 network-object host 10.150.122.248 object-group network Corp_HR_Hosts description Corporate HR Dept network-object host 10.150.122.15 network-object host 10.150.122.24 network-object host 10.150.122.200 network-object host 10.150.122.210 network-object host 10.150.122.9 object-group network CSLucas_Hosts description For CSLucas Developers in 19 floor, TT network-object host CSLucas_Host1 network-object host CSLucas_Host2 network-object host CSLucas_Host3 network-object host CSLucas_Host4 object-group service AD_Trust_TCP tcp port-object eq 42 port-object eq 88 port-object eq 135 port-object eq netbios-ssn port-object eq ldap port-object eq 445 port-object eq ldaps port-object range 3268 3269 port-object eq domain object-group service AD_Trust_UDP udp port-object eq 88 port-object range netbios-ns netbios-dgm port-object eq 389 port-object eq domain object-group network CCL_Retail_Nets description Commercial Retail Networks network-object 10.154.40.0 255.255.255.0 network-object 10.154.49.0 255.255.255.0 network-object Funan 255.255.248.0 network-object 10.154.50.0 255.255.254.0 network-object 10.154.52.0 255.255.255.0 network-object 10.154.41.0 255.255.255.0 object-group network EmailXtenders description EmailXtenders group of servers - Communicating with Anakin network-object host CLG001 network-object host CLG101 network-object host 10.200.18.6 network-object host STNMC005 object-group service EmailXtender tcp port-object eq lotusnotes port-object range 1200 1215 port-object eq www object-group network RP_VIP network-object host 10.154.4.99 network-object host 10.154.4.110 network-object host 10.154.4.111 network-object host 10.154.4.112 network-object host 10.154.4.188 network-object host 10.154.4.53 network-object host 10.154.4.101 network-object host 10.150.122.6 object-group network SGDeimosX description Ascott DC Servers network-object host SGDeimos1 network-object host SGDeimos2 object-group network SGCalypsoX description Ascott Citrix Servers network-object host SGCalyso1 network-object host SGCalyso2 object-group network SGStephnoX description Ascott SQL Servers network-object host SGStephno1 network-object host SGStephno2 object-group network SGOrionX description Ascott Oracle Servers network-object host SGOrion1 network-object host SGOrion2 object-group network SGCalypso3-8 description Ascott Citrix Farm network-object host SGCalypso8 network-object host SGCalypso7 network-object host SGCalypso5 network-object host SGCalypso4 network-object host SGCalypso3 network-object host SGCalypso6 object-group network SGTitanX description Ascott SGTitan network-object host SGTitan1 network-object host SGTitan2 object-group service Internet-Services tcp object-group network Ascott_SG_Properties description Ascott Singapore Properties network-object 10.153.2.0 255.255.255.0 network-object AS_Grand_Carnhill 255.255.255.0 network-object AS_Orchard 255.255.255.0 network-object AS_Bencoolen 255.255.255.0 network-object AS_Compass 255.255.255.0 network-object AS_TAS 255.255.255.0 object-group network ASKR_NET_10-153-56 network-object Ascot_Korea 255.255.255.0 object-group network AS_Oversea_Nets network-object Ascot_Korea 255.255.255.0 network-object Ascott_Malaysia 255.255.255.0 network-object ASJP_Net_119 255.255.255.0 network-object ASJP_Net_118 255.255.255.0 object-group network AS_Oversea_Deimos network-object host ASKR_Deimos1 network-object host Ascott_CHN_DC2 network-object host Ascott_CHN_DC1 network-object host AS_VNDEIMOS1 network-object host 10.153.52.11 network-object host AEDeimos1 network-object host Ascott_HQ_H1 network-object host NewZealand-Deimos1 network-object host ASTL_DEIMOS1 network-object host ASML_Deimos1 network-object host ASJP_Deimos1 object-group network AS_Oversea_Tests network-object host ASKR_TEST object-group network AS_CN_AU_deimos network-object host NewZealand-Deimos1 network-object host Ascott_CHN_DC1 network-object host Ascott_CHN_DC2 network-object host Ascott_HQ_H1 object-group network Ascott_SQL_ALL network-object host SGStephno1 network-object host SGStephno2 network-object host Ascott_SQL_VIP object-group network Ascott_Admin_Hosts network-object host Ascott_TT_Host_42 network-object host Ascott_TT_Host_43 network-object host Jason_PC network-object host Ascott_Host_2-43 object-group network Ascott_Admin_Hos object-group network AKR_Orcale_Printing network-object host ASKR_Pluto1 network-object host ASKR_Printer object-group network EMS_Servers network-object host Anakin_ object-group network Xtender_Servers network-object host CLG001 network-object host CLG101 network-object host 10.200.18.6 network-object host STNMC005 object-group network SGCalypso5-8 network-object host SGCalypso5 network-object host SGCalypso6 network-object host SGCalypso7 network-object host SGCalypso8 object-group network DC_Exinda network-object host Exindar_MonitorUnit network-object host Optimizer_DC object-group service ssh_https tcp port-object eq ssh port-object eq https object-group network AS_Oversea_Printservers network-object host ASKR_Pluto1 network-object host AEDeimos1 network-object host ASTL_Printserver network-object host ASML_PrintServer network-object host 10.153.32.12 network-object host 10.153.33.12 network-object host 10.153.36.12 network-object host 10.153.37.12 network-object host 10.153.39.12 network-object host 10.153.40.12 network-object host AS_CN_FileServer1 network-object host AS_CN_FileServer2 network-object host AS_CN_FileServer5 network-object host Ascott_CHN_35_12 network-object host Ascott_CHN_38_12 network-object host 10.153.33.32 network-object host 10.153.38.32 network-object host 10.153.30.32 network-object host ASJP_Printserver1 network-object host ASJP_Printserver2 object-group service Ascott_Admin_Ports_TCP tcp port-object eq 5900 port-object eq 2513 port-object eq ldap port-object eq pcanywhere-data port-object eq ldaps port-object eq 445 port-object eq citrix-ica object-group service Ascott_Admin_Ports_UDP udp port-object eq pcanywhere-status port-object eq 1604 object-group service AS_ADJoining_TCP tcp port-object eq netbios-ssn port-object eq ldap port-object eq 137 port-object eq 135 port-object eq 445 port-object range 1025 1026 port-object range domain domain object-group service AS_ADJoining_UDP udp port-object eq 88 port-object eq netbios-dgm port-object eq 389 port-object eq netbios-ns port-object eq domain port-object range ntp ntp object-group service AS_CitrixNetbios_TCP tcp port-object eq 2513 port-object eq 137 port-object eq 445 port-object eq netbios-ssn port-object eq citrix-ica object-group service AS_CitrixNetbiso_UDP udp port-object eq netbios-dgm port-object eq netbios-ns port-object eq 1604 object-group network SGCalypso1-2and5-8 network-object host SGCalyso1 network-object host SGCalyso2 network-object host SGCalypso8 network-object host SGCalypso7 network-object SGCalypso6 255.255.255.254 network-object host SGCalypso5 object-group network SGTitanX-SGOrionX network-object host SGOrion1 network-object host SGOrion2 network-object host SGTitan1 network-object host SGTitan2 object-group service AS_AD_Fix_Port tcp port-object eq 50000 object-group network Resi_DCs network-object host CRLNT02 network-object host CRLNT09 object-group service Resi_AD_Trust_TCP tcp port-object eq 88 port-object range 3268 3269 port-object eq ldap port-object eq 135 port-object eq 445 port-object eq ldaps port-object eq domain object-group service Resi_AD_Trust_TCP_Return tcp port-object eq ldap port-object eq 135 object-group service Resi_AD_Trust_UDP udp port-object eq 88 port-object eq 389 port-object eq domain object-group service Resi_AD_Trust_UDP_Return udp port-object eq 389 object-group network CRL_PC network-object host KC_IP network-object host Hui_Juien_PC object-group network Corp_Servers_VL134 network-object host Falleen network-object host CLNT07 object-group service Ifolder tcp port-object eq 52443 port-object eq 51443 port-object eq 52080 port-object eq 51080 object-group network Intranet_Webs network-object host Neucleus1 network-object host Orome network-object host Arien network-object host Iarwain network-object host Rodian network-object host Sicrus_Server network-object host Trendmicro object-group network SGCalypso01-08 network-object host SGCalypso8 network-object host SGCalypso7 network-object SGCalypso6 255.255.255.254 network-object host SGCalypso5 network-object host SGCalypso4 network-object host SGCalypso3 network-object host SGCalyso1 network-object host SGCalyso2 object-group network AS_Managed_Servers network-object host Ariel network-object host SGCalyso1 network-object host SGCalyso2 network-object host Prospero network-object host Ascott_SQL_VIP network-object host SGTitan1 network-object host SGTitan2 network-object host SGCalypso7 network-object SGCalypso6 255.255.255.254 network-object host SGCalypso5 network-object host SGCalypso3 network-object host SGCalypso4 network-object host SGOrion2 network-object host SGOrion1 network-object host SGCalypso8 network-object host SGStephno1 network-object host SGStephno2 network-object host Neptune network-object host Saturn network-object host Acapulco network-object host SGDeimos1 network-object host SGDeimos2 network-object host 10.150.131.109 object-group network SBU_Control_PCs description Management PCs network-object host CT_CA_Console network-object host COMM-CONTROL1 network-object host Control_DT_101 network-object host Control_DT_102 network-object host Control_DT_103 network-object host Control_DT_104 network-object host Control_DT_105 network-object host 10.156.202.220 network-object host 10.156.202.102 object-group network Ascott_LC_72-87 network-object AS_Oracle_Admin1 255.255.255.248 network-object AS_Oracle_Admin2 255.255.255.248 object-group service AS_BootP udp port-object eq bootpc port-object eq bootps object-group network Ascott_SQLs network-object host Neptune network-object host Ariel network-object host Ascott_SQL_VIP network-object host DPRStephano1 network-object host Saturn network-object host SGStephno1 network-object host SGStephno2 network-object host 10.61.12.153 network-object host 10.150.131.109 object-group network MRLiu network-object host 10.156.10.210 network-object host 10.156.10.211 object-group network Ascott_LC_Admin1 description Ascott Admin Hosts network-object host Ascott_TT_Host_47 network-object host Ascott_TT_Host_42 network-object host Ascott_TT_Host_43 object-group network AS_Antivirus_Hosts network-object host 10.153.1.12 network-object host SGpluto1 network-object host 10.153.1.41 object-group service Novell_TCP_Svcs tcp description Novell TCP Services port-object range 524 524 port-object range 427 427 object-group service Radius_Authen_MCA udp port-object range radius radius port-object range 1812 1812 object-group service Novell_TCP_UDP_Svcs tcp-udp description Novell TCP & UDP Services port-object range 123 123 port-object range 524 524 port-object range 427 427 object-group network CSR_CL_Anti_Spoofing network-object CSR_CL_subnet 255.255.255.0 object-group network DCB_CP_Anti_Spoofing network-object DCB_CP_Subnet 255.255.255.0 object-group network CSR_CG_Anti_Spoofing network-object CSR_CG_Subnet 255.255.255.0 object-group network TMP_RS_Anti_Spoofing network-object TMP_RS_Subnet 255.255.255.240 object-group network ITC_NW_Anti_Spoofing network-object ITC_NW_subnet 255.255.255.0 object-group network WOR_DC_Anti_Spoofing network-object WOR_DC_Subnet 255.255.255.0 object-group network TMP_SZ_Anti_Spoofing network-object TMP_SZ_Subnet 255.255.255.240 object-group network TMP_SZ1_Anti_Spoofing network-object TMP_SZ1_Subnet 255.255.255.192 object-group network STA_AS_Anti_Spoofing network-object STA_AS_Subnet 255.255.255.192 object-group network CCL_AS_Anti_Spoofing network-object CCL_AS_Subnet 255.255.255.192 object-group network TMP_CM_Anti_Spoofing network-object TMP_CM_Subnet 255.255.255.240 object-group network TMP_AS_Anti_Spoofing network-object TMP_AS_Subnet 255.255.255.240 object-group network TMP_A2_Anti_Spoofing network-object TMP_A2_Subnet 255.255.255.240 object-group network DCB_AS_Anti_Spoofing network-object DCB_AS_Subnet 255.255.255.0 object-group network EMS_DC_Anti_Spoofing network-object EMS_DC_Subnet 255.255.255.240 object-group network MGT_DC_Anti_Spoofing network-object MGT_DC_Subnet 255.255.255.0 object-group network TRS_DC_IN_Anti_Spoofing network-object Raffles-Swissotel 255.255.252.0 network-object Raffles_BU_Net 255.255.0.0 network-object Raffles_RCH 255.255.0.0 network-object Corp_BU_Net 255.255.248.0 network-object Comm_BU_Net 255.255.224.0 network-object Net_RHL 255.255.248.0 network-object Resi_BU_Net 255.255.0.0 network-object Corp_Control_Subnet 255.255.255.0 network-object Corp_PIX_Outside_Net 255.255.255.0 network-object IPQ_Subnet 255.255.255.0 network-object AScott_TT 255.255.255.0 network-object 10.154.63.0 255.255.255.0 network-object 10.154.64.0 255.255.255.0 network-object Core_Rtr_Zone 255.255.255.240 network-object host Host192_168_5_10 network-object host 10.205.2.21 network-object 10.100.100.0 255.255.255.0 network-object 10.154.38.0 255.255.255.0 network-object Net_RHL 255.255.0.0 object-group network Public_DNS description Capitaland Public DNS Servers. network-object host varda network-object host Durin object-group network CA_TT network-object host 10.156.202.152 network-object host 10.156.202.153 network-object host 10.156.202.154 network-object host 10.156.202.155 object-group network Comm_Subnets_TRS_DC network-object 10.154.9.0 255.255.255.0 network-object 10.154.12.0 255.255.255.0 network-object 10.154.10.0 255.255.255.0 network-object 10.154.13.0 255.255.255.0 network-object 10.154.14.0 255.255.255.0 network-object 10.154.15.0 255.255.255.0 network-object Comm_BU_Net 255.255.248.0 network-object 10.154.16.0 255.255.240.0 network-object 10.154.63.0 255.255.255.0 network-object 10.154.64.0 255.255.255.0 object-group network DCB_CM_Anti_Spoofing network-object DCB_CM_Subnet 255.255.255.0 object-group service HP_ITO_Services_TCP tcp port-object range 14000 14010 object-group network Ascott_Oracle_Team network-object host 10.153.1.78 network-object host 10.153.1.79 network-object host 10.153.1.80 network-object host 10.153.1.81 network-object host 10.153.1.82 network-object host 10.153.1.83 network-object host 10.153.1.84 network-object host 10.153.1.85 network-object host 10.153.1.86 object-group network Ascott_Australia network-object 10.153.138.0 255.255.254.0 network-object 10.153.140.0 255.255.254.0 network-object 10.153.142.0 255.255.254.0 network-object 10.153.145.0 255.255.255.0 network-object 10.153.146.0 255.255.254.0 network-object 10.153.148.0 255.255.252.0 object-group network CL_Exinda network-object host RP_Exinda_Opt network-object host Optimizer_DC object-group network DPRCalypsoX network-object host DPRCalypso1 network-object host DPRCalypso2 object-group network Ascott_Nets_on-CFV-DC network-object 10.153.35.0 255.255.255.0 network-object 10.153.40.0 255.255.255.0 network-object Ascott_Malaysia 255.255.255.0 network-object 10.153.50.0 255.255.255.0 network-object 10.153.51.0 255.255.255.0 network-object 10.153.52.0 255.255.255.0 network-object 10.153.53.0 255.255.255.0 network-object Ascot_Korea 255.255.255.0 network-object 10.153.71.0 255.255.255.0 network-object 10.153.72.0 255.255.255.0 network-object 10.153.73.0 255.255.255.0 network-object 10.153.74.0 255.255.255.0 network-object ASTL_NET_10-153-75 255.255.255.0 network-object Ascott_Dubai 255.255.255.0 network-object 10.153.138.0 255.255.255.0 network-object 10.153.139.0 255.255.255.0 network-object 10.153.140.0 255.255.252.0 network-object 10.153.144.0 255.255.248.0 network-object 10.153.2.0 255.255.255.0 network-object AS_Grand_Carnhill 255.255.255.0 network-object AS_Orchard 255.255.255.0 network-object AS_Bencoolen 255.255.255.0 network-object AS_Compass 255.255.255.0 network-object AS_TAS 255.255.255.0 network-object ASCN_Net_10-153-30 255.255.255.0 network-object ASCN_Net_10-153-31 255.255.255.0 network-object ASCN_Net_10-153-32 255.255.255.0 network-object ASCN_Net_10-153-33 255.255.255.0 network-object ASCN_Net_10-153-34 255.255.255.0 network-object 10.153.36.0 255.255.255.0 network-object 10.153.37.0 255.255.255.0 network-object 10.153.38.0 255.255.255.0 network-object 10.153.39.0 255.255.255.0 network-object 10.153.46.0 255.255.255.0 network-object Ascott_PH_SMM 255.255.255.0 network-object Ascott_PH_SOM 255.255.255.0 network-object Ascott_PH_SSM 255.255.255.0 network-object ASJP_Net_118 255.255.255.0 network-object ASJP_Net_119 255.255.255.0 object-group network CLG001_CLG101 network-object host CLG001 network-object host CLG101 object-group network CL_Network network-object TMP_CG_subnet 255.255.255.192 network-object TMP_AS_Subnet 255.255.255.240 network-object TMP_A2_Subnet 255.255.255.240 network-object TMP_CM_Subnet 255.255.255.240 network-object TMP_RS_Subnet 255.255.255.240 network-object TMP_SZ_Subnet 255.255.255.240 network-object TMP_SZ1_Subnet 255.255.255.192 network-object TMP_SZ2 255.255.255.240 network-object STA_AS_Subnet 255.255.255.192 network-object CCL_AS_Subnet 255.255.255.192 network-object DCB_AS_Subnet 255.255.255.0 network-object DCB_CM_Subnet 255.255.255.0 network-object DCB_CP_Subnet 255.255.255.0 network-object ITC_NW_subnet 255.255.255.0 network-object WOR_DC_Subnet 255.255.255.0 network-object CSR_CL_subnet 255.255.255.0 network-object CSR_CG_Subnet 255.255.255.0 network-object VLAN252 255.255.255.0 network-object MGT_DC_Subnet 255.255.255.0 network-object ENR_DC 255.255.255.240 network-object Corp_BU_Net 255.255.248.0 network-object Ascott_BU_Net 255.255.0.0 network-object Comm_BU_Net 255.255.0.0 network-object Resi_BU_Net 255.255.0.0 network-object Raffles_BU_Net 255.255.0.0 network-object IPQ_Subnet 255.255.255.0 network-object PIXVPN 255.255.255.0 network-object Pri_Svr_Zone 255.255.255.0 network-object Security_Ctrl_Zone 255.255.255.0 network-object DMZ 255.255.255.192 network-object EMC_DC 255.255.255.0 network-object Ascott_SG_Transit 255.255.255.0 network-object Corp_PIX_Outside_Net 255.255.255.0 network-object Core_Rtr_Zone 255.255.255.0 network-object VLAN888 255.255.255.192 network-object Buz_Partner 255.255.255.0 network-object DCB_RHL_Subnet 255.255.255.0 network-object 10.150.251.0 255.255.255.240 network-object 10.150.251.16 255.255.255.240 network-object ILO_Net 255.255.0.0 network-object VLAN888 255.255.255.248 object-group network CL_CHN_VPN network-object Net_10_156_120_0 255.255.255.0 network-object Net_10_156_121_0 255.255.255.0 network-object Net_10_156_122_0 255.255.255.0 network-object 10.156.129.0 255.255.255.0 network-object Net-10-156-131-0_0-32 255.255.255.0 network-object Net_10_156_132_0 255.255.255.0 network-object Net_10_156_133_0 255.255.255.0 network-object Net_10_156_139_0 255.255.255.0 object-group network CHN_Oracle_Printing description China hosts require printing from Oracle. network-object host Ascott_CHN_35_12 network-object host Ascott_CHN_35_50 network-object host Ascott_CHN_35_51 network-object host Ascott_CHN_38_12 network-object host Ascott_CHN_38_50 network-object host Ascott_CHN_38_51 object-group network AS_Oversea_Networks description Asocott Oversea Networks network-object 10.153.35.0 255.255.255.0 network-object 10.153.36.0 255.255.252.0 network-object 10.153.40.0 255.255.255.0 network-object Ascott_Malaysia 255.255.255.0 network-object 10.153.50.0 255.255.255.0 network-object 10.153.51.0 255.255.255.0 network-object 10.153.52.0 255.255.255.0 network-object 10.153.53.0 255.255.255.0 network-object 10.153.54.0 255.255.255.0 network-object Ascot_Korea 255.255.255.0 network-object 10.153.71.0 255.255.255.0 network-object 10.153.72.0 255.255.255.0 network-object 10.153.73.0 255.255.255.0 network-object 10.153.74.0 255.255.255.0 network-object ASTL_NET_10-153-75 255.255.255.0 network-object Ascott_Dubai 255.255.255.0 network-object 10.153.138.0 255.255.254.0 network-object 10.153.140.0 255.255.252.0 network-object 10.153.144.0 255.255.248.0 network-object ASCN_Net_10-153-32 255.255.255.0 network-object ASCN_Net_10-153-33 255.255.255.0 network-object ASCN_Net_10-153-34 255.255.255.0 network-object ASCN_Net_10-153-30 255.255.255.0 network-object ASCN_Net_10-153-31 255.255.255.0 network-object ASJP_Net_118 255.255.255.0 network-object ASJP_Net_119 255.255.255.0 object-group network TT_Control_Hosts description Control Hosts in Temasek Tower network-object host Control_DT_101 network-object host Control_DT_102 network-object host Control_DT_103 network-object host Control_DT_104 network-object host Control_DT_105 object-group network TMP_SZ2_Anti_Spoofing network-object TMP_SZ2 255.255.255.240 object-group network CCL_Retail_99_Hosts network-object host host10_154_32_99 network-object host host10_154_33_99 network-object host host10_154_34_99 network-object host 10.154.35.99 network-object host host10_154_36_99 network-object host host10_154_37_99 network-object host 10.154.38.99 network-object host host10_154_39_99 network-object host host10_154_40_99 network-object host 10.154.41.99 network-object host 10.154.50.99 network-object host 10.154.51.99 network-object host 10.154.52.99 object-group network TMP_SZ2_Servers_Group network-object host ArchivalTest network-object host DUALITY network-object host Tessek_ object-group network Mark_SQL_Managed_Servers network-object host Bigatom network-object host CCL_Bishop network-object host Dazzler network-object host Falleen network-object host Sagoro network-object host Sicrus_Server network-object host IMS_Database_Srv object-group network Mark_Mng_Rafles_SQL network-object host Sinc1svrpsn1 network-object host Sinc1svrsun1 object-group network Traffic_Counts_System network-object host Junct8_traffic_count network-object host Lot1_Traffic_Count object-group network FootFall_SNMP_Servers network-object host 62.13.128.25 network-object host FootFall_Svr2 object-group network New_AS_CN_Nets network-object ASCN_Net_10-153-30 255.255.255.0 network-object ASCN_Net_10-153-31 255.255.255.0 network-object ASCN_Net_10-153-32 255.255.255.0 network-object ASCN_Net_10-153-33 255.255.255.0 network-object ASCN_Net_10-153-34 255.255.255.0 object-group network AS_CN_FileServers network-object host AS_CN_FileServer1 network-object host AS_CN_FileServer2 network-object host 10.153.33.12 network-object host AS_CN_FileServer5 network-object host 10.153.32.12 object-group network SGcalypso3-4 network-object SGCalypso3 255.255.255.254 network-object host SGCalypso4 object-group service Netware_Services tcp port-object eq 427 port-object eq 524 port-object eq www port-object eq netbios-ssn port-object eq 445 object-group service LDAP_Services tcp port-object eq ldap port-object eq ldaps object-group network Intranet_Webservers network-object host Sicrus_Server network-object host Neucleus1 network-object host Yavin network-object host Orome object-group network CCL_Retail_Nets_Mgp network-object 10.154.33.0 255.255.255.0 network-object 10.154.34.0 255.255.255.0 network-object 10.154.35.0 255.255.255.0 network-object 10.154.36.0 255.255.255.0 network-object 10.154.37.0 255.255.255.0 network-object 10.154.39.0 255.255.255.0 network-object 10.154.40.0 255.255.255.0 network-object 10.154.41.0 255.255.255.0 network-object 10.154.49.0 255.255.255.0 network-object 10.154.50.0 255.255.255.0 network-object 10.154.51.0 255.255.255.0 network-object 10.154.52.0 255.255.255.0 network-object 10.154.38.0 255.255.255.0 network-object 10.154.65.0 255.255.255.0 network-object 10.154.53.0 255.255.255.0 network-object 10.154.54.0 255.255.255.0 network-object 10.154.8.0 255.255.255.0 network-object 10.154.11.0 255.255.255.0 network-object Funan 255.255.255.0 object-group network CCL_Retail_Stagging_Hosts_Mgp network-object Funan 255.255.240.0 network-object 10.154.33.0 255.255.255.0 network-object 10.154.34.0 255.255.255.0 network-object 10.154.35.0 255.255.255.0 network-object 10.154.36.0 255.255.255.0 network-object 10.154.37.0 255.255.255.0 network-object 10.154.38.0 255.255.255.0 network-object 10.154.39.0 255.255.255.0 network-object 10.154.40.0 255.255.255.0 network-object 10.154.41.0 255.255.255.0 network-object 10.154.49.0 255.255.255.0 network-object 10.154.50.0 255.255.255.0 network-object 10.154.51.0 255.255.255.0 network-object 10.154.52.0 255.255.255.0 network-object 10.154.53.0 255.255.255.0 network-object 10.154.54.0 255.255.255.0 network-object 10.154.8.0 255.255.255.0 network-object 10.154.11.0 255.255.255.0 object-group network CCL_Retail_Telnet_Hosts_Mgp network-object host host10_154_32_99 network-object host host10_154_33_99 network-object host host10_154_34_99 network-object host 10.154.35.99 network-object host host10_154_36_99 network-object host host10_154_37_99 network-object host 10.154.38.99 network-object host host10_154_39_99 network-object host host10_154_40_99 network-object host 10.154.41.99 network-object host 10.154.49.99 network-object host 10.154.50.99 network-object host 10.154.51.99 network-object host 10.154.52.99 network-object host host10_154_53_99 network-object host host10_154_54_99 network-object host 10.154.8.99 network-object host 10.154.11.99 object-group network CCL_Retail_GWs network-object host Retail_Net_GW32_1 network-object host Retail_Net_GW33_1 network-object host Retail_Net_GW34_1 network-object host Retail_Net_GW35_1 network-object host Retail_Net_GW36_1 network-object host Retail_Net_GW37_1 network-object host 10.154.38.1 network-object host Retail_Net_GW39_1 network-object host Retail_Net_GW40_1 network-object host Retail_Net_GW41_1 network-object host Retail_Net_GW49_1 network-object host Retail_Net_GW50_1 network-object host Retail_Net_GW51_1 network-object host Retail_Net_GW52_1 network-object host Retail_Net_GW53_1 network-object host Retail_Net_GW54_1 network-object host 10.154.8.1 network-object host 10.154.11.1 object-group network Ascott_Exchange_Servers network-object host AscottExchange1 network-object host AscottExchange2 network-object host AscottExchange3 object-group network RP_Bloomberg_PCs network-object host 10.154.4.61 network-object host 10.154.4.12 object-group network Bloomberg_Severs network-object 160.43.250.0 255.255.255.0 network-object 206.156.53.0 255.255.255.0 network-object 205.216.112.0 255.255.255.0 network-object 208.22.56.0 255.255.255.0 network-object 208.22.57.0 255.255.255.0 network-object 69.191.192.0 255.255.192.0 object-group service RP_Bloomberg tcp port-object range 8290 8294 port-object range 8194 8198 port-object range 8209 8220 object-group service Titania_SCRS1746 tcp port-object eq smtp port-object eq 5252 port-object eq 135 port-object eq www object-group network Ascott_CN_76_85 description Ascott China New Networks network-object Ascott_CN_76_79 255.255.252.0 network-object Ascott_PH_SMM 255.255.255.0 network-object Ascott_CN_84_85 255.255.254.0 object-group network CL_CHN_NewNet network-object Net_10_156_120_0 255.255.255.0 network-object Net_10_156_121_0 255.255.255.0 network-object Net_10_156_122_0 255.255.255.0 object-group network AS_CN_Net-30-40 network-object ASCN_Net_10-153-30 255.255.254.0 network-object ASCN_Net_10-153-32 255.255.248.0 network-object 10.153.40.0 255.255.255.0 object-group network Ascott_CHN_Oracle_IPs network-object 10.153.30.64 255.255.255.240 network-object 10.153.31.64 255.255.255.240 network-object 10.153.32.64 255.255.255.240 network-object 10.153.33.64 255.255.255.240 network-object 10.153.34.64 255.255.255.240 network-object 10.153.35.64 255.255.255.240 network-object 10.153.36.64 255.255.255.240 network-object 10.153.37.64 255.255.255.240 network-object Ascott_CHN_DC 255.255.255.240 network-object 10.153.39.64 255.255.255.240 network-object 10.153.40.64 255.255.255.240 object-group network STMS_RCH_Access network-object host CLG001 network-object host CLG101 network-object host 10.200.5.9 network-object host 10.200.5.10 network-object host 10.200.3.8 object-group service telnet_ssh tcp port-object eq telnet port-object eq ssh object-group network Ascott_TT_DC_Admin network-object host Ascott_TT_Host_42 network-object host Ascott_TT_Host_43 network-object host Ascott_TT_Host_47 object-group network Ascott_TT_Oracle_Team network-object host 10.153.1.78 network-object host 10.153.1.79 network-object 10.153.1.80 255.255.255.248 network-object host 10.153.1.81 network-object host 10.153.1.82 network-object host 10.153.1.83 network-object host 10.153.1.84 object-group network ASML_45_64-79 network-object host ASML_45_65-78 network-object host ASML_Host_45_79 network-object host 10.153.45.65 network-object host 10.153.45.66 network-object host 10.153.45.67 network-object host 10.153.45.68 network-object host 10.153.45.69 network-object host 10.153.45.70 network-object host 10.153.45.71 network-object host 10.153.45.72 network-object host 10.153.45.73 network-object host 10.153.45.74 network-object host 10.153.45.75 network-object host 10.153.45.76 network-object host 10.153.45.77 network-object host 10.153.45.78 object-group network ASML_46_64-79 network-object host ASML_46_65-78 network-object host ASML_Host_46_79 network-object host 10.153.46.65 network-object host 10.153.46.66 network-object host 10.153.46.67 network-object host 10.153.46.68 network-object host 10.153.46.69 network-object host 10.153.46.70 network-object host 10.153.46.71 network-object host 10.153.46.72 network-object host 10.153.46.73 network-object host 10.153.46.74 network-object host 10.153.46.75 network-object host 10.153.46.76 network-object host 10.153.46.77 network-object host 10.153.46.78 object-group network RHL_Bloombergs_Sites_01 network-object 160.43.250.0 255.255.255.0 network-object 206.156.53.0 255.255.255.0 network-object 205.216.112.0 255.255.255.0 object-group network RHL_Bloombergs_Sites02 network-object 208.22.56.0 255.255.255.0 network-object 208.22.57.0 255.255.255.0 network-object 69.191.192.0 255.255.255.0 object-group service RHL_Bloombergs_Svrc_01 tcp port-object range 8290 8294 port-object range 8194 8198 port-object range 8209 8220 object-group service RHL_Bloombergs_Svrs_02 tcp port-object range 48129 48137 object-group network Aventail_VPN_DHCP_Pool network-object Secura_VPN_Pool2 255.255.255.0 network-object Secura_VPN_Pool1 255.255.255.0 object-group network FTP_Access_To_ManWe description Servers require FTP access to ManWe network-object DMZ 255.255.255.192 network-object Buz_Partner 255.255.255.0 network-object Security_Ctrl_Zone 255.255.255.0 object-group network DCB_RHL_Anti_Spoofing network-object DCB_RHL_Subnet 255.255.255.0 object-group network SarApps_Svrs network-object host SarDBVirt network-object host SarCIAPPSVirt network-object host SarDBCIVirt network-object host Sarlac1 network-object host Sarlac2 object-group service SAP_Apps_Ports tcp port-object range 3600 3603 port-object range 3300 3303 port-object range 3200 3203 object-group network SAP_Clients network-object Corp_BU_Net 255.255.248.0 network-object Comm_BU_Net 255.255.248.0 network-object Resi_BU_Net 255.255.0.0 object-group network SAP_Developer network-object host 10.156.202.103 network-object host 10.156.202.104 network-object host 10.156.202.105 network-object host 10.156.202.106 network-object host 10.156.202.107 object-group network VPN_Aventail_Box network-object host VPN_Aventail network-object host VPN_Aventail2 object-group service Susie_VPN_Ports tcp port-object eq 3389 port-object eq www port-object eq https object-group service SAP_Apps_Port tcp description SAP Application Services port-object range 3600 3603 port-object range 3200 3203 port-object eq lpd port-object range 3299 3303 object-group service FootFall_Monitoring tcp-udp port-object range 45 45 port-object range 135 139 object-group network SAP_PhySvr_Group network-object host Sarlac1 network-object host 10.150.210.107 network-object host SarDBVirt network-object host Sarlac2 network-object host 10.150.210.110 network-object host SarCIAPPSVirt network-object host SarDBCIVirt object-group network Elixir_Cosmo network-object host Elixir network-object host Cosmo object-group network CCT_Properties network-object 10.154.49.0 255.255.255.0 network-object 10.154.50.0 255.255.255.0 network-object 10.154.51.0 255.255.255.0 network-object 10.154.52.0 255.255.255.0 network-object 10.154.63.0 255.255.255.0 network-object 10.154.15.0 255.255.255.0 object-group network CCT_CRTL_Properties network-object 10.154.49.0 255.255.255.0 network-object 10.154.50.0 255.255.255.0 network-object 10.154.51.0 255.255.255.0 network-object 10.154.52.0 255.255.255.0 network-object 10.154.63.0 255.255.255.0 network-object 10.154.15.0 255.255.255.0 network-object Funan 255.255.240.0 object-group service SAP_NFS_Services tcp-udp port-object range sunrpc sunrpc port-object range 2049 2049 port-object range 1110 1110 object-group network CCL_VIP_VPN network-object 10.150.179.0 255.255.255.248 network-object Susie_Home_VPN 255.255.255.0 object-group service Unicenter_RC2 udp port-object eq 4104 port-object eq 800 object-group service Unicenter_SD2 udp port-object eq 4725 object-group network CCL_VIP_VPN_Stagging network-object host 10.150.179.2 object-group network NET_RHL_TEST network-object 10.155.128.0 255.255.255.0 object-group network RHL_Citrix_Servers network-object host Callista network-object host Alavar object-group service RHL_Services_TCP tcp port-object eq 1433 port-object eq 2513 port-object eq citrix-ica port-object eq ssh port-object eq https object-group service RHL_Services_UDP udp port-object eq 1604 object-group network CCL_VIP_VPN_Routers network-object host 10.150.179.1 object-group service Anakin_ports tcp description SCRS 2947 port-object eq lotusnotes port-object range 1200 1215 port-object eq www object-group network SAELT1_SAELT2 network-object host Saelt1 network-object host Saelt2 object-group network IMM_HarbourF_Link description IMM & Harbour Front Links network-object 10.154.8.0 255.255.255.0 network-object 10.154.11.0 255.255.255.0 object-group network RHL_Svr network-object host 10.155.0.2 network-object host RHLSVRNOM1 object-group service Servicedesk_client tcp-udp port-object range 1494 1494 port-object range 2100 2200 port-object range 2365 2365 port-object range 1433 1433 object-group network Ascott_Phillipine description Ascott Phillipine Network network-object Ascott_PH_SMM 255.255.255.0 network-object Ascott_PH_SOM 255.255.255.0 network-object Ascott_PH_SSM 255.255.255.0 object-group network Ascott_PH_Finance_Clients description Ascott Phillipine Finance Team network-object host PH_SMM_64-78 network-object PH_SMM_64-78 255.255.255.240 network-object host PH_SMM_79 network-object host PH_SOM_64-78 network-object host PH_SOM_79 network-object host PH_SSM_64-78 network-object PH_SOM_64-78 255.255.255.240 network-object PH_SSM_64-78 255.255.255.240 network-object host PH_SSM_79 object-group service Netbios_TCP tcp port-object eq netbios-ssn port-object eq 137 port-object eq 445 object-group service Netbios_UDP udp port-object eq netbios-dgm port-object eq netbios-ns object-group network SAP_Training_Group network-object host Control_DC_110 network-object host Control_PC_TT_111 network-object host Control_PC_TT_112 network-object host Control_PC_TT_113 network-object host Control_PC_TT_114 network-object host Control_PC_TT_115 object-group service TCP135_TCP5000 tcp port-object eq 5000 port-object eq 135 object-group network BU_SAP_Client network-object Corp_BU_Net 255.255.248.0 network-object Comm_BU_Net 255.255.248.0 network-object Resi_BU_Net 255.255.0.0 object-group service SAP_Client_Services tcp port-object eq 990 port-object range 3000 3099 port-object range ftp-data ftp object-group network AS_TT_H40-H50 network-object AScott_Admin_TT 255.255.255.248 network-object host 10.153.1.41 network-object Ascott_TT_Host_42 255.255.255.254 network-object host Ascott_TT_Host_43 network-object host Ascott_TT_Host_44 network-object host Ascott_H3 network-object host Ascott_TT_Host_47 network-object host 10.153.1.48 network-object host 10.153.1.49 network-object host Ascott_TT_Host_46 network-object host 10.153.1.50 object-group network Omniback_Svrs network-object host 10.150.200.73 network-object host Muftakia object-group network TesseK_denga_Sarlacc1_2 network-object host Tessek_ network-object host Dengar network-object host SarDBVirt object-group network ILO_DC_Anti_Spoofing network-object ILO_Net 255.255.0.0 object-group service PabloJill_Services tcp port-object eq https port-object eq 990 port-object range 1800 1810 port-object range ftp-data ftp port-object range 3000 3099 object-group network MSN_Yahoo_Messenger network-object host MSN_Messenger network-object host eMessenger_net network-object host Yahoo_Messenger object-group service Novel_Imonitor tcp port-object range https https port-object range 8009 8009 object-group service Control_Services tcp port-object range https https port-object range telnet telnet port-object range ssh ssh port-object range www www object-group network AS_AE_NET_64-79 network-object host AS_NET_120_64 network-object host AS_AE_120_65 network-object host AS_AE_120_66 network-object host AS_AE_120_67 network-object host AS_AE_120_68 network-object host AS_AE_120_69 network-object host AS_AE_120_70 network-object host AS_AE_120_71 network-object host AS_AE_120_72 network-object host AS_AE_120_73 network-object host AS_AE_120_74 network-object host AS_AE_120_75 network-object host AS_AE_120_76 network-object host AS_AE_120_77 network-object host AS_AE_120_78 network-object host AS_AE_120_79 object-group network AS_Dot_NET_TT-Admin description Ascott TT .Net Admin network-object host Ascott_TT_Host_42 network-object host Ascott_TT_Host_43 network-object host Ascott_TT_Host_44 network-object host Ascott_TT_Host_46 network-object host Ascott_TT_Host_47 object-group network AS_Dot_NET_LC-Admin network-object host Jason_PC network-object host Ascott_Host_2-43 network-object host Blandine_PC network-object host Ascott_H2 network-object host Thomas_PC object-group network CL_SBUs_2006 network-object Corp_BU_Net 255.255.248.0 network-object Comm_BU_Net 255.255.0.0 network-object Resi_BU_Net 255.255.0.0 network-object Ascott_BU_Net 255.255.0.0 network-object Net_RHL 255.255.254.0 object-group service BrightStor_Agent tcp port-object eq 6502 port-object range 7330 7340 port-object eq sunrpc port-object range 9001 9003 port-object eq 9006 port-object eq 9008 port-object eq 14500 port-object eq 14508 port-object range 26553 26558 object-group network AS_LC_H40-H50 network-object AS_SG_Admin 255.255.255.248 network-object host Ascott_H1 network-object host 10.153.2.49 network-object host 10.153.2.50 object-group network SQLVenus_Group network-object host SGVenus1 network-object host SGvenus2 network-object host SQLvenus network-object host SGVenus object-group network SGmars1-2 network-object host SGMars1 network-object host SGMars2 object-group network Share_Investor.com network-object host SIS_Server1 network-object host SIS_Server2 network-object host SIS_Server3 object-group service MS_Exchange_Ports tcp port-object eq 135 port-object eq 445 port-object eq 1026 object-group network Redi_TT_FujiXerox_Printers network-object host Resi_Host_2-201 network-object host Resi_Host_2-202 network-object host Resi_Host_2-204 network-object host Resi_Host_2-221 network-object host Resi_Host_2-223 network-object host Resi_Host_2-224 network-object host Resi_Host_2-226 object-group network AS_JP_Nets network-object ASJP_Net_118 255.255.255.0 network-object ASJP_Net_119 255.255.255.0 object-group network AS_TT_78-83 network-object host 10.153.1.78 network-object host 10.153.1.79 network-object 10.153.1.80 255.255.255.248 network-object host 10.153.1.81 network-object host 10.153.1.82 network-object host 10.153.1.83 object-group network AS_JP_Nets_64-79 network-object 10.153.118.64 255.255.255.240 network-object 10.153.119.64 255.255.255.240 object-group network CL_SMTP_Printers network-object host Corp_Host_120-63 network-object host Corp_Host_120-70 network-object host 10.150.120.67 network-object host Corp_Host_120-73 network-object host FujiXerox405_CT network-object host Corp_Host_120-77 network-object host 10.150.120.29 object-group network Bloomberg_Global_Sites network-object 160.43.0.0 255.255.255.0 network-object 206.156.53.0 255.255.255.0 network-object 208.22.56.0 255.255.255.0 network-object 208.22.57.0 255.255.255.0 network-object 202.216.112.0 255.255.255.0 object-group network Equinix_Notes_CA_Svrs network-object host host10_200_5_3 network-object host host10_200_5_6 object-group network CTRL_104-MRTG_Devices network-object host 172.22.22.1 network-object host 172.22.22.2 network-object host 10.156.32.18 network-object host 10.156.32.19 network-object host 10.154.1.4 network-object host 10.154.1.5 network-object host 10.153.1.3 network-object host 10.157.100.1 object-group network Aventail_GRP network-object host VPN_Aventail network-object host VPN_Aventail2 network-object Secura_VPN_Pool1 255.255.255.0 network-object Secura_VPN_Pool2 255.255.255.0 object-group network HP_ICMP_Monitoring_Hosts network-object host HP_Pri_OVO_MgtSvr network-object host HP_Sec_OVO_MgtSvr network-object host HPMon3 object-group network Resi_Clients network-object host 10.156.10.210 network-object host 10.156.10.211 network-object host 10.156.9.87 object-group network China_Servers network-object host 10.156.129.88 network-object host 10.156.129.77 object-group network Equinix_CA_Notes_Svrs network-object host host10_200_5_3 network-object host host10_200_5_6 object-group network RP_VIP_Internet_Access network-object host host10_61_12_6 network-object host host10_61_12_44 network-object host host10_61_12_49 network-object host host10_61_12_50 network-object host RP_Martin_Tan network-object host RP_Zalina network-object host 10.61.12.62 access-list deny-flow-max 4096 access-list alert-interval 300 access-list CFV_DC_acl extended deny ip host Raffles_FW2 host Raffles_FW1 log access-list CFV_DC_acl extended deny ip host Raffles_FW2 any access-list CFV_DC_acl extended deny ip host Monitor-PC any access-list CFV_DC_acl extended deny ip host Phoenix any access-list CFV_DC_acl extended deny ip 192.170.75.0 255.255.255.0 any access-list CFV_DC_acl extended permit icmp host Retail_Net_GW50_1 any access-list CFV_DC_acl extended permit tcp host Retail_Net_GW50_1 any access-list CFV_DC_acl extended permit udp host 172.16.65.8 Raffles_BU_Net 255.255.252.0 eq www access-list CFV_DC_acl extended permit udp host 10.154.177.4 host 10.156.202.220 eq syslog access-list CFV_DC_acl extended permit icmp 10.154.128.0 255.255.255.0 TMP_CG_subnet 255.255.255.192 access-list CFV_DC_acl extended permit udp host Nobelie host 10.150.205.5 eq ntp access-list CFV_DC_acl extended permit udp host Nobelie host 10.150.205.6 eq ntp access-list CFV_DC_acl extended permit udp host Nobelie host GALA eq syslog access-list CFV_DC_acl remark SCRS 2442 access-list CFV_DC_acl extended permit tcp 10.154.128.0 255.255.255.0 host Yavin object-group HTTP_HTTPS access-list CFV_DC_acl remark SCRS 2442 access-list CFV_DC_acl extended permit tcp 10.154.128.0 255.255.255.0 host Arien eq www access-list CFV_DC_acl remark SCRS 2442 access-list CFV_DC_acl extended permit tcp 10.154.128.0 255.255.255.0 host Arien eq 524 access-list CFV_DC_acl remark SCRS 2442 access-list CFV_DC_acl extended permit tcp 10.154.128.0 255.255.255.0 host Arien eq 51080 access-list CFV_DC_acl remark SCRS 2442 access-list CFV_DC_acl extended permit tcp 10.154.128.0 255.255.255.0 host Orome eq www access-list CFV_DC_acl remark SCRS 2442 access-list CFV_DC_acl extended permit tcp 10.154.128.0 255.255.255.0 object-group Equinix_Notes_CA_Svrs eq lotusnotes access-list CFV_DC_acl extended permit tcp host 202.79.215.195 host WibroAX object-group HTTP_HTTPS access-list CFV_DC_acl extended permit udp object-group AS_JP_Nets_64-79 object-group SGTitanX-SGOrionX object-group Netbios_UDP access-list CFV_DC_acl extended permit tcp object-group AS_JP_Nets_64-79 object-group SGTitanX-SGOrionX object-group Netbios_TCP access-list CFV_DC_acl extended permit tcp host VPN_Aventail host WibroAX object-group HTTP_HTTPS access-list CFV_DC_acl extended permit tcp object-group Aventail_VPN_DHCP_Pool host WibroAX object-group HTTP_HTTPS access-list CFV_DC_acl extended permit tcp object-group AS_JP_Nets object-group SGCalypso01-08 object-group HTTP_HTTPS access-list CFV_DC_acl extended permit tcp 10.153.2.0 255.255.255.0 host SGSun object-group HTTP_HTTPS access-list CFV_DC_acl extended permit tcp Ascott_BU_Net 255.255.0.0 object-group SQLVenus_Group eq 1433 access-list CFV_DC_acl extended permit tcp Ascott_BU_Net 255.255.0.0 host SGSun object-group HTTP_HTTPS access-list CFV_DC_acl extended permit tcp Ascott_BU_Net 255.255.0.0 object-group SGmars1-2 object-group HTTP_HTTPS access-list CFV_DC_acl extended permit ip object-group AS_LC_H40-H50 object-group SQLVenus_Group access-list CFV_DC_acl extended permit tcp 10.153.2.0 255.255.255.0 object-group SQLVenus_Group object-group HTTP_HTTPS access-list CFV_DC_acl extended permit tcp 10.153.2.0 255.255.255.0 object-group SGmars1-2 object-group HTTP_HTTPS access-list CFV_DC_acl extended permit tcp object-group AS_LC_H40-H50 object-group SGmars1-2 eq pcanywhere-data access-list CFV_DC_acl extended permit udp object-group AS_LC_H40-H50 object-group SGmars1-2 eq pcanywhere-status access-list CFV_DC_acl extended permit tcp object-group AS_LC_H40-H50 object-group SQLVenus_Group eq pcanywhere-data access-list CFV_DC_acl extended permit udp object-group AS_LC_H40-H50 object-group SQLVenus_Group eq pcanywhere-status access-list CFV_DC_acl extended permit udp object-group AS_LC_H40-H50 object-group SQLVenus_Group eq 1434 access-list CFV_DC_acl extended permit tcp object-group AS_LC_H40-H50 object-group SQLVenus_Group eq 1433 access-list CFV_DC_acl extended permit tcp object-group AS_LC_H40-H50 host SGSun eq pcanywhere-data access-list CFV_DC_acl extended permit udp object-group AS_LC_H40-H50 host SGSun eq pcanywhere-status access-list CFV_DC_acl remark SCRS 2312 access-list CFV_DC_acl extended permit tcp object-group AS_Dot_NET_LC-Admin object-group SGCalypso3-8 eq www access-list CFV_DC_acl remark SCRS 2312 access-list CFV_DC_acl extended permit tcp object-group AS_Dot_NET_LC-Admin object-group SGCalypsoX eq www access-list CFV_DC_acl extended permit tcp host 10.61.12.95 host Trendmicro eq www access-list CFV_DC_acl extended permit icmp object-group CCL_VIP_VPN ControlPC1 255.255.255.252 access-list CFV_DC_acl extended permit tcp Secura_VPN_Pool2 255.255.255.0 host Cosmo_ object-group HTTP_HTTPS access-list CFV_DC_acl extended permit tcp Secura_VPN_Pool2 255.255.255.0 host Elixir object-group HTTP_HTTPS access-list CFV_DC_acl extended permit tcp host VPN_Aventail2 host Elixir object-group HTTP_HTTPS access-list CFV_DC_acl extended permit tcp host VPN_Aventail2 host Cosmo_ object-group HTTP_HTTPS access-list CFV_DC_acl extended permit tcp Buz_Partner 255.255.255.0 object-group Omniback_Svrs object-group Omniback_Ports access-list CFV_DC_acl extended permit tcp Security_Ctrl_Zone 255.255.255.0 object-group Omniback_Svrs object-group Omniback_Ports access-list CFV_DC_acl remark SCRS 2180 access-list CFV_DC_acl extended permit tcp host Ascott_H4 host Neucleus1 eq https access-list CFV_DC_acl remark SCRS 2180 access-list CFV_DC_acl extended permit tcp host Ascott_H1 host Neucleus1 eq https access-list CFV_DC_acl extended permit udp object-group CCL_VIP_VPN host Marlex eq 4104 access-list CFV_DC_acl extended permit tcp object-group CCL_VIP_VPN host Marlex eq 4105 access-list CFV_DC_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Marlex eq 4105 access-list CFV_DC_acl extended permit udp Comm_BU_Net 255.255.0.0 host Marlex eq 4104 access-list CFV_DC_acl extended permit icmp AS_Paris_Net 255.255.255.0 object-group SGDeimosX access-list CFV_DC_acl extended permit tcp host AS_Paris_Citrix object-group AS_TT_H40-H50 object-group Netbios_TCP access-list CFV_DC_acl extended permit udp host AS_Paris_Citrix object-group AS_TT_H40-H50 object-group Netbios_UDP access-list CFV_DC_acl extended permit udp AS_Paris_Net 255.255.255.0 object-group SGCalypso01-08 object-group AS_CitrixNetbiso_UDP access-list CFV_DC_acl extended permit tcp AS_Paris_Net 255.255.255.0 object-group SGCalypso01-08 object-group AS_CitrixNetbios_TCP access-list CFV_DC_acl extended permit icmp object-group Ascott_Phillipine object-group SGDeimosX access-list CFV_DC_acl extended permit tcp host VPN_Aventail host Prospero object-group HTTP_HTTPS access-list CFV_DC_acl extended permit tcp object-group Aventail_VPN_DHCP_Pool host Prospero object-group HTTP_HTTPS access-list CFV_DC_acl extended permit tcp Net-10-156-131-0_0-32 255.255.255.224 host host10_156_2_19 object-group HTTP_HTTPS access-list CFV_DC_acl extended permit tcp object-group Ascott_Phillipine object-group DPRCalypsoX eq https access-list CFV_DC_acl extended permit tcp object-group Ascott_Phillipine object-group DPRCalypsoX eq 8000 access-list CFV_DC_acl extended permit tcp object-group Ascott_Phillipine object-group DPRCalypsoX object-group NetbiosTcpIP access-list CFV_DC_acl extended permit udp object-group Ascott_Phillipine object-group DPRCalypsoX object-group NetbiosTcpIP access-list CFV_DC_acl extended permit tcp object-group Ascott_Phillipine object-group DPRCalypsoX object-group Citrix_Svcs access-list CFV_DC_acl extended permit tcp object-group Ascott_Phillipine object-group SGCalypsoX object-group Citrix_Svcs access-list CFV_DC_acl extended permit tcp object-group Ascott_Phillipine object-group SGCalypso3-8 object-group Citrix_Svcs access-list CFV_DC_acl extended permit tcp object-group Ascott_Phillipine object-group SGCalypsoX object-group NetbiosTcpIP access-list CFV_DC_acl extended permit tcp object-group Ascott_Phillipine object-group SGCalypso3-8 object-group NetbiosTcpIP access-list CFV_DC_acl extended permit tcp object-group Ascott_PH_Finance_Clients object-group SGTitanX object-group NetbiosTcpIP access-list CFV_DC_acl extended permit tcp object-group Ascott_PH_Finance_Clients object-group SGOrionX object-group NetbiosTcpIP access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl extended permit tcp object-group Ascott_Phillipine object-group SGDeimosX eq 50000 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl extended permit tcp host 10.153.80.11 object-group SGDeimosX eq 5000 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl extended permit tcp object-group Ascott_Phillipine host Ascott_SQL_VIP eq 1433 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl extended permit tcp object-group Ascott_Phillipine object-group SGDeimosX object-group AD_TCP_Services access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl extended permit udp object-group Ascott_Phillipine object-group SGDeimosX object-group AD_UDP_Services access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl extended permit tcp object-group Ascott_Phillipine object-group SGTitanX object-group AS_Oracle_Services access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl extended permit tcp object-group Ascott_Phillipine object-group SGOrionX object-group AS_Oracle_Services access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl extended permit tcp object-group Ascott_Phillipine host Ariel object-group MS-OLAP access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl extended permit tcp object-group Ascott_Phillipine host Prospero object-group HTTP_HTTPS access-list CFV_DC_acl extended permit tcp object-group Aventail_VPN_DHCP_Pool host CLNS01 eq 524 access-list CFV_DC_acl extended permit tcp host VPN_Aventail host Tessek eq 3200 access-list CFV_DC_acl extended permit tcp object-group CCL_VIP_VPN_Stagging host 10.156.202.199 eq pcanywhere-data access-list CFV_DC_acl extended permit udp object-group CCL_VIP_VPN_Stagging host 10.156.202.199 eq pcanywhere-status access-list CFV_DC_acl extended permit tcp host Sidaster object-group SAP_PhySvr_Group object-group SAP_Apps_Port access-list CFV_DC_acl extended permit tcp host Sidaster host Dengar object-group SAP_Apps_Port access-list CFV_DC_acl extended permit tcp host Sidaster host Tessek object-group SAP_Apps_Port access-list CFV_DC_acl extended permit tcp DMZ 255.255.255.192 object-group Omniback_Svrs object-group Omniback_Ports access-list CFV_DC_acl extended permit tcp DMZ 255.255.255.192 object-group Luthien_Galadriel object-group Omniback_Ports access-list CFV_DC_acl extended permit tcp object-group VPN_Aventail_Box object-group SarApps_Svrs object-group SAP_Apps_Port access-list CFV_DC_acl extended permit tcp object-group VPN_Aventail_Box host Dengar object-group SAP_Apps_Port access-list CFV_DC_acl extended permit tcp object-group VPN_Aventail_Box host Tessek object-group SAP_Apps_Port access-list CFV_DC_acl extended permit tcp object-group Aventail_VPN_DHCP_Pool object-group SarApps_Svrs object-group SAP_Apps_Port access-list CFV_DC_acl extended permit tcp object-group Aventail_VPN_DHCP_Pool host Dengar object-group SAP_Apps_Port access-list CFV_DC_acl extended permit tcp object-group Aventail_VPN_DHCP_Pool host Tessek object-group SAP_Apps_Port access-list CFV_DC_acl extended permit tcp object-group VPN_IP_Pools object-group SarApps_Svrs object-group SAP_Apps_Port access-list CFV_DC_acl extended permit tcp object-group VPN_IP_Pools host Dengar object-group SAP_Apps_Port access-list CFV_DC_acl extended permit tcp object-group VPN_IP_Pools host Tessek object-group SAP_Apps_Port access-list CFV_DC_acl extended permit udp host CLG_CN_DNS object-group Galadriel_Orome_Grp eq domain access-list CFV_DC_acl extended permit tcp host Jason_PC host 10.61.12.174 eq pcanywhere-data access-list CFV_DC_acl extended permit udp host Jason_PC host 10.61.12.174 eq pcanywhere-status access-list CFV_DC_acl extended permit udp object-group CCL_VIP_VPN_Stagging host Marlex object-group Unicenter_SD2 access-list CFV_DC_acl extended permit tcp object-group CCL_VIP_VPN_Stagging host Marlex object-group Unicenter_SD1_RC1 access-list CFV_DC_acl extended permit udp object-group CCL_VIP_VPN host Marlex object-group Unicenter_RC2 access-list CFV_DC_acl extended permit tcp object-group CCL_VIP_VPN host Marlex object-group Unicenter-RC1 access-list CFV_DC_acl extended permit tcp object-group CCL_VIP_VPN TMP_CG_subnet 255.255.255.0 eq www access-list CFV_DC_acl extended permit tcp object-group CCL_VIP_VPN host Arien object-group Ifolder access-list CFV_DC_acl extended permit tcp object-group CCL_VIP_VPN host Arien object-group HTTP_HTTPS access-list CFV_DC_acl extended permit tcp object-group CCL_VIP_VPN host Arien eq 524 access-list CFV_DC_acl extended permit tcp object-group CCL_VIP_VPN 10.200.0.0 255.254.0.0 eq lotusnotes access-list CFV_DC_acl remark FTP SERVICE TO MANWE. access-list CFV_DC_acl extended permit tcp object-group FTP_Access_To_ManWe host ManWe range ftp-data ftp access-list CFV_DC_acl extended permit tcp 10.153.46.0 255.255.255.0 object-group SGDeimosX object-group AD_TCP_Services access-list CFV_DC_acl extended permit udp 10.153.46.0 255.255.255.0 object-group SGDeimosX object-group AD_UDP_Services access-list CFV_DC_acl extended permit tcp 10.153.46.0 255.255.255.0 host Prospero object-group HTTP_HTTPS access-list CFV_DC_acl extended permit tcp Ascott_Malaysia 255.255.255.0 host Ariel object-group MS-OLAP access-list CFV_DC_acl extended permit tcp 10.153.46.0 255.255.255.0 host Ariel object-group MS-OLAP access-list CFV_DC_acl extended permit tcp 10.153.46.0 255.255.255.0 host Ascott_SQL_VIP eq 1433 access-list CFV_DC_acl extended permit tcp 10.153.46.0 255.255.255.0 object-group SGTitanX object-group AS_Oracle_Services access-list CFV_DC_acl extended permit tcp 10.153.46.0 255.255.255.0 object-group SGOrionX object-group AS_Oracle_Services access-list CFV_DC_acl extended permit tcp 10.153.46.0 255.255.255.0 object-group SGCalypsoX object-group Citrix_Svcs access-list CFV_DC_acl extended permit tcp 10.153.46.0 255.255.255.0 object-group SGCalypso3-8 object-group Citrix_Svcs access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl extended permit tcp 10.153.46.0 255.255.255.0 object-group SGCalypsoX object-group NetbiosTcpIP access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl extended permit tcp 10.153.46.0 255.255.255.0 object-group SGCalypso3-8 object-group NetbiosTcpIP access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl extended permit tcp 10.153.46.0 255.255.255.0 object-group DPRCalypsoX object-group Citrix_Svcs access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl extended permit tcp 10.153.46.0 255.255.255.0 object-group DPRCalypsoX eq https access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl extended permit tcp 10.153.46.0 255.255.255.0 object-group DPRCalypsoX eq 8000 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl extended permit tcp 10.153.46.0 255.255.255.0 object-group DPRCalypsoX object-group NetbiosTcpIP access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl extended permit tcp host 10.153.46.12 object-group SGCalypsoX object-group NetbiosTcpIP access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl extended permit tcp host 10.153.46.12 object-group SGCalypso3-8 object-group NetbiosTcpIP access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl extended permit tcp object-group ASML_45_64-79 object-group SGOrionX object-group NetbiosTcpIP access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl extended permit tcp object-group ASML_46_64-79 object-group SGOrionX object-group NetbiosTcpIP access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl extended permit tcp object-group ASML_45_64-79 object-group SGTitanX object-group NetbiosTcpIP access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl extended permit tcp object-group ASML_46_64-79 object-group SGTitanX object-group NetbiosTcpIP access-list CFV_DC_acl extended permit tcp host Ascott_CHN_H4 host DPRCalypso1 object-group Titania_SCRS1746 access-list CFV_DC_acl extended permit tcp object-group Ascott_CHN_Oracle_IPs object-group SGTitanX-SGOrionX object-group NetbiosTcp IP access-list CFV_DC_acl extended permit udp object-group Ascott_CHN_Oracle_IPs object-group SGTitanX-SGOrionX object-group NetbiosTcp IP access-list CFV_DC_acl extended permit tcp object-group CL_CHN_NewNet host Yavin eq www access-list CFV_DC_acl remark Request by Susie access-list CFV_DC_acl extended permit tcp object-group CL_CHN_NewNet host Yavin eq https access-list CFV_DC_acl remark Request by Susie access-list CFV_DC_acl extended permit tcp object-group CL_CHN_NewNet host Arien eq 51080 access-list CFV_DC_acl remark Request by Susie access-list CFV_DC_acl extended permit tcp object-group CL_CHN_NewNet host Orome eq www access-list CFV_DC_acl remark Request by Susie access-list CFV_DC_acl extended permit tcp object-group CL_CHN_NewNet host Orome eq lotusnotes access-list CFV_DC_acl remark Request by Susie access-list CFV_DC_acl remark Request by Susie access-list CFV_DC_acl extended permit tcp object-group CL_CHN_NewNet host Holocam eq www access-list CFV_DC_acl remark Request by Susie access-list CFV_DC_acl extended permit tcp object-group CL_CHN_NewNet host Holocam eq https access-list CFV_DC_acl extended permit tcp host Ascott_H1 host Prospero eq pcanywhere-data access-list CFV_DC_acl extended permit udp host Ascott_H1 host Prospero eq pcanywhere-status access-list CFV_DC_acl extended permit tcp host RHLSVRNOA1 object-group STMS_RCH_Access eq lotusnotes access-list CFV_DC_acl extended permit udp host PIX_VPN_Inside_int host 10.156.202.220 eq syslog access-list CFV_DC_acl remark SCRS 1634 Aventail VPN Pool access to Intranet Resources. access-list CFV_DC_acl extended permit udp object-group Aventail_VPN_DHCP_Pool object-group Internal_DNS eq domain access-list CFV_DC_acl remark SCRS 1634 Aventail VPN Pool access to Intranet Resources. access-list CFV_DC_acl extended permit tcp object-group Aventail_VPN_DHCP_Pool host Arien object-group Novell_TCP_Svcs access-list CFV_DC_acl extended permit tcp object-group Aventail_VPN_DHCP_Pool host Arien object-group Ifolder access-list CFV_DC_acl extended permit tcp object-group Aventail_VPN_DHCP_Pool host Arien object-group LDAP_Services access-list CFV_DC_acl extended permit tcp object-group Aventail_VPN_DHCP_Pool object-group Intranet_Webservers eq www access-list CFV_DC_acl extended permit tcp object-group Aventail_VPN_DHCP_Pool host Holocam eq https access-list CFV_DC_acl extended permit tcp object-group Aventail_VPN_DHCP_Pool host CLG001 eq lotusnotes access-list CFV_DC_acl extended permit tcp object-group Aventail_VPN_DHCP_Pool host CLG101 eq lotusnotes access-list CFV_DC_acl extended permit tcp object-group Aventail_VPN_DHCP_Pool host Maverick eq www access-list CFV_DC_acl extended permit tcp object-group Aventail_VPN_DHCP_Pool host Phoenix object-group Novell_TCP_Svcs access-list CFV_DC_acl remark SCRS 1643 new China NW setup access-list CFV_DC_acl extended permit tcp object-group New_AS_CN_Nets object-group SGTitanX-SGOrionX object-group AS_Oracle_Service s access-list CFV_DC_acl extended permit tcp object-group New_AS_CN_Nets object-group SGcalypso3-4 object-group AS_CitrixNetbios_TCP access-list CFV_DC_acl extended permit udp object-group New_AS_CN_Nets object-group SGcalypso3-4 object-group AS_CitrixNetbiso_UDP access-list CFV_DC_acl extended permit tcp object-group New_AS_CN_Nets host Prospero object-group HTTP_HTTPS access-list CFV_DC_acl extended permit tcp object-group New_AS_CN_Nets object-group SGDeimosX object-group AD_Replication access-list CFV_DC_acl extended permit udp object-group New_AS_CN_Nets object-group SGDeimosX object-group AD_Replication access-list CFV_DC_acl extended permit tcp object-group New_AS_CN_Nets host Ariel object-group MS-OLAP access-list CFV_DC_acl extended permit tcp object-group New_AS_CN_Nets host Ascott_SQL_VIP range 1433 1434 access-list CFV_DC_acl remark Partially for SCRS 1749 access-list CFV_DC_acl extended permit tcp object-group New_AS_CN_Nets object-group SGTitanX-SGOrionX object-group NetbiosTcpIP access-list CFV_DC_acl remark Partially for SCRS 1749 access-list CFV_DC_acl extended permit udp object-group New_AS_CN_Nets object-group SGTitanX-SGOrionX object-group NetbiosTcpIP access-list CFV_DC_acl remark SCRS 1749 access-list CFV_DC_acl extended permit tcp object-group Ascott_CN_76_85 object-group SGTitanX-SGOrionX object-group NetbiosTcpIP access-list CFV_DC_acl remark SCRS 1749 access-list CFV_DC_acl extended permit udp object-group Ascott_CN_76_85 object-group SGTitanX-SGOrionX object-group NetbiosTcpIP access-list CFV_DC_acl extended permit tcp object-group AS_CN_FileServers object-group SGcalypso3-4 object-group NetbiosTcpIP access-list CFV_DC_acl extended permit udp object-group AS_CN_FileServers object-group SGcalypso3-4 object-group NetbiosTcpIP access-list CFV_DC_acl extended permit tcp Security_Ctrl_Zone 255.255.255.0 host Rodian object-group AD_TCP_Services access-list CFV_DC_acl extended permit udp Security_Ctrl_Zone 255.255.255.0 host Rodian object-group AD_UDP_Services access-list CFV_DC_acl extended permit tcp Security_Ctrl_Zone 255.255.255.0 host Rodian range 7000 7200 access-list CFV_DC_acl extended permit tcp Security_Ctrl_Zone 255.255.255.0 host Ackbar object-group AD_TCP_Services access-list CFV_DC_acl extended permit udp Security_Ctrl_Zone 255.255.255.0 host Ackbar object-group AD_UDP_Services access-list CFV_DC_acl extended permit tcp Security_Ctrl_Zone 255.255.255.0 host Ackbar range 7000 7200 access-list CFV_DC_acl remark AV updates access-list CFV_DC_acl extended permit ip host Fortigate host Trendmicro access-list CFV_DC_acl remark SCRS 1553 access-list CFV_DC_acl extended permit tcp object-group CL_CHN_VPN host Phoenix eq 51080 access-list CFV_DC_acl remark SCRS 1553 access-list CFV_DC_acl extended permit tcp object-group CL_CHN_VPN host Phoenix eq www access-list CFV_DC_acl remark SCRS 1553 access-list CFV_DC_acl extended permit tcp object-group CL_CHN_VPN host Yavin eq www access-list CFV_DC_acl remark SCRS 1553 access-list CFV_DC_acl extended permit tcp object-group CL_CHN_VPN host Yavin eq https access-list CFV_DC_acl remark SCRS 1553 access-list CFV_DC_acl extended permit tcp object-group CL_CHN_VPN host Holocam eq www access-list CFV_DC_acl remark SCRS 1553 access-list CFV_DC_acl extended permit tcp object-group CL_CHN_VPN host Holocam eq https access-list CFV_DC_acl extended permit tcp 10.153.2.0 255.255.255.0 host Neptune range 1433 1434 access-list CFV_DC_acl extended permit tcp 10.153.2.0 255.255.255.0 host Saturn range 1433 1434 access-list CFV_DC_acl extended permit tcp object-group Ascott_Nets_on-CFV-DC object-group DPRCalypsoX object-group AS_CitrixNetbios _TCP access-list CFV_DC_acl extended permit tcp object-group Ascott_SG_Properties AScott_TT 255.255.255.0 eq 5900 access-list CFV_DC_acl extended permit udp object-group Ascott_Nets_on-CFV-DC object-group DPRCalypsoX object-group AS_CitrixNetbiso _UDP access-list CFV_DC_acl extended permit tcp object-group Ascott_Nets_on-CFV-DC object-group DPRCalypsoX eq https access-list CFV_DC_acl extended permit tcp object-group Ascott_Nets_on-CFV-DC object-group DPRCalypsoX eq 8000 access-list CFV_DC_acl extended permit tcp object-group Ascott_Nets_on-CFV-DC object-group DPRCalypsoX eq 491 access-list CFV_DC_acl extended permit tcp host NewZealand-Deimos1 object-group SGDeimosX object-group AD_TCP_Services access-list CFV_DC_acl extended permit udp host NewZealand-Deimos1 object-group SGDeimosX object-group AD_UDP_Services access-list CFV_DC_acl extended permit icmp object-group Ascott_Nets_on-CFV-DC object-group SGDeimosX echo access-list CFV_DC_acl extended permit tcp object-group CCL_Retails_Net host Neucleus1 eq https access-list CFV_DC_acl extended permit tcp object-group Ascott_LC_72-87 object-group SGTitanX-SGOrionX object-group NetbiosTcpIP access-list CFV_DC_acl extended permit tcp AS_SG_Admin 255.255.255.248 host Ariel range 1433 1434 access-list CFV_DC_acl extended permit udp AS_SG_Admin 255.255.255.248 host Ariel range 1433 1434 access-list CFV_DC_acl extended permit tcp AS_SG_Admin 255.255.255.248 host DPRStephano1 range 1433 1434 access-list CFV_DC_acl extended permit tcp AS_SG_Admin 255.255.255.248 host 10.61.12.153 range 1433 1434 access-list CFV_DC_acl extended permit udp AS_SG_Admin 255.255.255.248 host 10.61.12.153 range 1433 1434 access-list CFV_DC_acl extended permit udp AS_SG_Admin 255.255.255.248 host DPRStephano1 range 1433 1434 access-list CFV_DC_acl extended permit tcp host Ascott-BPE-Srv object-group SGDeimosX eq domain access-list CFV_DC_acl extended permit tcp host 10.153.2.50 host DPRStephano1 range 1433 1434 access-list CFV_DC_acl extended permit udp host 10.153.2.50 host DPRStephano1 range 1433 1434 access-list CFV_DC_acl extended permit tcp host 10.153.2.50 host Ariel range 1433 1434 access-list CFV_DC_acl extended permit udp host 10.153.2.50 host Ariel range 1433 1434 access-list CFV_DC_acl extended permit tcp host 10.153.2.50 host 10.61.12.153 range 1433 1434 access-list CFV_DC_acl extended permit udp host 10.153.2.50 host 10.61.12.153 range 1433 1434 access-list CFV_DC_acl extended permit tcp Net_10_156_133_0 255.255.255.0 host Arien eq 52443 access-list CFV_DC_acl extended permit tcp Net_10_156_133_0 255.255.255.0 host Arien eq 52080 access-list CFV_DC_acl extended permit udp host 10.153.2.184 host DPRStephano1 eq 1434 access-list CFV_DC_acl extended permit udp host VPN_Aventail2 object-group Internal_DNS eq domain access-list CFV_DC_acl extended permit tcp host VPN_Aventail2 host Arien eq www access-list CFV_DC_acl remark SCRS 1302 -- Created on 5 July by Paul Lee access-list CFV_DC_acl extended permit tcp host VPN_Aventail2 host Arien object-group Ifolder access-list CFV_DC_acl extended permit tcp host VPN_Aventail2 host Arien object-group Novell_TCP_UDP_Svcs access-list CFV_DC_acl extended permit tcp host VPN_Aventail2 host Phoenix object-group Novell_TCP_UDP_Svcs access-list CFV_DC_acl extended permit tcp host VPN_Aventail2 host Maverick eq www access-list CFV_DC_acl extended permit tcp host VPN_Aventail2 host Neucleus1 eq www access-list CFV_DC_acl extended permit tcp host VPN_Aventail2 host Sicrus_Server eq www access-list CFV_DC_acl extended permit tcp host VPN_Aventail2 host CLG001 eq lotusnotes access-list CFV_DC_acl extended permit tcp host VPN_Aventail2 host Orome eq www access-list CFV_DC_acl extended permit tcp ASTL_NET_10-153-75 255.255.255.0 host Ariel eq 1433 access-list CFV_DC_acl remark To access public internet from Security Zone via proxy. access-list CFV_DC_acl extended permit tcp Security_Ctrl_Zone 255.255.255.0 host Trendmicro eq www access-list CFV_DC_acl extended permit tcp Buz_Partner 255.255.255.0 host Trendmicro eq www access-list CFV_DC_acl remark NAI Dat update. access-list CFV_DC_acl extended permit tcp host Aragorn host Monitor-PC eq ftp access-list CFV_DC_acl extended permit tcp host Ascott_H2 host Ariel eq 1433 access-list CFV_DC_acl extended permit tcp host 10.153.2.165 host DPRStephano1 eq 1433 access-list CFV_DC_acl extended permit tcp host 10.153.2.165 host Ariel eq 1433 access-list CFV_DC_acl extended permit tcp host 10.153.2.180 host DPRStephano1 eq 1433 access-list CFV_DC_acl extended permit tcp host Thomas_PC host 10.153.1.146 eq 5900 access-list CFV_DC_acl extended permit tcp 10.153.2.0 255.255.255.0 host DPRCalypso2 eq www access-list CFV_DC_acl extended permit tcp object-group Ascott_SG_Properties object-group Intranet_Webs eq www access-list CFV_DC_acl extended permit tcp object-group Ascott_SG_Properties host Acapulco eq www access-list CFV_DC_acl extended permit tcp object-group Ascott_SG_Properties host Arien eq 51080 access-list CFV_DC_acl extended permit tcp object-group Ascott_SG_Properties host Orome eq lotusnotes access-list CFV_DC_acl extended permit tcp object-group Ascott_SG_Properties host Iarwain eq lotusnotes access-list CFV_DC_acl extended permit tcp object-group Ascott_SG_Properties host Iarwain eq www access-list CFV_DC_acl extended permit tcp object-group Ascott_SG_Properties host Ariel object-group MS-OLAP access-list CFV_DC_acl extended permit tcp object-group Ascott_SG_Properties host Prospero eq www access-list CFV_DC_acl extended permit tcp object-group Ascott_SG_Properties host Prospero eq https access-list CFV_DC_acl extended permit tcp object-group Ascott_SG_Properties object-group SGCalypso01-08 object-group AS_CitrixNetbi os_TCP access-list CFV_DC_acl extended permit udp object-group Ascott_SG_Properties object-group SGCalypso01-08 object-group AS_CitrixNetbi so_UDP access-list CFV_DC_acl extended permit udp object-group Ascott_SG_Properties object-group SGDeimosX object-group AS_BootP access-list CFV_DC_acl extended permit icmp object-group Ascott_SG_Properties object-group SGDeimosX access-list CFV_DC_acl extended permit tcp object-group Ascott_SG_Properties object-group SGDeimosX object-group AD_Replication access-list CFV_DC_acl extended permit udp object-group Ascott_SG_Properties object-group SGDeimosX object-group AD_Replication access-list CFV_DC_acl extended permit tcp object-group Ascott_SG_Properties object-group SGTitanX-SGOrionX object-group AS_Oracle_S ervices access-list CFV_DC_acl extended permit tcp object-group Ascott_SG_Properties object-group Ascott_SQLs eq 1433 access-list CFV_DC_acl extended permit udp object-group Ascott_SG_Properties object-group Ascott_SQLs eq 1434 access-list CFV_DC_acl extended permit tcp host 10.153.2.28 object-group SGTitanX-SGOrionX object-group NetbiosTcpIP access-list CFV_DC_acl extended permit tcp object-group Ascott_SG_Properties object-group Ascott_SQL_ALL eq 1433 access-list CFV_DC_acl extended permit udp object-group Ascott_SG_Properties object-group Ascott_SQL_ALL eq 1434 access-list CFV_DC_acl extended permit udp host 10.153.2.28 object-group SGTitanX-SGOrionX object-group NetbiosTcpIP access-list CFV_DC_acl extended permit tcp 10.153.2.0 255.255.255.0 object-group SGTitanX-SGOrionX object-group NetbiosTcpIP access-list CFV_DC_acl extended permit udp 10.153.2.0 255.255.255.0 object-group SGTitanX-SGOrionX object-group NetbiosTcpIP access-list CFV_DC_acl extended permit udp object-group Ascott_LC_72-87 object-group SGTitanX-SGOrionX object-group NetbiosTcpIP access-list CFV_DC_acl extended permit icmp object-group AS_Oversea_Networks object-group SGDeimosX access-list CFV_DC_acl extended permit tcp AS_SG_Admin 255.255.255.248 object-group AS_Managed_Servers eq pcanywhere-data access-list CFV_DC_acl extended permit udp AS_SG_Admin 255.255.255.248 object-group AS_Managed_Servers eq pcanywhere-status access-list CFV_DC_acl extended permit tcp AS_SG_Admin 255.255.255.248 object-group AS_Managed_Servers eq 5900 access-list CFV_DC_acl extended permit tcp AS_SG_Admin 255.255.255.248 object-group AS_Managed_Servers object-group NetbiosTcpIP access-list CFV_DC_acl extended permit udp AS_SG_Admin 255.255.255.248 object-group AS_Managed_Servers object-group NetbiosTcpIP access-list CFV_DC_acl extended permit icmp AS_SG_Admin 255.255.255.248 object-group AS_Managed_Servers access-list CFV_DC_acl extended permit udp object-group Ascott_SG_Properties host SGpluto1 eq 2967 access-list CFV_DC_acl extended permit udp object-group Ascott_SG_Properties host 10.153.1.12 eq 2967 access-list CFV_DC_acl extended permit tcp object-group Ascott_SG_Properties object-group Ascott_TT object-group NetbiosTcpIP access-list CFV_DC_acl extended permit udp object-group Ascott_SG_Properties object-group Ascott_TT object-group NetbiosTcpIP access-list CFV_DC_acl extended permit tcp object-group Ascott_SG_Properties host Acapulco object-group NetbiosTcpIP access-list CFV_DC_acl extended permit udp object-group Ascott_SG_Properties host Acapulco object-group NetbiosTcpIP access-list CFV_DC_acl extended permit tcp object-group Ascott_SG_Properties host Ariel object-group NetbiosTcpIP access-list CFV_DC_acl extended permit udp object-group Ascott_SG_Properties host Ariel object-group NetbiosTcpIP access-list CFV_DC_acl extended permit tcp object-group Ascott_SG_Properties host 10.61.12.153 object-group NetbiosTcpIP access-list CFV_DC_acl extended permit udp object-group Ascott_SG_Properties host 10.61.12.153 object-group NetbiosTcpIP access-list CFV_DC_acl extended permit tcp object-group Ascott_SG_Properties host Saturn object-group NetbiosTcpIP access-list CFV_DC_acl extended permit udp object-group Ascott_SG_Properties host Saturn object-group NetbiosTcpIP access-list CFV_DC_acl extended permit tcp object-group Ascott_SG_Properties host Neptune object-group NetbiosTcpIP access-list CFV_DC_acl extended permit udp object-group Ascott_SG_Properties host Neptune object-group NetbiosTcpIP access-list CFV_DC_acl extended permit tcp object-group Ascott_SG_Properties host Ascott_SQL_VIP object-group NetbiosTcpIP access-list CFV_DC_acl extended permit udp object-group Ascott_SG_Properties host Ascott_SQL_VIP object-group NetbiosTcpIP access-list CFV_DC_acl extended permit udp object-group Ascott_SG_Properties object-group AS_Antivirus_Hosts eq 38293 access-list CFV_DC_acl extended permit udp object-group Ascott_SG_Properties object-group AS_Antivirus_Hosts eq 2967 access-list CFV_DC_acl extended permit tcp object-group Ascott_SG_Properties object-group AS_Antivirus_Hosts eq 256 access-list CFV_DC_acl remark SCRS -- 1236 -- access-list CFV_DC_acl extended permit tcp host VPN_Aventail host Arien object-group Ifolder access-list CFV_DC_acl extended permit tcp host VPN_Aventail host Arien eq www access-list CFV_DC_acl extended permit tcp host VPN_Aventail host Neucleus1 eq www access-list CFV_DC_acl extended permit tcp host VPN_Aventail host Sicrus_Server eq www access-list CFV_DC_acl extended permit tcp host VPN_Aventail host Holocam eq https access-list CFV_DC_acl extended permit tcp host Gasgano object-group Luthien_Galadriel object-group Omniback_Ports access-list CFV_DC_acl extended permit tcp host host10_156_129_74 host 10.200.3.101 eq smtp access-list CFV_DC_acl extended permit udp host VPN_Aventail host Melasia1 eq 1688 access-list CFV_DC_acl extended permit tcp host VPN_Aventail host Melasia1 eq 1688 access-list CFV_DC_acl extended permit udp host VPN_Aventail host GALA eq syslog access-list CFV_DC_acl extended permit icmp object-group AS_Oversea_Deimos object-group SGDeimosX access-list CFV_DC_acl remark SCRS 2312 access-list CFV_DC_acl remark SCRS 2312 access-list CFV_DC_acl remark SCRS 2180 access-list CFV_DC_acl remark SCRS 2180 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl remark SCRS 2127 access-list CFV_DC_acl remark FTP SERVICE TO MANWE. access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark SCRS 1828 access-list CFV_DC_acl remark Request by Susie access-list CFV_DC_acl remark Request by Susie access-list CFV_DC_acl remark Request by Susie access-list CFV_DC_acl remark Request by Susie access-list CFV_DC_acl remark Request by Susie access-list CFV_DC_acl remark Request by Susie access-list CFV_DC_acl remark Request by Susie access-list CFV_DC_acl remark SCRS 1634 Aventail VPN Pool access to Intranet Resources. access-list CFV_DC_acl remark SCRS 1634 Aventail VPN Pool access to Intranet Resources. access-list CFV_DC_acl remark SCRS 1643 new China NW setup access-list CFV_DC_acl remark Partially for SCRS 1749 access-list CFV_DC_acl remark Partially for SCRS 1749 access-list CFV_DC_acl remark SCRS 1749 access-list CFV_DC_acl remark SCRS 1749 access-list CFV_DC_acl remark AV updates access-list CFV_DC_acl remark SCRS 1553 access-list CFV_DC_acl remark SCRS 1553 access-list CFV_DC_acl remark SCRS 1553 access-list CFV_DC_acl remark SCRS 1553 access-list CFV_DC_acl remark SCRS 1553 access-list CFV_DC_acl remark SCRS 1553 access-list CFV_DC_acl remark SCRS 1302 -- Created on 5 July by Paul Lee access-list CFV_DC_acl remark To access public internet from Security Zone via proxy. access-list CFV_DC_acl remark NAI Dat update. access-list CFV_DC_acl remark SCRS -- 1236 -- access-list CFV_DC_acl extended permit tcp object-group AS_Oversea_Deimos object-group SGDeimosX object-group AS_AD_Fix_Port access-list CFV_DC_acl extended permit tcp object-group CCL_Retails_Net host Phoenix eq 524 access-list CFV_DC_acl extended permit tcp host CCL_IMM_StagingHost host Phoenix eq 524 access-list CFV_DC_acl extended permit tcp 10.154.11.0 255.255.255.0 host Phoenix eq 524 access-list CFV_DC_acl extended permit tcp host VPN_Aventail host CLG001 eq lotusnotes access-list CFV_DC_acl extended permit udp object-group AS_Oversea_Deimos object-group SGDeimosX object-group AD_Replication access-list CFV_DC_acl extended permit tcp object-group AS_Oversea_Deimos object-group SGDeimosX object-group AD_Replication access-list CFV_DC_acl extended permit udp object-group AS_Oversea_Printservers object-group Ascot_SGTitan_SGOrion object-group Netb iosTcpIP access-list CFV_DC_acl extended permit tcp object-group AS_Oversea_Printservers object-group Ascot_SGTitan_SGOrion object-group Netb iosTcpIP access-list CFV_DC_acl extended permit udp object-group AS_Oversea_Nets object-group SGDeimosX object-group AS_ADJoining_UDP access-list CFV_DC_acl extended permit tcp object-group AS_Oversea_Nets object-group SGDeimosX object-group AS_ADJoining_TCP access-list CFV_DC_acl remark access-list CFV_DC_acl remark access-list CFV_DC_acl remark access-list CFV_DC_acl remark access-list CFV_DC_acl remark access-list CFV_DC_acl remark access-list CFV_DC_acl remark access-list CFV_DC_acl remark access-list CFV_DC_acl remark access-list CFV_DC_acl extended permit tcp host 10.153.120.12 object-group SGOrionX object-group NetbiosTcpIP access-list CFV_DC_acl remark access-list CFV_DC_acl remark access-list CFV_DC_acl remark access-list CFV_DC_acl remark access-list CFV_DC_acl extended permit tcp host 10.153.120.12 object-group SGTitanX object-group NetbiosTcpIP access-list CFV_DC_acl remark access-list CFV_DC_acl remark access-list CFV_DC_acl remark access-list CFV_DC_acl remark access-list CFV_DC_acl extended permit tcp host 10.153.120.12 object-group SGCalypsoX object-group NetbiosTcpIP access-list CFV_DC_acl remark access-list CFV_DC_acl remark access-list CFV_DC_acl remark access-list CFV_DC_acl remark access-list CFV_DC_acl extended permit tcp host 10.153.120.12 object-group SGCalypso3-8 object-group NetbiosTcpIP access-list CFV_DC_acl remark access-list CFV_DC_acl remark access-list CFV_DC_acl remark access-list CFV_DC_acl remark access-list CFV_DC_acl extended permit tcp object-group AS_AE_NET_64-79 object-group SGTitanX object-group NetbiosTcpIP access-list CFV_DC_acl extended permit tcp object-group AS_AE_NET_64-79 object-group SGOrionX object-group NetbiosTcpIP access-list CFV_DC_acl extended permit tcp Ascott_Dubai 255.255.255.0 object-group SGDeimosX object-group AD_TCP_Services access-list CFV_DC_acl extended permit udp Ascott_Dubai 255.255.255.0 object-group SGDeimosX object-group AD_Trust_UDP access-list CFV_DC_acl extended permit tcp Ascott_Dubai 255.255.255.0 object-group SGDeimosX eq 50000 access-list CFV_DC_acl extended permit tcp Ascott_Dubai 255.255.255.0 host Prospero object-group HTTP_HTTPS access-list CFV_DC_acl extended permit tcp Ascott_Dubai 255.255.255.0 host Ascott_SQL_VIP eq 1433 access-list CFV_DC_acl extended permit tcp Ascott_Dubai 255.255.255.0 host Ariel object-group MS-OLAP access-list CFV_DC_acl extended permit tcp Ascott_Dubai 255.255.255.0 object-group SGOrionX object-group AS_Oracle_Services access-list CFV_DC_acl extended permit tcp Ascott_Dubai 255.255.255.0 object-group SGTitanX object-group AS_Oracle_Services access-list CFV_DC_acl extended permit tcp object-group AS_Oversea_Nets object-group SGTitanX-SGOrionX object-group AS_Oracle_Servic es access-list CFV_DC_acl remark access-list CFV_DC_acl remark access-list CFV_DC_acl extended permit tcp object-group AS_Oversea_Nets object-group SGCalypso01-08 object-group AS_CitrixNetbios_TC P access-list CFV_DC_acl extended permit udp object-group AS_Oversea_Nets object-group SGCalypso01-08 object-group AS_CitrixNetbiso_UD P access-list CFV_DC_acl extended permit tcp object-group AS_Oversea_Nets host Prospero object-group HTTP_HTTPS access-list CFV_DC_acl extended permit tcp object-group AS_Oversea_Nets host Ariel object-group MS-OLAP access-list CFV_DC_acl extended permit tcp object-group AS_Oversea_Nets host Ascott_SQL_VIP eq 1433 access-list CFV_DC_acl extended permit udp object-group BU_VPN_ITO_Mnged_Devs host GALA eq syslog access-list CFV_DC_acl remark Remark ---Ascott sites to access SGCalyso 1 - 2 ---SCRS960--- access-list CFV_DC_acl extended permit tcp Ascott_BU_Net 255.255.0.0 object-group Ascott_SGCalyso1-2 eq citrix-ica access-list CFV_DC_acl extended permit udp Ascott_BU_Net 255.255.0.0 object-group Ascott_SGCalyso1-2 eq 1604 access-list CFV_DC_acl extended permit tcp Ascott_BU_Net 255.255.0.0 object-group Ascott_SGCalyso1-2 range 2512 2513 access-list CFV_DC_acl remark Remark ---Ascott sites to access SGCalyso 3 - 8 ---SCRS960--- access-list CFV_DC_acl extended permit tcp Ascott_BU_Net 255.255.0.0 object-group Ascott_SGCalys3-8 eq citrix-ica access-list CFV_DC_acl extended permit udp Ascott_BU_Net 255.255.0.0 object-group Ascott_SGCalys3-8 eq 1604 access-list CFV_DC_acl extended permit tcp Ascott_BU_Net 255.255.0.0 object-group Ascott_SGCalys3-8 range 2512 2513 access-list CFV_DC_acl extended permit udp object-group Ascott_Vietnam object-group SGDeimosX eq domain access-list CFV_DC_acl extended permit tcp object-group Ascott_Vietnam object-group SGDeimosX object-group AD_TCP_Services access-list CFV_DC_acl extended permit udp object-group Ascott_Vietnam object-group SGDeimosX object-group AD_UDP_Services access-list CFV_DC_acl remark Remark --Ascott Vietnam to access SGCalyso5/6-- access-list CFV_DC_acl extended permit tcp object-group Ascott_Vietnam object-group Ascott_SGCalyso5-6 object-group AD_TCP_Services access-list CFV_DC_acl extended permit udp object-group Ascott_Vietnam object-group Ascott_SGCalyso5-6 object-group AD_UDP_Services access-list CFV_DC_acl extended permit tcp object-group Ascott_Vietnam object-group Ascott_SGCalyso5-6 eq citrix-ica access-list CFV_DC_acl extended permit udp object-group Ascott_Vietnam object-group Ascott_SGCalyso5-6 eq 1604 access-list CFV_DC_acl extended permit tcp object-group Ascott_Vietnam object-group Ascott_SGCalyso5-6 eq 2513 access-list CFV_DC_acl extended permit tcp object-group Ascott_Vietnam host Prospero object-group HTTP_HTTPS access-list CFV_DC_acl extended permit tcp object-group Ascott_Vietnam object-group SGOrionX object-group AS_Oracle_Services access-list CFV_DC_acl extended permit tcp object-group Ascott_Vietnam host Ariel object-group MS-OLAP access-list CFV_DC_acl extended permit tcp object-group Ascott_Vietnam host Ascott_SQL_VIP object-group SQL access-list CFV_DC_acl remark Remark --Ascott Thailand to access SGCalyso5/6-- access-list CFV_DC_acl extended permit tcp object-group Ascott_Thailand object-group Ascott_SGCalyso5-6 object-group AD_TCP_Services access-list CFV_DC_acl extended permit udp object-group Ascott_Thailand object-group Ascott_SGCalyso5-6 object-group AD_UDP_Services access-list CFV_DC_acl remark SCRS 1285 access-list CFV_DC_acl extended permit tcp object-group Ascott_Thailand object-group SGCalypso1-2and5-8 object-group NetbiosTcpIP access-list CFV_DC_acl remark SCRS 1285 access-list CFV_DC_acl extended permit tcp object-group Ascott_Thailand object-group SGCalypso1-2and5-8 eq citrix-ica access-list CFV_DC_acl extended permit udp object-group Ascott_Thailand object-group SGCalypso1-2and5-8 eq 1604 access-list CFV_DC_acl extended permit tcp object-group Ascott_Thailand object-group SGCalypso1-2and5-8 eq 2513 access-list CFV_DC_acl remark Remark ---VPN Aventail to access Neucleus1 via 443 --SCRS 931-- access-list CFV_DC_acl extended permit tcp host VPN_Aventail host Neucleus1 eq https access-list CFV_DC_acl remark Remark ---Titania backup access to Luthien & Galadriel access-list CFV_DC_acl extended permit tcp host Ascott-BPE-Srv host Luthien object-group OmniBackup access-list CFV_DC_acl extended permit tcp host Ascott-BPE-Srv host Galadriel object-group OmniBackup access-list CFV_DC_acl extended permit udp host PIX_VPN_Inside_int host GALA eq 1688 access-list CFV_DC_acl remark access-list CFV_DC_acl remark access-list CFV_DC_acl remark SCRS 2302 access-list CFV_DC_acl remark SCRS 2302 access-list CFV_DC_acl remark SCRS 2302 access-list CFV_DC_acl remark SCRS 2302 access-list CFV_DC_acl remark Susie will follow up with SCRS. access-list CFV_DC_acl extended permit tcp object-group VPN_IP_Pools host WibroAX eq pcanywhere-data access-list CFV_DC_acl remark Susie will follow up with SCRS. access-list CFV_DC_acl extended permit udp object-group VPN_IP_Pools host WibroAX eq pcanywhere-status access-list CFV_DC_acl remark SCRS 1464 - To access Exinda located in DC and RP via VPN SecureRemote. access-list CFV_DC_acl extended permit tcp object-group VPN_IP_Pools object-group CL_Exinda eq https access-list CFV_DC_acl remark Remark--------SecureRemote access to CLNS01----SCRS 871-------- access-list CFV_DC_acl extended permit tcp object-group VPN_IP_Pools host CLNS01 eq 524 access-list CFV_DC_acl remark For Mark Chew to adminster Ariel via PCAnywhere access-list CFV_DC_acl extended permit tcp object-group VPN_IP_Pools host Ariel eq pcanywhere-data access-list CFV_DC_acl extended permit udp object-group VPN_IP_Pools host Ariel eq pcanywhere-status access-list CFV_DC_acl extended permit tcp object-group VPN_IP_Pools host Trendmicro eq www access-list CFV_DC_acl remark access-list CFV_DC_acl extended permit tcp object-group VPN_IP_Pools 10.200.0.0 255.254.0.0 eq lotusnotes access-list CFV_DC_acl extended permit tcp host VPN_Aventail host GALA eq 1688 access-list CFV_DC_acl remark remark ---OVSD VPN Access--- access-list CFV_DC_acl extended permit udp object-group HP_VPN_Group object-group HP_VPN_Access_Group eq isakmp access-list CFV_DC_acl remark remark ---OVSD VPN Access--- access-list CFV_DC_acl extended permit ah object-group HP_VPN_Group object-group HP_VPN_Access_Group access-list CFV_DC_acl remark remark ---OVSD VPN Access--- access-list CFV_DC_acl extended permit esp object-group HP_VPN_Group object-group HP_VPN_Access_Group access-list CFV_DC_acl remark remark ----SCRS 847-------- access-list CFV_DC_acl extended permit tcp host Aumida host Neucleus1 eq https access-list CFV_DC_acl extended permit tcp object-group SIS_Station_Site object-group SIStation_Hosts object-group TCP3090_TCP3091 access-list CFV_DC_acl extended permit ip object-group Checkpoint_EFM object-group LDAP_Servers access-list CFV_DC_acl extended permit tcp object-group Ascott_AU object-group SGCalypso1-2 object-group citrix-ica access-list CFV_DC_acl extended permit udp object-group Ascott_AU object-group SGCalypso1-2 object-group ica-browser access-list CFV_DC_acl extended permit tcp object-group Ascott_AU object-group SGDeimos1-2 object-group SGDeimos_Services access-list CFV_DC_acl extended permit udp object-group Ascott_AU object-group SGDeimos1-2 object-group SGDeimos_Services access-list CFV_DC_acl extended permit tcp object-group Ascott_AU host Ascott_SQL_VIP object-group SQL access-list CFV_DC_acl extended permit ip object-group Ascott_VPN object-group SGDeimos1-2 access-list CFV_DC_acl extended permit tcp object-group Ascott_HQ_H1-H2 object-group SGCalypso1-2 object-group PC-Anywhere access-list CFV_DC_acl extended permit udp object-group Ascott_HQ_H1-H2 object-group SGCalypso1-2 object-group PC-Anywhere access-list CFV_DC_acl extended permit tcp host Ascott_HQ_H2 object-group SGCalypso1-2 object-group Citrixadmin access-list CFV_DC_acl extended permit tcp object-group Ascott_H1_HQ_H3 object-group SGCalypso1-2 object-group Citrixadmin access-list CFV_DC_acl extended permit udp object-group Ascott_H1_HQ_H3 object-group SGCalypso1-2 object-group PC-Anywhere access-list CFV_DC_acl extended permit tcp object-group Ascott_H1_HQ_H3 object-group SGCalypso1-2 object-group PC-Anywhere access-list CFV_DC_acl extended permit tcp host Ascott_HQ_H1 object-group SGCalypso1-2 object-group Netbios access-list CFV_DC_acl extended permit udp host Ascott_HQ_H1 object-group SGCalypso1-2 object-group Netbios access-list CFV_DC_acl extended permit tcp host Ascott_HQ_H1 object-group SGCalypso1-2 object-group Citrixadmin access-list CFV_DC_acl extended permit icmp host Ascott_Netscreen host SGCalyso1 access-list CFV_DC_acl extended permit icmp object-group Ascott_Variable_Mask object-group Kah_Ming_254 access-list CFV_DC_acl extended permit icmp object-group Ascott_Variable_Mask host Thomas_PC access-list CFV_DC_acl extended permit tcp host Ascott_HQ_H3 host Ascott_Host_2-43 object-group VNC access-list CFV_DC_acl extended permit tcp object-group Ascott_AU host Prospero object-group HTTP access-list CFV_DC_acl extended permit tcp object-group Ascott_AU host Ariel object-group ms_OLAP access-list CFV_DC_acl extended permit tcp host Miranda host Ariel object-group MS-SQL-Server access-list CFV_DC_acl extended permit tcp host Miranda host SGDeimos1 object-group Netbios access-list CFV_DC_acl extended permit udp host Miranda host SGDeimos1 object-group Netbios access-list CFV_DC_acl extended permit udp object-group Miranda_Earth_Galaxy host Galadriel eq domain access-list CFV_DC_acl extended permit udp object-group Miranda_Earth_Galaxy host Orome eq domain access-list CFV_DC_acl extended permit tcp host Sidaster object-group STMS object-group Lotus access-list CFV_DC_acl extended permit tcp host Galaxy host Ariel object-group MS-SQL-Server access-list CFV_DC_acl extended permit tcp host Galaxy host Prospero object-group DataWarehouse access-list CFV_DC_acl extended permit tcp object-group Miranda_Earth_Galaxy object-group Luthien_Galadriel object-group Omniback_Ba ckup access-list CFV_DC_acl extended permit tcp object-group Miranda_Earth_Galaxy object-group Luthien_Galadriel object-group Omniback_Ba ckup2 access-list CFV_DC_acl extended permit tcp host Raffles_FW1 host Raffles_FW2 object-group Raffles_FW1-2_Svs access-list CFV_DC_acl extended permit udp host Raffles_FW1 host Raffles_FW2 object-group Raffles_FW1-2_Svs access-list CFV_DC_acl extended permit icmp host Raffles_FW1 host Raffles_FW2 access-list CFV_DC_acl extended permit tcp host Raffles_FW1 host Raffles_FW2 eq 256 access-list CFV_DC_acl extended permit udp host Raffles_FW1 host Raffles_FW2 eq isakmp access-list CFV_DC_acl extended permit esp host Raffles_FW1 host Raffles_FW2 access-list CFV_DC_acl extended permit ah host Raffles_FW1 host Raffles_FW2 access-list CFV_DC_acl extended permit tcp host Raffles_FW1 object-group STMS object-group STMS_Services access-list CFV_DC_acl extended permit udp host Raffles_FW1 object-group STMS object-group STMS_Services access-list CFV_DC_acl extended permit tcp object-group Zurich_Host1-2 object-group STMS object-group STMS_Services access-list CFV_DC_acl extended permit udp object-group Zurich_Host1-2 object-group STMS object-group STMS_Services access-list CFV_DC_acl extended permit tcp object-group Celeris_IT object-group Raffles_100 object-group Raffles100_Service access-list CFV_DC_acl extended permit udp object-group Celeris_IT object-group Raffles_100 object-group Raffles100_Service access-list CFV_DC_acl extended permit tcp host Celeris_6 object-group Raffles_FW2_Host72-73 object-group Celeris6P1 access-list CFV_DC_acl extended permit tcp host Celeris_18 object-group Raffles_FW2_Host72-73 object-group Raffles100_Service access-list CFV_DC_acl extended permit udp host Celeris_18 object-group Raffles_FW2_Host72-73 object-group Raffles100_Service access-list CFV_DC_acl extended permit tcp object-group Zurich object-group STMS object-group Lotus access-list CFV_DC_acl extended permit icmp object-group Zurich_Host1-2 object-group STMS access-list CFV_DC_acl extended permit icmp host Zurich_Host1 host Cisco7204_HSRP access-list CFV_DC_acl extended permit tcp object-group Zurich_Host1-2 host RafflesDNS object-group Raffles_DNS_Svcs access-list CFV_DC_acl extended permit udp object-group Zurich_Host1-2 host RafflesDNS object-group Raffles_DNS_Svcs access-list CFV_DC_acl extended permit tcp object-group Raf_NaiLertPark host Orome object-group HTTP access-list CFV_DC_acl extended permit tcp object-group RIL_Server_Farm host HP_Sec_OVO_MgtSvr object-group DCE access-list CFV_DC_acl extended permit udp object-group RIL_Server_Farm host HP_Sec_OVO_MgtSvr object-group DCE access-list CFV_DC_acl extended permit udp object-group RIL_Server_Farm host HPMon3 eq snmp access-list CFV_DC_acl extended permit tcp object-group RIL_Server_Farm object-group HPMon1-2 object-group HP_Remote_Monitor access-list CFV_DC_acl extended permit icmp object-group RIL_Server_Farm object-group HPMon1-3_Test_PC access-list CFV_DC_acl extended permit tcp object-group RIL_Server_Farm object-group Luthien_Galadriel object-group Omniback_Backup access-list CFV_DC_acl extended permit tcp object-group RIL_Server_Farm object-group Luthien_Galadriel object-group Omniback_Backup2 access-list CFV_DC_acl extended permit tcp object-group Tarkin1-3 host Holocam object-group HTTP access-list CFV_DC_acl extended permit tcp object-group Tarkin1-3 host Holocam object-group HTTPS access-list CFV_DC_acl extended permit tcp object-group Tarkin1-3 object-group Ph_Ya_Oro_Ma_Cyc object-group HTTP access-list CFV_DC_acl extended permit tcp object-group Tarkin1-3 host Arien object-group Arien_Services access-list CFV_DC_acl extended permit udp object-group Tarkin1-3 host Arien object-group Arien_Services access-list CFV_DC_acl extended permit tcp host Tarkin host Phoenix object-group echo access-list CFV_DC_acl extended permit udp host Tarkin host Phoenix object-group echo access-list CFV_DC_acl extended permit tcp object-group DMZ object-group HP_Mon_Hosts object-group DCE access-list CFV_DC_acl extended permit tcp object-group DMZ object-group HP_Mon_Hosts range 381 383 access-list CFV_DC_acl extended permit tcp object-group DMZ object-group HP_Mon_Hosts range 10000 10200 access-list CFV_DC_acl extended permit tcp object-group DMZ object-group HP_Mon_Hosts range 14000 14020 access-list CFV_DC_acl extended permit icmp object-group DMZ object-group HP_Mon_Hosts access-list CFV_DC_acl extended permit udp object-group DMZ object-group HP_Mon_Hosts range snmp snmptrap access-list CFV_DC_acl extended permit udp object-group DMZ host DCPC eq syslog access-list CFV_DC_acl extended permit icmp object-group DMZ object-group Management_PC access-list CFV_DC_acl extended permit tcp host Gasgano host Luthien object-group Omniback_Backup access-list CFV_DC_acl extended permit tcp host Gasgano host Luthien object-group Omniback_Backup2 access-list CFV_DC_acl extended permit udp host Cat3524XL host Cisco7204_Pri eq ntp access-list CFV_DC_acl extended permit udp host VPN_Aventail object-group Galadriel_Orome_Grp eq domain access-list CFV_DC_acl extended permit udp host PriSrvZone1_Temp host DCPC eq syslog access-list CFV_DC_acl extended permit udp host PriSvrZone2_Temp host DCPC eq syslog access-list CFV_DC_acl extended permit ip object-group Checkpoint_EFM host Galadriel access-list CFV_DC_acl extended permit ip object-group IP-Pool any access-list CFV_DC_acl extended permit udp object-group DMZ host Galadriel eq domain access-list CFV_DC_acl extended permit tcp object-group Ascott_VPN object-group SGCalypso1-2 object-group Netbios access-list CFV_DC_acl extended permit udp object-group Ascott_VPN object-group SGCalypso1-2 object-group Netbios access-list CFV_DC_acl extended permit udp object-group BuzPart_Ascott object-group SGDeimos1-2 eq domain access-list CFV_DC_acl extended permit tcp host Ascott-BPE-Srv host Ariel object-group SQL access-list CFV_DC_acl extended permit tcp object-group Ascott_CHN host Ascott_SQL_VIP object-group SQL access-list CFV_DC_acl extended permit tcp object-group Ascott_CHN object-group CHN_Citrix_Servers object-group CHN_Citrix_Svcs access-list CFV_DC_acl extended permit udp object-group Ascott_CHN object-group CHN_Citrix_Servers object-group CHN_Citrix_Svcs access-list CFV_DC_acl extended permit tcp object-group Ascott_CHN host Ariel object-group ms_OLAP access-list CFV_DC_acl extended permit tcp object-group Ascott_CHN host Prospero object-group HTTP access-list CFV_DC_acl extended permit tcp object-group Ascott_CHN object-group SGDeimos1-2 object-group AD_Replication access-list CFV_DC_acl extended permit udp object-group Ascott_CHN object-group SGDeimos1-2 object-group AD_Replication access-list CFV_DC_acl extended permit tcp host Ascott-BPE-Srv object-group SGDeimos1-2 object-group Domain_Login access-list CFV_DC_acl extended permit udp host Ascott-BPE-Srv object-group SGDeimos1-2 object-group Domain_Login access-list CFV_DC_acl extended permit icmp host Ascott-BPE-Srv object-group SGDeimos1-2 access-list CFV_DC_acl extended permit tcp host Office_CVS_Server object-group CSLucas_Hosts object-group CVS_Ports access-list CFV_DC_acl extended permit tcp object-group Ascott_CHN_AdminHosts object-group CHN_Citrix_Servers object-group PC-Anywhe re access-list CFV_DC_acl extended permit tcp object-group Ascott_CHN host Ariel object-group TCP2393-2394 access-list CFV_DC_acl extended permit tcp host Whiphid host Dashade object-group Dashade_Services access-list CFV_DC_acl extended permit udp host Whiphid host Dashade object-group Dashade_Services access-list CFV_DC_acl extended permit icmp object-group Ascott_CHN host Prospero access-list CFV_DC_acl extended permit tcp object-group Ascott_CHN object-group Ascot_SGTitan_SGOrion object-group AS_Oracle_Service s access-list CFV_DC_acl extended permit udp object-group Ascott_CHN object-group Ascot_SGTitan_SGOrion object-group AS_Oracle_Service s access-list CFV_DC_acl extended permit tcp object-group Ascott_AU object-group Ascot_SGTitan_SGOrion object-group AS_Oracle_Services access-list CFV_DC_acl extended permit udp object-group Ascott_AU object-group Ascot_SGTitan_SGOrion object-group AS_Oracle_Services access-list CFV_DC_acl extended permit udp object-group CCL_Retail_Nets object-group Internal_DNS eq domain access-list CFV_DC_acl extended permit udp object-group CCL_Retail_Nets host Arien eq 427 access-list CFV_DC_acl extended permit tcp object-group CCL_Retail_Nets host Arien eq 524 access-list CFV_DC_acl extended permit tcp object-group CCL_Retail_Nets host Orome eq 524 access-list CFV_DC_acl extended permit icmp object-group CCL_Retail_Nets host Arien access-list CFV_DC_acl extended permit icmp object-group CCL_Retail_Nets host Phoenix access-list CFV_DC_acl extended permit tcp object-group CCL_Retail_Nets host Phoenix eq www access-list CFV_DC_acl extended permit udp object-group CCL_Retail_Nets host Phoenix eq 427 access-list CFV_DC_acl extended permit udp object-group CCL_Retail_Nets host Phoenix eq netbios-ns access-list CFV_DC_acl extended permit tcp object-group CCL_Retail_Nets host Phoenix eq netbios-ssn access-list CFV_DC_acl extended permit tcp object-group CCL_Retail_Nets host Phoenix eq 445 access-list CFV_DC_acl extended permit tcp object-group CCL_Retail_Nets host Phoenix eq 524 access-list CFV_DC_acl extended permit tcp object-group CCL_Retail_Nets host Rodian object-group AD_TCP_Services access-list CFV_DC_acl extended permit udp object-group CCL_Retail_Nets host Rodian object-group AD_UDP_Services access-list CFV_DC_acl remark access-list CFV_DC_acl extended permit tcp object-group CCL_Retail_Nets host Rodian eq 2362 access-list CFV_DC_acl remark For Password Syn access-list CFV_DC_acl extended permit tcp object-group CCL_Retail_Nets host Rodian range 2977 2978 access-list CFV_DC_acl remark For Password Syn access-list CFV_DC_acl extended permit tcp object-group CCL_Retail_Nets host Orome eq lotusnotes access-list CFV_DC_acl extended permit tcp object-group CCL_Retail_Nets host Rodian range 7000 7200 access-list CFV_DC_acl extended permit tcp object-group CCL_Retail_Nets host Ackbar object-group AD_TCP_Services access-list CFV_DC_acl extended permit udp object-group CCL_Retail_Nets host Ackbar object-group AD_Trust_UDP access-list CFV_DC_acl extended permit tcp object-group CCL_Retail_Nets host Ackbar range 7000 7200 access-list CFV_DC_acl extended permit tcp object-group CCL_Retail_Nets host Trendmicro eq www access-list CFV_DC_acl extended permit tcp object-group CCL_Retail_Nets 10.200.0.0 255.252.0.0 eq lotusnotes access-list CFV_DC_acl extended permit icmp object-group Ascott_CHN object-group SGDeimos1-2 access-list CFV_DC_acl extended permit ip object-group VPN_BU_PIX-GRP_TMP any access-list CFV_DC_acl extended permit udp host PIX_VPN_Inside_int host GALA eq syslog access-list CFV_DC_acl extended permit ip object-group Net10_150_244_0 object-group PIX_Resi_Orome_Grp access-list CFV_DC_acl extended permit ip object-group Net10_156_17_0 object-group PIX_Resi_Orome_Grp access-list CFV_DC_acl extended permit ip object-group Net10_150_244_0 object-group Net10_200_0_0 access-list CFV_DC_acl extended permit ip object-group NET_192_168_181_0 object-group PhaseI_DC access-list CFV_DC_acl extended permit ip object-group NET_192_168_181_0 object-group NET_COMMERCIAL access-list CFV_DC_acl extended permit tcp host host10_153_100_229 host Ariel object-group MS-SQL-Server access-list CFV_DC_acl extended permit tcp object-group NET_10_153_100_0 object-group PIX_SVR_Prospero_Orome object-group HTTP access-list CFV_DC_acl extended permit tcp object-group NET_10_153_100_0 host Ariel object-group ms_OLAP access-list CFV_DC_acl extended permit tcp object-group CRL_CHN_VPN object-group SVR_Yavin_Arien object-group HTTP access-list CFV_DC_acl extended permit tcp host host10_153_100_229 object-group SGDeimos1-2 object-group PIX_445_DNS access-list CFV_DC_acl extended permit udp host host10_153_100_229 object-group SGDeimos1-2 object-group PIX_445_DNS access-list CFV_DC_acl extended permit tcp object-group Retails_Net object-group LotusNote_SVRs_Grp object-group Lotus access-list CFV_DC_acl extended permit tcp object-group CRL_CHN_VPN object-group LotusNote_SVRs_Grp object-group Lotus access-list CFV_DC_acl extended permit udp object-group Retails_Net object-group Galadriel_Orome_Grp eq domain access-list CFV_DC_acl extended permit tcp object-group Retails_Net object-group PIX_SVR_Grp_SVCE524 object-group NCP access-list CFV_DC_acl extended permit icmp object-group PIX_ICMP_Net_Host_Grp object-group PIX_ICMP_Host_GRP access-list CFV_DC_acl extended permit tcp object-group Retails_Net object-group PIX_WWW_HTTPS_Grp object-group HTTP_HTTPS access-list CFV_DC_acl extended permit tcp host host10_156_134_139 object-group Net_Corp_Comm_Intranet object-group HTTP access-list CFV_DC_acl extended permit tcp object-group NET_10_154_32_0 host host_172_24_20_12 object-group WebCache access-list CFV_DC_acl extended permit tcp object-group NET_10_154_40_0 host host_172_24_20_12 object-group WebCache access-list CFV_DC_acl extended permit udp object-group Retail_Net_GW host host10_150_200_98 range snmp snmptrap access-list CFV_DC_acl extended permit tcp object-group Retails_Net object-group NET_COMMERCIAL object-group citrix-ica access-list CFV_DC_acl extended permit tcp object-group CRL_CHN_VPN host Arien object-group CHN_VPN_SRV_GRP access-list CFV_DC_acl extended permit udp object-group CRL_CHN_VPN host Arien object-group CHN_VPN_SRV_GRP access-list CFV_DC_acl extended permit tcp object-group Retails_Net host Rodian object-group GRP_DCE_TCP1078 access-list CFV_DC_acl extended permit udp object-group Retails_Net host Rodian object-group GRP_DCE_TCP1078 access-list CFV_DC_acl extended permit tcp object-group Retail_Staging_Host host Marlex object-group Unicenter_SD1_RC1 access-list CFV_DC_acl extended permit udp object-group Retail_Staging_Host host Marlex object-group Unicenter_SD1_RC1 access-list CFV_DC_acl extended permit tcp object-group Retails_Net host Marlex object-group Unicenter-RC1 access-list CFV_DC_acl extended permit udp object-group Retails_Net host Marlex object-group Unicenter-RC1 access-list CFV_DC_acl extended permit tcp object-group Ascott_AU object-group SGCalypso1-2 object-group Citrixadmin access-list CFV_DC_acl extended permit tcp object-group Ascott_AU object-group SGCalypso1-2 object-group PC-Anywhere access-list CFV_DC_acl extended permit udp object-group Ascott_AU object-group SGCalypso1-2 object-group PC-Anywhere access-list CFV_DC_acl extended permit tcp object-group Ascott_AU object-group SGCalypso1-2 object-group SGDeimos_Services access-list CFV_DC_acl extended permit udp object-group Ascott_AU object-group SGCalypso1-2 object-group SGDeimos_Services access-list CFV_DC_acl extended permit tcp object-group Ascott_AU host Ariel object-group TCP2393-2394 access-list CFV_DC_acl extended permit icmp object-group Ascott_AU object-group SGDeimos1-2 access-list CFV_DC_acl extended permit tcp object-group Ascott_AU object-group SGDeimos1-2 object-group AD_Replication access-list CFV_DC_acl extended permit udp object-group Ascott_AU object-group SGDeimos1-2 object-group AD_Replication access-list CFV_DC_acl extended permit tcp object-group Ascott_AU object-group CHN_Citrix_Servers object-group CHN_Citrix_Svcs access-list CFV_DC_acl extended permit udp object-group Ascott_AU object-group CHN_Citrix_Servers object-group CHN_Citrix_Svcs access-list CFV_DC_acl extended permit tcp object-group Ascott_AU_Admin_Hosts object-group CHN_Citrix_Servers object-group PC-Anywhe re access-list CFV_DC_acl extended permit udp object-group Ascott_AU_Admin_Hosts object-group CHN_Citrix_Servers object-group PC-Anywhe re access-list CFV_DC_acl extended permit tcp host Galaxy host Prospero object-group HTTP access-list CFV_DC_acl extended permit tcp object-group AS_Thailand_NET object-group Ascot_SGTitan_SGOrion object-group AS_Oracle_Se rvices access-list CFV_DC_acl extended permit udp object-group AS_Thailand_NET object-group Ascot_SGTitan_SGOrion object-group AS_Oracle_Se rvices access-list CFV_DC_acl extended permit tcp object-group AS_Thailand_NET object-group SGcalypso-5to6 object-group ASTL_CitrixService access-list CFV_DC_acl extended permit udp object-group AS_Thailand_NET object-group SGcalypso-5to6 object-group ASTL_CitrixService access-list CFV_DC_acl extended permit tcp object-group AS_Thailand_NET object-group SGDeimos1-2 object-group AD_Replication access-list CFV_DC_acl extended permit udp object-group AS_Thailand_NET object-group SGDeimos1-2 object-group AD_Replication access-list CFV_DC_acl extended permit tcp object-group AS_Thailand_NET host Prospero object-group HTTP access-list CFV_DC_acl extended permit tcp object-group AS_Thailand_NET host Ariel object-group MS-OLAP access-list CFV_DC_acl extended permit tcp object-group AS_Thailand_NET host Ascott_SQL_VIP object-group SQL access-list CFV_DC_acl extended permit udp object-group PIX_VPN host GALA object-group Custom_Syslog access-list CFV_DC_acl extended permit tcp object-group NET_10_156_137_0 host Yavin object-group citrix-ica access-list CFV_DC_acl extended permit tcp object-group Ascott_HQ object-group Ascot_SGTitan_SGOrion object-group AS_Oracle_Services access-list CFV_DC_acl extended permit udp object-group Ascott_HQ object-group Ascot_SGTitan_SGOrion object-group AS_Oracle_Services access-list CFV_DC_acl extended permit udp object-group BUS_VPN_device_Group host GALA eq syslog access-list CFV_DC_acl extended permit tcp object-group BU_VPN_ITO_Mnged_Devs object-group HP_ITO_Servers object-group HP_ITO_Servic es access-list CFV_DC_acl extended permit udp object-group BU_VPN_ITO_Mnged_Devs object-group HP_ITO_Servers object-group HP_ITO_Servic es access-list CFV_DC_acl extended permit tcp host Ascott-BPE-Srv object-group HP_ITO_Servers object-group HP_ITO_Services access-list CFV_DC_acl extended permit udp host Ascott-BPE-Srv object-group HP_ITO_Servers object-group HP_ITO_Services access-list CFV_DC_acl extended permit tcp object-group ASVN_NET object-group Ascot_SGTitan_SGOrion object-group AS_Oracle_Services access-list CFV_DC_acl extended permit udp object-group ASVN_NET object-group Ascot_SGTitan_SGOrion object-group AS_Oracle_Services access-list CFV_DC_acl extended permit tcp object-group ASVN_NET object-group VNSGCALPYSO_GR object-group ASTL_CitrixService access-list CFV_DC_acl extended permit udp object-group ASVN_NET object-group VNSGCALPYSO_GR object-group ASTL_CitrixService access-list CFV_DC_acl extended permit tcp object-group ASVN_NET object-group SGDeimos1-2 object-group AD_Replication access-list CFV_DC_acl extended permit udp object-group ASVN_NET object-group SGDeimos1-2 object-group AD_Replication access-list CFV_DC_acl extended permit tcp object-group ASVN_NET host Prospero object-group HTTP access-list CFV_DC_acl extended permit tcp object-group ASVN_NET host Ariel object-group MS-OLAP access-list CFV_DC_acl extended permit tcp object-group ASVN_NET host Ascott_SQL_VIP object-group SQL access-list CFV_DC_acl extended permit udp host Durin host Melasia1 eq syslog access-list CFV_DC_acl extended permit udp host varda host Melasia1 eq syslog access-list CFV_DC_acl extended permit tcp host Aumida host Rodian object-group Rodian_Domain access-list CFV_DC_acl extended permit udp host Aumida host Rodian object-group Rodian_Domain access-list CFV_DC_acl extended permit tcp host Aumida host Skyworld object-group HTTP_HTTPS access-list CFV_DC_acl extended permit udp host Aumida object-group Galadriel_Orome_Grp eq domain access-list CFV_DC_acl extended permit tcp host Aumida host Luthien object-group OmniBackup access-list CFV_DC_acl extended permit tcp host Aumida host Galadriel object-group OmniBackup access-list CFV_DC_acl extended permit tcp object-group Security_Control object-group HP_ITO_Servers object-group HP_ITO_Services access-list CFV_DC_acl extended permit udp object-group Security_Control object-group HP_ITO_Servers object-group HP_ITO_Services access-list CFV_DC_acl extended permit tcp host VPN_Aventail object-group STMS object-group Lotus access-list CFV_DC_acl extended permit tcp host VPN_Aventail object-group Orome_Yavin_Maverick object-group HTTP access-list CFV_DC_acl extended permit tcp host VPN_Aventail host Rodian object-group HTTPS access-list CFV_DC_acl extended permit tcp host VPN_Aventail object-group Phoenix_Arien object-group NCP access-list CFV_DC_acl extended permit tcp host Aumida host IMS_Database_Srv object-group MS-SQL-Server access-list CFV_DC_acl extended permit tcp object-group Varda_Durin_Whiphid object-group Luthien_Galadriel object-group Omniback_Bac kup access-list CFV_DC_acl extended permit tcp object-group Varda_Durin_Whiphid object-group Luthien_Galadriel object-group Omniback_Bac kup2 access-list CFV_DC_acl extended permit udp host Whiphid host Melasia1 eq syslog access-list CFV_DC_acl extended permit tcp host Aumida host Neucleus1 object-group HTTP_8080 access-list CFV_DC_acl extended permit tcp object-group RIL_DC_Servers object-group HP_OVA_Mgt_Svrs object-group OVO_Mgt_Ports access-list CFV_DC_acl extended permit tcp object-group RIL_DC_Servers host HP_MWA_Mgt_Svr object-group MWA_Mgt_Ports access-list CFV_DC_acl extended permit tcp object-group RIL_DC_Servers host HP_CODA_Mgt_Svr object-group CODA_Mgt_Ports access-list CFV_DC_acl extended permit icmp object-group RIL_DC_Servers object-group HP_Mon_ICMP_Svrs access-list CFV_DC_acl extended permit tcp object-group IMM_HarbourF_Link host Arien eq 524 access-list CFV_DC_acl extended permit tcp object-group IMM_HarbourF_Link host Orome eq 524 access-list CFV_DC_acl extended permit tcp object-group IMM_HarbourF_Link host Phoenix eq 524 access-list CFV_DC_acl extended permit tcp object-group IMM_HarbourF_Link host Rodian object-group AD_TCP_Services access-list CFV_DC_acl extended permit tcp object-group IMM_HarbourF_Link host Rodian eq 7010 access-list CFV_DC_acl extended permit tcp object-group IMM_HarbourF_Link host Rodian range 7000 7200 access-list CFV_DC_acl extended permit udp object-group IMM_HarbourF_Link host Rodian object-group AD_UDP_Services access-list CFV_DC_acl extended permit tcp object-group CCL_IMM_Habour_Net host 10.150.130.113 object-group Lotus access-list CFV_DC_acl extended permit tcp object-group CCL_IMM_Habour_Net object-group Yavin-Havok object-group citrix-ica access-list CFV_DC_acl extended permit tcp object-group CCL_IMM_Habour_Net host Phoenix object-group CCL_IM_Habour_Phoenix_Tcp access-list CFV_DC_acl extended permit udp object-group CCL_IMM_Habour_Net host Phoenix object-group CCL_IM_Habour_Phoenix_Udp access-list CFV_DC_acl extended permit tcp object-group CCL_IMM_Habour_Net object-group CCL_Intranet object-group HttpHttpsHttp8080 access-list CFV_DC_acl extended permit tcp object-group VNpluto1-2 object-group SGCalypso1-8 object-group NetbiosTcpIP access-list CFV_DC_acl extended permit udp object-group VNpluto1-2 object-group SGCalypso1-8 object-group NetbiosTcpIP access-list CFV_DC_acl remark SCRS 2302 access-list CFV_DC_acl extended permit udp object-group AS_AE_NET object-group SGCalypsoX object-group NetbiosTcpIP access-list CFV_DC_acl remark SCRS 2302 access-list CFV_DC_acl extended permit udp object-group AS_AE_NET object-group SGCalypso3-8 object-group NetbiosTcpIP access-list CFV_DC_acl remark SCRS 2302 access-list CFV_DC_acl remark SCRS 2302 access-list CFV_DC_acl remark SCRS 2302 access-list CFV_DC_acl remark SCRS 2302 access-list CFV_DC_acl remark SCRS 2302 access-list CFV_DC_acl remark SCRS 2302 access-list CFV_DC_acl remark SCRS 2302 access-list CFV_DC_acl extended permit udp object-group AS_AE_NET object-group DPRCalypsoX object-group NetbiosTcpIP access-list CFV_DC_acl remark SCRS 2302 access-list CFV_DC_acl extended permit tcp object-group AS_AE_NET object-group Ascot_SGTitan_SGOrion object-group AS_Oracle_Services access-list CFV_DC_acl remark SCRS 2302 access-list CFV_DC_acl extended permit udp object-group AS_AE_NET object-group Ascot_SGTitan_SGOrion object-group AS_Oracle_Services access-list CFV_DC_acl remark SCRS 2302 access-list CFV_DC_acl extended permit udp object-group AS_AE_NET object-group SGCalypsoX object-group HTTP_HTTPS access-list CFV_DC_acl remark SCRS 2302 access-list CFV_DC_acl extended permit udp object-group AS_AE_NET object-group SGCalypsoX object-group Citrix_Svcs access-list CFV_DC_acl remark SCRS 2302 access-list CFV_DC_acl extended permit udp object-group AS_AE_NET object-group SGCalypso3-8 object-group HTTP_HTTPS access-list CFV_DC_acl remark SCRS 2302 access-list CFV_DC_acl extended permit udp object-group AS_AE_NET object-group SGCalypso3-8 object-group Citrix_Svcs access-list CFV_DC_acl remark SCRS 2302 access-list CFV_DC_acl extended permit tcp object-group AS_AE_NET object-group DPRCalypsoX eq https access-list CFV_DC_acl remark SCRS 2302 access-list CFV_DC_acl extended permit tcp object-group AS_AE_NET object-group DPRCalypsoX eq 8000 access-list CFV_DC_acl remark SCRS 2302 access-list CFV_DC_acl extended permit udp object-group AS_AE_NET object-group DPRCalypsoX object-group Citrix_Svcs access-list CFV_DC_acl extended permit tcp object-group AS_AE_NET object-group SGCalypso1-8 object-group ASTL_CitrixService access-list CFV_DC_acl extended permit udp object-group AS_AE_NET object-group SGCalypso1-8 object-group ASTL_CitrixService access-list CFV_DC_acl extended permit tcp object-group AS_AE_NET object-group SGDeimos1-2 object-group AD_Replication access-list CFV_DC_acl extended permit udp object-group AS_AE_NET object-group SGDeimos1-2 object-group AD_Replication access-list CFV_DC_acl extended permit tcp object-group AS_AE_NET host Prospero object-group HTTP access-list CFV_DC_acl extended permit tcp object-group AS_AE_NET host Ariel object-group MS-OLAP access-list CFV_DC_acl extended permit tcp object-group AS_AE_NET host Ascott_SQL_VIP object-group SQL access-list CFV_DC_acl extended permit ip 10.153.254.232 255.255.255.248 any access-list CFV_DC_acl extended permit icmp any any access-list CFV_DC_acl extended permit icmp any any echo-reply access-list CFV_DC_acl extended permit ip 10.153.254.240 255.255.255.248 any access-list CFV_DC_acl extended permit ip 10.153.254.248 255.255.255.248 any access-list CFV_DC_acl extended permit icmp any object-group HP_Remote_Monitoring_Server access-list CFV_DC_acl extended permit udp any object-group HP_Remote_Monitoring_Server range snmp snmptrap access-list CFV_DC_acl extended permit udp any any eq snmp access-list CFV_DC_acl extended permit udp any any eq snmptrap access-list CFV_DC_acl extended permit udp any object-group Internal_DNS eq domain access-list CFV_DC_acl extended deny ip any any log access-list TRS_DC_IN_acl extended deny ip host Raffles_FW1 any log access-list TRS_DC_IN_acl extended deny ip object-group HP_Monitoring_Hosts any access-list TRS_DC_IN_acl extended deny ip host Monitor-PC any access-list TRS_DC_IN_acl extended deny ip host Raffles_FW1 host Raffles_FW2 log access-list TRS_DC_IN_acl remark SCRS 2271 access-list TRS_DC_IN_acl extended deny ip AScott_TT 255.255.255.0 object-group MSN_Yahoo_Messenger access-list TRS_DC_IN_acl extended permit tcp Raffles_BU_Net 255.255.252.0 host 172.16.65.8 eq www access-list TRS_DC_IN_acl extended permit tcp Raffles_BU_Net 255.255.252.0 host 172.16.65.8 eq https access-list TRS_DC_IN_acl remark April 18-2006 access-list TRS_DC_IN_acl extended permit tcp object-group Resi_Clients object-group China_Servers eq www access-list TRS_DC_IN_acl remark For troubleshooting purpose access-list TRS_DC_IN_acl extended permit tcp object-group Resi_Clients object-group China_Servers eq lotusnotes access-list TRS_DC_IN_acl remark For MRTG at TT_CTRL_104 access-list TRS_DC_IN_acl extended permit udp host Control_DT_104 object-group CTRL_104-MRTG_Devices eq snmp access-list TRS_DC_IN_acl remark For MRTG at TT_CTRL_104 access-list TRS_DC_IN_acl extended permit udp host Control_DT_104 object-group CTRL_104-MRTG_Devices eq snmptrap access-list TRS_DC_IN_acl remark SCRS 2435 access-list TRS_DC_IN_acl extended permit tcp host AScott_Admin_TT host DEMOCRM eq pcanywhere-data access-list TRS_DC_IN_acl remark SCRS 2435 access-list TRS_DC_IN_acl extended permit udp host AScott_Admin_TT host DEMOCRM eq pcanywhere-status access-list TRS_DC_IN_acl remark SCRS 2435 access-list TRS_DC_IN_acl extended permit tcp host 10.153.1.49 host DEMOCRM eq pcanywhere-data access-list TRS_DC_IN_acl remark SCRS 2435 access-list TRS_DC_IN_acl extended permit udp host 10.153.1.49 host DEMOCRM eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group RP_VIP 192.168.181.0 255.255.255.0 object-group AD_TCP_Services log access-list TRS_DC_IN_acl extended permit udp object-group RP_VIP 192.168.181.0 255.255.255.0 object-group AD_UDP_Services log access-list TRS_DC_IN_acl extended permit udp 10.154.7.0 255.255.255.0 object-group Internal_DNS eq domain access-list TRS_DC_IN_acl extended permit ip object-group RP_VIP any log access-list TRS_DC_IN_acl remark SCRS 2337 access-list TRS_DC_IN_acl remark SCRS 2337 access-list TRS_DC_IN_acl extended deny ip 10.154.7.0 255.255.255.0 10.200.0.0 255.255.0.0 access-list TRS_DC_IN_acl remark SCRS 2337 access-list TRS_DC_IN_acl extended deny ip 10.154.7.0 255.255.255.0 object-group CL_Network access-list TRS_DC_IN_acl remark SCRS 2337 access-list TRS_DC_IN_acl extended permit tcp 10.154.7.0 255.255.255.0 any object-group HTTP_HTTPS access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_Hosts Ascott_SG_Transit 255.255.255.0 object-group telnet_ssh access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_Hosts Ascott_SG_Transit 255.255.255.0 object-group HTTP_HTTPS access-list TRS_DC_IN_acl extended permit tcp host TT_XeroxPrinter host Postman201-smts eq smtp access-list TRS_DC_IN_acl extended permit tcp object-group CL_SMTP_Printers host SMTP_Relay_Server eq smtp access-list TRS_DC_IN_acl extended permit tcp object-group Redi_TT_FujiXerox_Printers host SMTP_Relay_Server eq smtp log access-list TRS_DC_IN_acl remark For troubleshooting purpose and will be removed by 12 April 2006. access-list TRS_DC_IN_acl extended permit ip host 10.155.0.31 any access-list TRS_DC_IN_acl remark For Troubleshooting Purposes - access-list TRS_DC_IN_acl extended permit ip host 10.156.202.102 any access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs host Fortigate object-group Control_Services access-list TRS_DC_IN_acl extended deny tcp any host Fortigate object-group Control_Services access-list TRS_DC_IN_acl extended deny icmp any host Fortigate access-list TRS_DC_IN_acl extended permit tcp object-group AS_TT_78-83 object-group AS_JP_Nets eq 5900 access-list TRS_DC_IN_acl remark SCRS 2430 access-list TRS_DC_IN_acl extended permit tcp host 10.154.33.98 host host10_154_39_99 eq telnet access-list TRS_DC_IN_acl extended permit ip Comm_BU_Net 255.255.248.0 host Phoenix access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.248.0 host Trance range 9004 9005 access-list TRS_DC_IN_acl extended permit tcp 10.156.202.0 255.255.255.0 host Falleen eq 1433 access-list TRS_DC_IN_acl remark SCRS 2400 access-list TRS_DC_IN_acl extended permit tcp object-group CCL_Retail_Nets_Mgp host Corsair eq 8080 access-list TRS_DC_IN_acl extended permit tcp host 10.156.10.211 object-group Share_Investor.com range 3090 3091 access-list TRS_DC_IN_acl remark For monitoring purpose. access-list TRS_DC_IN_acl extended permit tcp host Control_DT_105 host 10.154.1.36 eq 524 access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs host 10.155.0.1 eq telnet access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs host CLNS01 object-group BrightStor_Agent access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs host BACKUPCLNS object-group BrightStor_Agent access-list TRS_DC_IN_acl extended permit tcp AScott_TT 255.255.255.0 host SGSun object-group HTTP_HTTPS access-list TRS_DC_IN_acl extended permit tcp object-group AS_TT_H40-H50 host SGSun eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group AS_TT_H40-H50 host SGSun eq pcanywhere-status access-list TRS_DC_IN_acl remark SCRS 2344 access-list TRS_DC_IN_acl remark SCRS 2344 access-list TRS_DC_IN_acl remark SCRS 2330 access-list TRS_DC_IN_acl extended permit tcp object-group CL_SBUs_2006 host WibroAX eq www access-list TRS_DC_IN_acl remark SCRS 2330 access-list TRS_DC_IN_acl extended permit tcp object-group CL_SBUs_2006 host 10.150.211.130 eq www access-list TRS_DC_IN_acl remark SCRS 2335 access-list TRS_DC_IN_acl extended permit tcp host 10.156.2.17 host Flamingo_SMTPRelay eq smtp access-list TRS_DC_IN_acl remark SCRS 2347 access-list TRS_DC_IN_acl extended permit tcp host 10.156.2.28 host Flamingo_SMTPRelay eq smtp access-list TRS_DC_IN_acl extended permit udp host 10.150.205.6 MGT_DC_Subnet 255.255.255.0 eq ntp access-list TRS_DC_IN_acl extended permit udp host 10.150.205.5 MGT_DC_Subnet 255.255.255.0 eq ntp access-list TRS_DC_IN_acl extended permit tcp object-group DPRCalypsoX object-group Ascott_Nets_on-CFV-DC object-group Netbios_TCP access-list TRS_DC_IN_acl extended permit udp object-group DPRCalypsoX object-group Ascott_Nets_on-CFV-DC object-group Netbios_UDP access-list TRS_DC_IN_acl remark SCRS 2312 access-list TRS_DC_IN_acl extended permit tcp object-group AS_Dot_NET_TT-Admin object-group SGCalypsoX eq www access-list TRS_DC_IN_acl remark SCRS 2312 access-list TRS_DC_IN_acl extended permit tcp object-group AS_Dot_NET_TT-Admin object-group SGCalypso3-8 eq www access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_Hosts Comm_BU_Net 255.255.0.0 eq telnet access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_Hosts Comm_BU_Net 255.255.0.0 object-group HTTP_HTTPS access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_Hosts Comm_BU_Net 255.255.0.0 eq ssh access-list TRS_DC_IN_acl extended permit tcp host Control_DT_105 host Jubilee object-group Novel_Imonitor access-list TRS_DC_IN_acl extended permit tcp host Control_DT_105 host CLNS01 object-group Novel_Imonitor access-list TRS_DC_IN_acl extended permit tcp host Control_DT_105 host Phoenix object-group Novel_Imonitor access-list TRS_DC_IN_acl extended permit tcp host Control_DT_105 host BACKUPCLNS object-group Novel_Imonitor access-list TRS_DC_IN_acl extended permit tcp host Control_DT_105 host Arien object-group Novel_Imonitor access-list TRS_DC_IN_acl remark SCRS 2298 access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.28 host 10.156.10.7 eq www access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_Hosts host Anakin_ eq 3389 access-list TRS_DC_IN_acl remark SCRS 2286. access-list TRS_DC_IN_acl extended permit tcp host 10.156.202.35 host 10.61.12.95 object-group PabloJill_Services access-list TRS_DC_IN_acl extended permit udp host 10.154.4.3 object-group Internal_DNS eq domain access-list TRS_DC_IN_acl remark SCRS 2245 access-list TRS_DC_IN_acl remark SCRS 2245 access-list TRS_DC_IN_acl extended permit udp host 10.154.4.4 object-group Internal_DNS eq domain access-list TRS_DC_IN_acl remark SCRS 2245 access-list TRS_DC_IN_acl extended deny ip host 10.154.4.3 object-group CL_Network access-list TRS_DC_IN_acl remark SCRS 2245 access-list TRS_DC_IN_acl extended deny ip host 10.154.4.4 object-group CL_Network access-list TRS_DC_IN_acl remark SCRS 2245 access-list TRS_DC_IN_acl extended permit tcp host 10.154.4.3 any object-group HTTP_HTTPS access-list TRS_DC_IN_acl remark SCRS 2245 access-list TRS_DC_IN_acl extended permit tcp host 10.154.4.4 any object-group HTTP_HTTPS access-list TRS_DC_IN_acl extended permit tcp host 10.154.4.62 host Elixir object-group HTTPS access-list TRS_DC_IN_acl remark SCRS 2308 access-list TRS_DC_IN_acl remark SCRS 2308 access-list TRS_DC_IN_acl extended permit tcp host 10.154.4.62 host Cosmo_ object-group HTTPS access-list TRS_DC_IN_acl remark SCRS 2252, amended with SCRS 2399 access-list TRS_DC_IN_acl extended permit icmp host 10.154.4.60 host 10.154.52.11 access-list TRS_DC_IN_acl remark SCRS 2252, amended with SCRS 2399 access-list TRS_DC_IN_acl extended permit icmp host 10.154.52.11 host 10.154.4.60 echo-reply access-list TRS_DC_IN_acl remark SCRS 2252, amended with SCRS 2399 access-list TRS_DC_IN_acl extended permit tcp host 10.154.4.60 host 10.154.52.11 eq 4370 access-list TRS_DC_IN_acl remark SCRS 2252, amended with SCRS 2399 access-list TRS_DC_IN_acl extended permit udp host 10.154.4.60 host 10.154.52.11 eq 4370 access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host host Tessek eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host TT_Monitoring_Host host Tessek eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host host Dengar eq ssh access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host host Sarlac1 eq ssh access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host host Sarlac2 eq ssh access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs host 10.154.65.250 object-group HTTP_HTTPS access-list TRS_DC_IN_acl remark SCRS 2220 access-list TRS_DC_IN_acl extended permit tcp host 10.154.41.99 host host10_154_4_122 eq 5200 access-list TRS_DC_IN_acl extended permit tcp object-group CLL_CCL_CRL_BUs host Frixgrizz object-group SAP_Client_Services access-list TRS_DC_IN_acl remark SCRS 2180 access-list TRS_DC_IN_acl extended permit tcp host Ascott_H3 host Neucleus1 eq https access-list TRS_DC_IN_acl remark SCRS 2180 access-list TRS_DC_IN_acl extended permit tcp host Ascott_H3 host Aumida eq https access-list TRS_DC_IN_acl remark SCRS 2180 access-list TRS_DC_IN_acl extended permit tcp host 10.153.1.48 host Neucleus1 eq https access-list TRS_DC_IN_acl remark SCRS 2180 access-list TRS_DC_IN_acl extended permit tcp host 10.153.1.48 host Aumida eq https access-list TRS_DC_IN_acl extended permit tcp object-group BU_SAP_Client host Dengar range 8000 8001 access-list TRS_DC_IN_acl remark SCRS 2198 access-list TRS_DC_IN_acl remark SCRS 2198 access-list TRS_DC_IN_acl extended permit tcp object-group BU_SAP_Client host SarDBVirt eq 8000 access-list TRS_DC_IN_acl remark Joshua's urgent request 21-2-2006 access-list TRS_DC_IN_acl extended permit tcp host 10.154.36.0 host Dazzler eq 1433 access-list TRS_DC_IN_acl extended permit udp object-group SBU_Control_PCs object-group ITC_NW_Anti_Spoofing eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs object-group ITC_NW_Anti_Spoofing eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group AS_TT_H40-H50 host AS_Paris_Citrix object-group AS_CitrixNetbiso_UDP access-list TRS_DC_IN_acl extended permit tcp object-group AS_TT_H40-H50 host AS_Paris_Citrix object-group AS_CitrixNetbios_TCP access-list TRS_DC_IN_acl extended permit tcp object-group CLL_CCL_CRL_BUs host Frixgrizz range 2100 2199 access-list TRS_DC_IN_acl remark SCRS 2167 access-list TRS_DC_IN_acl extended permit tcp object-group SAP_Clients host HPMS2 object-group SAP_Client_Services access-list TRS_DC_IN_acl remark SCRS 2167 access-list TRS_DC_IN_acl extended permit tcp object-group SAP_Clients host Frixgrizz object-group SAP_Client_Services access-list TRS_DC_IN_acl remark SAP training. access-list TRS_DC_IN_acl extended permit tcp object-group SAP_Training_Group host Sidaster eq pcanywhere-data access-list TRS_DC_IN_acl remark SAP training. access-list TRS_DC_IN_acl extended permit udp object-group SAP_Training_Group host Sidaster eq pcanywhere-status access-list TRS_DC_IN_acl remark SAP training. access-list TRS_DC_IN_acl extended permit tcp object-group SAP_Training_Group host Tessek eq pcanywhere-data access-list TRS_DC_IN_acl remark SAP training. access-list TRS_DC_IN_acl extended permit udp object-group SAP_Training_Group host Tessek eq pcanywhere-status access-list TRS_DC_IN_acl remark SAP training. access-list TRS_DC_IN_acl extended permit tcp object-group SAP_Training_Group host Dengar eq ssh access-list TRS_DC_IN_acl remark SAP training. access-list TRS_DC_IN_acl extended permit tcp object-group SAP_Training_Group object-group SAP_PhySvr_Group eq ssh access-list TRS_DC_IN_acl remark scrs 2153. access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host host Colossus eq pcanywhere-data access-list TRS_DC_IN_acl remark scrs 2153. access-list TRS_DC_IN_acl extended permit udp host TT_Monitoring_Host host Colossus eq pcanywhere-status access-list TRS_DC_IN_acl remark scrs 2153. access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host host Trance eq pcanywhere-data access-list TRS_DC_IN_acl remark scrs 2153. access-list TRS_DC_IN_acl extended permit udp host TT_Monitoring_Host host Trance eq pcanywhere-status access-list TRS_DC_IN_acl extended permit udp AS_SG_Admin 255.255.255.248 host DEMOCRM eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp AS_SG_Admin 255.255.255.248 host DEMOCRM eq pcanywhere-data access-list TRS_DC_IN_acl extended permit tcp AS_SG_Admin 255.255.255.248 host DEMOCRM eq 1433 access-list TRS_DC_IN_acl extended permit tcp AScott_TT 255.255.255.0 host DEMOCRM object-group HTTP_HTTPS access-list TRS_DC_IN_acl remark SCRS 2302 access-list TRS_DC_IN_acl extended permit tcp object-group Ascott_TT_DC_Admin Ascott_Dubai 255.255.255.0 eq 5900 access-list TRS_DC_IN_acl remark SCRS 2302 access-list TRS_DC_IN_acl extended permit tcp object-group Ascott_TT_Oracle_Team Ascott_Dubai 255.255.255.0 eq 5900 access-list TRS_DC_IN_acl remark SCRS 2127 access-list TRS_DC_IN_acl extended permit tcp object-group Ascott_TT_DC_Admin object-group Ascott_Phillipine eq 5900 access-list TRS_DC_IN_acl remark SCRS 2127 access-list TRS_DC_IN_acl extended permit tcp object-group Ascott_TT_Oracle_Team object-group Ascott_Phillipine eq 5900 access-list TRS_DC_IN_acl remark SCRS 2302 access-list TRS_DC_IN_acl extended permit udp object-group DPRCalypsoX Ascott_Dubai 255.255.255.0 object-group NetbiosTcpIP access-list TRS_DC_IN_acl extended permit udp object-group DPRCalypsoX object-group Ascott_Phillipine object-group NetbiosTcpIP access-list TRS_DC_IN_acl extended permit tcp host TT_10-156-202-190 host HPMS2 range 3000 3099 access-list TRS_DC_IN_acl extended permit tcp host TT_10-156-202-190 host HPMS2 eq 990 access-list TRS_DC_IN_acl extended permit udp host 10.154.65.66 host Colossus object-group Netbios_UDP access-list TRS_DC_IN_acl extended permit tcp host 10.154.65.66 host Colossus object-group Netbios_TCP access-list TRS_DC_IN_acl remark SCRS 2111 access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs host Aumida eq ssh access-list TRS_DC_IN_acl extended permit tcp 10.156.202.0 255.255.255.0 host Tessek_ eq www access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.12 host 10.156.9.103 eq www access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs host Havok eq citrix-ica access-list TRS_DC_IN_acl extended permit tcp host 10.150.121.39 host Neucleus1 object-group Servicedesk_client access-list TRS_DC_IN_acl extended permit tcp host 10.150.123.14 host Neucleus1 object-group Servicedesk_client access-list TRS_DC_IN_acl extended permit tcp host 10.150.121.39 host Warrick object-group Servicedesk_client access-list TRS_DC_IN_acl extended permit tcp host 10.150.123.14 host Warrick object-group Servicedesk_client access-list TRS_DC_IN_acl remark SCRS 2092 access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host 10.150.128.196 object-group Netbios_TCP access-list TRS_DC_IN_acl remark SCRS 2092 access-list TRS_DC_IN_acl extended permit udp Corp_BU_Net 255.255.248.0 host 10.150.128.196 object-group Netbios_UDP access-list TRS_DC_IN_acl extended permit tcp 10.156.202.0 255.255.255.0 host 10.150.128.196 object-group Netbios_TCP access-list TRS_DC_IN_acl extended permit udp 10.156.202.0 255.255.255.0 host 10.150.128.196 object-group Netbios_UDP access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host 10.150.128.196 eq 1433 access-list TRS_DC_IN_acl extended permit tcp 10.156.202.0 255.255.255.0 host 10.150.128.196 eq 1433 access-list TRS_DC_IN_acl extended permit tcp 10.156.202.0 255.255.255.0 host Evanzan eq citrix-ica access-list TRS_DC_IN_acl extended permit tcp 10.156.202.0 255.255.255.0 host Evanzon eq citrix-ica access-list TRS_DC_IN_acl remark SCRS 2084 -- By Paul on 23 Jan 2006. access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host host10_156_2_19 object-group HTTP_HTTPS access-list TRS_DC_IN_acl extended permit icmp host Calisto host Ackbar access-list TRS_DC_IN_acl extended permit tcp host Calisto host Ackbar object-group AD_Trust_TCP access-list TRS_DC_IN_acl extended permit udp host Calisto host Ackbar object-group AD_Trust_UDP access-list TRS_DC_IN_acl extended permit tcp host 10.155.0.101 object-group DCB_RHL_Anti_Spoofing eq lpd access-list TRS_DC_IN_acl extended permit tcp host RHLSVRNOM1 object-group DCB_RHL_Anti_Spoofing object-group AD_TCP_Services access-list TRS_DC_IN_acl extended permit udp host RHLSVRNOM1 object-group DCB_RHL_Anti_Spoofing object-group AD_UDP_Services access-list TRS_DC_IN_acl extended permit tcp host 10.156.202.33 host HPMS2 range 989 990 access-list TRS_DC_IN_acl extended permit tcp host 10.156.202.33 host HPMS2 range 3000 3099 access-list TRS_DC_IN_acl remark SCRS 2042 access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_Hosts host 10.154.65.249 eq ssh access-list TRS_DC_IN_acl remark SCRS 2042 access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_Hosts host 10.154.65.250 eq ssh access-list TRS_DC_IN_acl extended permit tcp host 10.156.202.211 host CLGServer001 eq 8089 access-list TRS_DC_IN_acl extended permit tcp host 10.156.202.211 host CLGServer101 eq 8089 access-list TRS_DC_IN_acl extended permit tcp 10.155.128.0 255.255.255.0 object-group RHL_Citrix_Servers object-group RHL_Services_T CP access-list TRS_DC_IN_acl extended permit udp 10.155.128.0 255.255.255.0 object-group RHL_Citrix_Servers object-group RHL_Services_U DP access-list TRS_DC_IN_acl remark Wan Ching access to Phoenix from TT - SCRS 1977 access-list TRS_DC_IN_acl extended permit tcp host HP_Working_PC host Phoenix eq 524 access-list TRS_DC_IN_acl extended permit tcp host 10.156.202.199 object-group CCL_VIP_VPN_Routers eq 1080 access-list TRS_DC_IN_acl extended permit tcp host 10.156.202.199 object-group CCL_VIP_VPN object-group Susie_VPN_Ports access-list TRS_DC_IN_acl extended permit tcp host 10.156.202.199 object-group CCL_VIP_VPN eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host 10.156.202.199 object-group CCL_VIP_VPN eq pcanywhere-status access-list TRS_DC_IN_acl remark For Troublesooting purposes access-list TRS_DC_IN_acl extended permit icmp host 10.156.202.102 any access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs object-group DCB_RHL_Anti_Spoofing eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group SBU_Control_PCs object-group DCB_RHL_Anti_Spoofing eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group CCT_Properties host Cosmo_ object-group HTTP_HTTPS access-list TRS_DC_IN_acl extended permit tcp object-group CCT_Properties host Elixir object-group HTTP_HTTPS access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.248.0 host Elixir object-group HTTP_HTTPS access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.248.0 host Cosmo_ object-group HTTP_HTTPS access-list TRS_DC_IN_acl remark SCRS 2462 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.248.0 host CCL_Bishop eq 8000 access-list TRS_DC_IN_acl remark SCRS 2462 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.248.0 host Trance eq 1433 access-list TRS_DC_IN_acl remark SCRS 2462 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.248.0 host Trance range 8080 8090 access-list TRS_DC_IN_acl remark SCRS 2462 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.248.0 host Trance range 9000 9010 access-list TRS_DC_IN_acl extended permit tcp host RP_Exinda_Opt host Postman201-smts eq smtp access-list TRS_DC_IN_acl extended permit tcp object-group IT_Control_Hosts host 10.150.200.67 eq ssh access-list TRS_DC_IN_acl extended permit udp host Control_DT_104 any eq snmptrap access-list TRS_DC_IN_acl remark SCRS 1952 access-list TRS_DC_IN_acl extended permit tcp host 10.154.4.59 host CRLNT10 eq www access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Corsair eq 5050 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Corsair eq 8080 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Trance eq 5050 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Trance eq 8080 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.248.0 host Aumida object-group HTTP_HTTPS log access-list TRS_DC_IN_acl extended permit ip host Junct8_traffic_count host FootFall_PC access-list TRS_DC_IN_acl extended permit ip host FootFall_PC host Junct8_traffic_count access-list TRS_DC_IN_acl extended permit tcp host 10.156.202.199 Susie_Home_VPN 255.255.255.0 object-group Susie_VPN_Ports access-list TRS_DC_IN_acl extended permit tcp host Ascott_TT_Host_42 host 10.61.12.174 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host Ascott_TT_Host_42 host 10.61.12.174 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp 10.156.202.0 255.255.255.0 host BACKUPCLNS eq 524 access-list TRS_DC_IN_acl extended permit tcp object-group SAP_Clients host Dengar eq lpd access-list TRS_DC_IN_acl extended permit tcp object-group SAP_Clients host Dengar range 3200 3203 access-list TRS_DC_IN_acl extended permit tcp object-group SAP_Clients host Dengar range 3300 3303 access-list TRS_DC_IN_acl remark SCRS 1898 access-list TRS_DC_IN_acl extended permit tcp object-group SAP_Clients object-group SarApps_Svrs eq lpd access-list TRS_DC_IN_acl remark SCRS 1898 access-list TRS_DC_IN_acl remark SCRS 1898 access-list TRS_DC_IN_acl remark SCRS 1898 access-list TRS_DC_IN_acl extended permit ip host COMM-CONTROL1 object-group DC_Control_Hosts access-list TRS_DC_IN_acl remark SCRS 1898 access-list TRS_DC_IN_acl extended permit tcp object-group SAP_Clients object-group SarApps_Svrs range 3200 3203 access-list TRS_DC_IN_acl remark SCRS 1898 access-list TRS_DC_IN_acl extended permit tcp object-group SAP_Developer host 203.125.30.97 eq 3299 access-list TRS_DC_IN_acl remark SCRS 1898 access-list TRS_DC_IN_acl extended permit tcp object-group SAP_Developer host 203.125.30.99 eq smtp access-list TRS_DC_IN_acl extended permit tcp host 10.156.202.220 host CLNS01 eq 524 access-list TRS_DC_IN_acl extended permit tcp host 10.156.202.198 host CLNS01 eq 524 access-list TRS_DC_IN_acl extended permit icmp Resi_BU_Net 255.255.0.0 host Arien access-list TRS_DC_IN_acl extended permit tcp host RHLSVRNOM1 object-group STMS_RCH_Access eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp 10.156.201.0 255.255.255.0 host Fortigate eq https access-list TRS_DC_IN_acl extended permit tcp object-group Ascott_TT_DC_Admin Ascot_Korea 255.255.255.0 eq 5900 access-list TRS_DC_IN_acl extended permit tcp object-group Ascott_TT_Oracle_Team Ascot_Korea 255.255.255.0 eq 5900 access-list TRS_DC_IN_acl extended permit tcp host GeralLee_Corp object-group SGTitanX-SGOrionX object-group AS_Oracle_Services access-list TRS_DC_IN_acl extended permit tcp host GeralLee_Corp object-group SGTitanX-SGOrionX object-group NetbiosTcpIP access-list TRS_DC_IN_acl extended permit udp host GeralLee_Corp object-group SGTitanX-SGOrionX object-group NetbiosTcpIP access-list TRS_DC_IN_acl extended permit tcp object-group TRS_DC_IN_Anti_Spoofing host Ackbar range ftp-data ftp access-list TRS_DC_IN_acl extended permit tcp object-group CLL_CCL_CRL_BUs host Tessek eq 3200 access-list TRS_DC_IN_acl extended permit tcp host 10.156.202.238 host Phoenix eq 524 access-list TRS_DC_IN_acl extended permit udp 10.156.202.0 255.255.255.0 host Rodian range 1812 1813 access-list TRS_DC_IN_acl extended permit udp 10.156.202.0 255.255.255.0 host Ackbar range 1812 1813 access-list TRS_DC_IN_acl extended permit tcp object-group Ascott_TT_DC_Admin 10.153.46.0 255.255.255.0 eq 5900 access-list TRS_DC_IN_acl extended permit tcp object-group Ascott_TT_Oracle_Team 10.153.46.0 255.255.255.0 eq 5900 access-list TRS_DC_IN_acl extended permit tcp host Ascott_TT_Host_42 Ascott_BU_Net 255.255.0.0 eq 5900 access-list TRS_DC_IN_acl extended permit tcp object-group IT_Control_Hosts IPQ_Subnet 255.255.255.0 object-group telnet_ssh access-list TRS_DC_IN_acl extended permit tcp host 10.156.202.250 host Phoenix eq 524 access-list TRS_DC_IN_acl extended permit tcp host Ascott_TT_Host_43 object-group Ascott_Nets_on-CFV-DC eq 5900 access-list TRS_DC_IN_acl extended permit tcp host 10.156.202.250 host CCL_Bishop eq 1433 access-list TRS_DC_IN_acl extended permit tcp host 10.156.202.250 host Dazzler eq 1433 access-list TRS_DC_IN_acl extended permit tcp 10.156.201.0 255.255.255.0 host 10.154.63.6 eq telnet access-list TRS_DC_IN_acl extended permit tcp 10.156.201.0 255.255.255.0 host 172.22.22.4 eq ssh access-list TRS_DC_IN_acl extended permit tcp object-group CCL_Retail_Telnet_Hosts_Mgp host Orome eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_Hosts host 10.150.205.3 eq https access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_Hosts host Fortigate eq https access-list TRS_DC_IN_acl extended permit icmp IPQ_Subnet 255.255.255.0 host Monitor-PC access-list TRS_DC_IN_acl extended permit tcp host Corp_Host_122-101 host Ascott-BPE-Srv object-group Titania_SCRS1746 access-list TRS_DC_IN_acl extended permit tcp host GeralLee_Corp host Ascott-BPE-Srv object-group Titania_SCRS1746 access-list TRS_DC_IN_acl extended permit tcp host 10.150.127.16 host Ascott-BPE-Srv object-group Titania_SCRS1746 access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Tessek_ eq 3200 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Tessek_ eq 3200 access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Tessek_ eq 3200 access-list TRS_DC_IN_acl extended permit tcp host 10.154.4.49 host 10.154.64.10 eq 8080 access-list TRS_DC_IN_acl extended permit tcp host 10.154.1.42 Ascott_BU_Net 255.255.0.0 eq 5900 access-list TRS_DC_IN_acl extended permit tcp host 10.154.4.50 host 10.154.64.10 eq 8080 access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Chripa eq citrix-ica access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Evanzon eq citrix-ica access-list TRS_DC_IN_acl extended permit tcp host 10.156.202.102 host 203.125.137.126 eq 8003 access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Novell_Servers host Ackbar eq ldap access-list TRS_DC_IN_acl extended permit udp object-group SBU_Novell_Servers host Ackbar eq 427 access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Novell_Servers host Ackbar eq 524 access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Novell_Servers host Ackbar eq 8000 access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Novell_Servers host Ackbar eq 8090 access-list TRS_DC_IN_acl remark SCRS 2445 access-list TRS_DC_IN_acl extended permit tcp object-group CL_SBUs host WibroAX eq www access-list TRS_DC_IN_acl extended permit tcp object-group CL_SBUs host Ackbar object-group AD_TCP_Services access-list TRS_DC_IN_acl extended permit udp object-group CL_SBUs host Ackbar object-group AD_UDP_Services access-list TRS_DC_IN_acl extended permit tcp object-group CL_SBUs host Ackbar range 7000 7200 access-list TRS_DC_IN_acl extended permit tcp host COMM-CONTROL1 host Retail_Net_GW41_1 eq ssh access-list TRS_DC_IN_acl extended permit udp object-group RP_Bloomberg_PCs object-group Bloomberg_Severs range 48129 48137 access-list TRS_DC_IN_acl extended permit tcp object-group RP_Bloomberg_PCs object-group Bloomberg_Severs object-group RP_Bloomberg access-list TRS_DC_IN_acl extended permit tcp host 10.155.0.101 object-group RHL_Citrix_Servers eq 9100 access-list TRS_DC_IN_acl extended permit udp Net_RHL 255.255.254.0 object-group Internal_DNS eq domain access-list TRS_DC_IN_acl extended permit tcp Net_RHL 255.255.254.0 object-group RHL_Citrix_Servers eq 2598 access-list TRS_DC_IN_acl extended permit tcp Net_RHL 255.255.254.0 object-group RHL_Citrix_Servers eq 1433 access-list TRS_DC_IN_acl extended permit udp Net_RHL 255.255.254.0 object-group RHL_Citrix_Servers eq 1604 access-list TRS_DC_IN_acl extended permit tcp Net_RHL 255.255.254.0 object-group RHL_Citrix_Servers eq 2513 access-list TRS_DC_IN_acl extended permit tcp Net_RHL 255.255.254.0 object-group RHL_Citrix_Servers eq citrix-ica access-list TRS_DC_IN_acl extended permit tcp Net_RHL 255.255.254.0 host Arien eq www access-list TRS_DC_IN_acl extended permit tcp Net_RHL 255.255.254.0 host Arien object-group Ifolder access-list TRS_DC_IN_acl extended permit tcp Net_RHL 255.255.254.0 host Orome eq www access-list TRS_DC_IN_acl extended permit tcp Net_RHL 255.255.254.0 host Orome eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp Net_RHL 255.255.254.0 host Sicrus_Server eq www access-list TRS_DC_IN_acl extended permit tcp Net_RHL 255.255.254.0 host Iarwain eq www access-list TRS_DC_IN_acl extended permit tcp Net_RHL 255.255.254.0 host Iarwain eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp Net_RHL 255.255.254.0 10.200.0.0 255.254.0.0 eq www access-list TRS_DC_IN_acl extended permit tcp Net_RHL 255.255.254.0 10.200.0.0 255.254.0.0 eq https access-list TRS_DC_IN_acl extended permit tcp Net_RHL 255.255.254.0 10.200.0.0 255.254.0.0 eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp Net_RHL 255.255.254.0 any eq h323 access-list TRS_DC_IN_acl extended permit tcp Net_RHL 255.255.254.0 any eq www access-list TRS_DC_IN_acl extended permit tcp Net_RHL 255.255.254.0 any range ftp-data ftp access-list TRS_DC_IN_acl extended permit tcp Net_RHL 255.255.254.0 any eq https access-list TRS_DC_IN_acl extended permit tcp Net_RHL 255.255.254.0 any eq 8080 access-list TRS_DC_IN_acl extended permit tcp host 10.156.202.220 host 10.150.200.6 eq ssh access-list TRS_DC_IN_acl extended permit udp AScott_TT 255.255.255.0 any eq domain access-list TRS_DC_IN_acl extended permit icmp AScott_TT 255.255.255.0 any access-list TRS_DC_IN_acl extended permit tcp AScott_TT 255.255.255.0 object-group Ascott_Exchange_Servers eq smtp access-list TRS_DC_IN_acl extended permit tcp AScott_TT 255.255.255.0 object-group Ascott_Exchange_Servers eq https access-list TRS_DC_IN_acl extended permit tcp AScott_TT 255.255.255.0 object-group Ascott_Exchange_Servers eq 993 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 object-group Ascott_Exchange_Servers eq smtp access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 object-group Ascott_Exchange_Servers eq https access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 object-group Ascott_Exchange_Servers eq 993 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.248.0 host CCL_Bishop eq 1434 access-list TRS_DC_IN_acl extended permit udp Comm_BU_Net 255.255.248.0 host CCL_Bishop eq 1434 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.248.0 host CCL_Bishop object-group NetbiosTcpIP access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.248.0 host Dazzler object-group NetbiosTcpIP access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.248.0 host Trance object-group NetbiosTcpIP access-list TRS_DC_IN_acl extended permit udp object-group CCL_Retail_Nets_Mgp object-group Internal_DNS eq domain access-list TRS_DC_IN_acl extended permit tcp object-group CCL_Retail_Nets_Mgp host Trendmicro object-group HTTP_HTTPS access-list TRS_DC_IN_acl extended permit tcp object-group CCL_Retail_Nets_Mgp host Holocam object-group HTTP_HTTPS access-list TRS_DC_IN_acl extended permit tcp object-group CCL_Retail_Nets_Mgp host 10.154.1.36 object-group HTTP_HTTPS access-list TRS_DC_IN_acl extended permit tcp object-group CCL_Retail_Nets_Mgp 10.200.0.0 255.254.0.0 eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp object-group CCL_Retail_Nets_Mgp host Iarwain eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp object-group CCL_Retail_Nets_Mgp host Orome eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp object-group CCL_Retail_Nets_Mgp host Arien eq 524 access-list TRS_DC_IN_acl extended permit tcp object-group CCL_Retail_Nets_Mgp TMP_CM_Subnet 255.255.255.240 eq 524 access-list TRS_DC_IN_acl extended permit tcp object-group CCL_Retail_Nets_Mgp host Orome eq 524 access-list TRS_DC_IN_acl extended permit tcp object-group CCL_Retail_Nets_Mgp host Rodian object-group AD_TCP_Services access-list TRS_DC_IN_acl extended permit tcp object-group CCL_Retail_Nets_Mgp host Rodian eq 7010 access-list TRS_DC_IN_acl extended permit tcp object-group CCL_Retail_Nets_Mgp host Rodian range 7000 7200 access-list TRS_DC_IN_acl extended permit udp object-group CCL_Retail_Nets_Mgp host Rodian object-group AD_UDP_Services access-list TRS_DC_IN_acl extended permit tcp object-group CCL_Retail_Nets_Mgp host Marlex object-group Unicenter-RC1 access-list TRS_DC_IN_acl extended permit tcp object-group CCL_Retail_Stagging_Hosts_Mgp host Marlex object-group Unicenter_SD1_RC1 access-list TRS_DC_IN_acl extended permit udp object-group CCL_Retail_Stagging_Hosts_Mgp host Marlex eq 4104 access-list TRS_DC_IN_acl extended permit ip host 10.154.4.232 host 211.152.32.81 access-list TRS_DC_IN_acl extended permit tcp host FootFall_PC object-group Traffic_Counts_System object-group NetbiosTcpIP access-list TRS_DC_IN_acl extended permit tcp host FootFall_PC object-group FootFall_SNMP_Servers eq smtp access-list TRS_DC_IN_acl extended permit udp host FootFall_PC object-group Traffic_Counts_System object-group NetbiosTcpIP access-list TRS_DC_IN_acl extended permit tcp host FootFall_PC object-group Traffic_Counts_System object-group FootFall_Monitoring access-list TRS_DC_IN_acl extended permit tcp host 10.154.4.50 host 10.154.64.2 eq 8080 access-list TRS_DC_IN_acl extended permit tcp host 10.154.4.49 host 10.154.64.2 eq 8080 access-list TRS_DC_IN_acl extended permit tcp host 10.154.4.100 host CLNS01 eq 524 access-list TRS_DC_IN_acl extended deny tcp object-group CL_SBUs any eq 1863 log access-list TRS_DC_IN_acl extended permit tcp host Residential_SISV host SISV_SQL_Server eq 1433 access-list TRS_DC_IN_acl extended permit tcp host 10.156.2.88 host Resi_Proche_Server eq telnet access-list TRS_DC_IN_acl extended permit tcp host 10.156.2.88 host Flamingo_SMTPRelay eq smtp access-list TRS_DC_IN_acl extended permit tcp host 10.156.2.88 host Resi_Proche_Server eq 449 access-list TRS_DC_IN_acl extended permit tcp host 10.156.2.88 host Resi_Proche_Server eq 1433 access-list TRS_DC_IN_acl extended permit tcp host 10.156.2.88 host Resi_Proche_Server eq 4545 access-list TRS_DC_IN_acl extended permit tcp host 10.156.2.88 host Resi_Proche_Server range 8470 8476 access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host object-group Mark_SQL_Managed_Servers object-group SQL access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host object-group Mark_SQL_Managed_Servers eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host TT_Monitoring_Host object-group Mark_SQL_Managed_Servers eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host object-group Mark_Mng_Rafles_SQL object-group SQL access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host object-group Mark_Mng_Rafles_SQL object-group NetOps access-list TRS_DC_IN_acl extended permit icmp object-group SBU_Control_PCs any access-list TRS_DC_IN_acl extended permit tcp host 10.156.202.102 Comm_BU_Net 255.255.0.0 eq www access-list TRS_DC_IN_acl extended permit tcp host 10.156.202.102 Comm_BU_Net 255.255.0.0 eq telnet access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.4 host Ascott-BPE-Srv eq www access-list TRS_DC_IN_acl extended permit tcp host Corp_Host_122-101 host Ascott-BPE-Srv eq www access-list TRS_DC_IN_acl extended permit tcp host GeralLee_Corp host Ascott-BPE-Srv eq www access-list TRS_DC_IN_acl extended permit tcp host 10.157.3.21 host 194.170.246.135 eq ftp access-list TRS_DC_IN_acl extended permit tcp host 10.157.3.30 host 194.170.246.135 eq ftp access-list TRS_DC_IN_acl extended permit tcp host 10.156.202.220 host Fortigate eq https access-list TRS_DC_IN_acl extended permit tcp host 10.156.202.220 any eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host 10.156.202.220 any eq pcanywhere-status access-list TRS_DC_IN_acl extended permit icmp AScott_TT 255.255.255.0 object-group SGDeimosX access-list TRS_DC_IN_acl extended permit tcp host JoanneTan host CRLNT10 eq www access-list TRS_DC_IN_acl extended permit tcp host 10.156.2.29 host Flamingo_SMTPRelay eq smtp access-list TRS_DC_IN_acl extended permit tcp object-group Ascott_Oracle_Team object-group Ascott_SG_Properties eq 5900 access-list TRS_DC_IN_acl extended permit tcp object-group Ascott_Oracle_Team object-group Ascott_China eq 5900 access-list TRS_DC_IN_acl extended permit tcp object-group Ascott_Oracle_Team object-group Ascott_Vietnam eq 5900 access-list TRS_DC_IN_acl extended permit tcp object-group Ascott_Oracle_Team Ascott_Malaysia 255.255.255.0 eq 5900 access-list TRS_DC_IN_acl extended permit tcp object-group Ascott_Oracle_Team object-group ASKR_NET_10-153-56 eq 5900 access-list TRS_DC_IN_acl extended permit tcp object-group Ascott_Oracle_Team object-group Ascott_Thailand eq 5900 access-list TRS_DC_IN_acl extended permit tcp object-group Ascott_Oracle_Team Ascott_Dubai 255.255.255.0 eq 5900 access-list TRS_DC_IN_acl extended permit tcp object-group Ascott_Oracle_Team object-group Ascott_Australia eq 5900 access-list TRS_DC_IN_acl extended permit tcp 10.156.202.0 255.255.255.0 host ArchivalTest range 1200 1215 access-list TRS_DC_IN_acl extended permit tcp host 10.156.202.199 host Melasia1 eq 8416 access-list TRS_DC_IN_acl extended permit tcp host 10.156.202.199 host GALA eq 8216 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Dazzler eq 1433 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Dazzler range 2393 2394 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Dazzler eq 2725 access-list TRS_DC_IN_acl extended permit tcp 10.156.202.0 255.255.255.0 host Monitor-PC eq 8080 access-list TRS_DC_IN_acl extended permit tcp object-group Comm_Subnets_TRS_DC host Neucleus1 eq https access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Neucleus1 eq https access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Neucleus1 eq https access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.28 host CRLNT10 eq www access-list TRS_DC_IN_acl extended permit tcp object-group CL_SBUs host Netrust_LDAP eq ldap access-list TRS_DC_IN_acl extended permit tcp Raffles_BU_Net 255.255.0.0 any eq ldap access-list TRS_DC_IN_acl extended permit tcp Raffles_BU_Net 255.255.0.0 any eq 554 access-list TRS_DC_IN_acl extended permit tcp Raffles_BU_Net 255.255.0.0 any eq 1755 access-list TRS_DC_IN_acl extended permit tcp Raffles_BU_Net 255.255.0.0 any range 8000 8002 access-list TRS_DC_IN_acl extended permit udp Raffles_BU_Net 255.255.0.0 any eq ntp access-list TRS_DC_IN_acl extended permit udp Raffles_BU_Net 255.255.0.0 any eq domain access-list TRS_DC_IN_acl extended permit udp object-group TRS_DC_IN_Anti_Spoofing any eq 1755 access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 any eq domain access-list TRS_DC_IN_acl extended permit udp Resi_BU_Net 255.255.0.0 any eq domain access-list TRS_DC_IN_acl extended permit tcp object-group TRS_DC_IN_Anti_Spoofing object-group Internal_DNS eq domain access-list TRS_DC_IN_acl extended permit udp object-group TRS_DC_IN_Anti_Spoofing object-group Internal_DNS eq domain access-list TRS_DC_IN_acl extended permit tcp host 10.156.2.32 host Flamingo_SMTPRelay eq smtp access-list TRS_DC_IN_acl extended permit tcp object-group TRS_DC_IN_Anti_Spoofing host Flamingo_SMTPRelay eq smtp access-list TRS_DC_IN_acl extended permit tcp object-group CA_TT host 10.150.119.65 range 135 netbios-ssn access-list TRS_DC_IN_acl extended permit udp object-group CA_TT host 10.150.119.65 eq 4104 access-list TRS_DC_IN_acl extended permit tcp object-group CA_TT host 10.150.119.65 eq 4721 access-list TRS_DC_IN_acl extended permit tcp object-group CA_TT host 10.150.119.65 eq 4105 access-list TRS_DC_IN_acl extended permit tcp object-group CA_TT host 10.150.119.65 eq 4724 access-list TRS_DC_IN_acl extended permit tcp object-group CA_TT host 10.150.119.65 eq 4725 access-list TRS_DC_IN_acl extended permit udp object-group CA_TT host 10.150.119.65 eq 4725 access-list TRS_DC_IN_acl extended permit tcp object-group CA_TT host 10.150.119.65 eq 8034 access-list TRS_DC_IN_acl extended permit tcp AScott_TT 255.255.255.0 host 10.153.2.180 eq www access-list TRS_DC_IN_acl extended permit tcp host 10.150.121.16 host CRLNT10 eq www access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host CRLNT10 eq www access-list TRS_DC_IN_acl extended permit tcp host 10.154.1.251 host CRLNT10 eq www access-list TRS_DC_IN_acl extended permit tcp host 10.154.1.252 host CRLNT10 eq www access-list TRS_DC_IN_acl extended permit tcp host 10.154.1.253 host CRLNT10 eq www access-list TRS_DC_IN_acl extended permit tcp host 10.154.1.254 host CRLNT10 eq www access-list TRS_DC_IN_acl extended permit tcp host 10.154.4.244 host CRLNT10 eq www access-list TRS_DC_IN_acl extended permit tcp Raffles_BU_Net 255.255.0.0 host Raffles-com eq smtp access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Falleen object-group AD_TCP_Services access-list TRS_DC_IN_acl extended permit udp Corp_BU_Net 255.255.248.0 host Falleen object-group AD_UDP_Services access-list TRS_DC_IN_acl extended permit tcp host Tham_Kui_Seng host host10_156_2_19 eq 85 access-list TRS_DC_IN_acl extended permit tcp host Corp_JenniferWong host host10_156_2_19 eq 85 access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host host Resi_Proche_Server eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host TT_Monitoring_Host host Resi_Proche_Server eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host host Caliban eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host TT_Monitoring_Host host Caliban eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp host COMM-CONTROL1 host VPN_Aventail2 eq ssh access-list TRS_DC_IN_acl extended permit tcp host COMM-CONTROL1 host VPN_Aventail2 eq 8443 access-list TRS_DC_IN_acl extended permit tcp host DPRCalypso1 host CLG001 eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp host DPRCalypso1 host CLG101 eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp host 10.156.202.199 host Postman201-smts eq smtp access-list TRS_DC_IN_acl extended permit tcp object-group Ascott_LC_Admin1 host 10.150.131.109 object-group AD_TCP_Services access-list TRS_DC_IN_acl extended permit udp object-group Ascott_LC_Admin1 host 10.150.131.109 object-group AD_Trust_UDP access-list TRS_DC_IN_acl extended permit tcp object-group Ascott_LC_Admin1 host 10.150.131.109 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group Ascott_LC_Admin1 host 10.150.131.109 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp host host10_154_4_122 object-group CCL_Retail_99_Hosts eq telnet access-list TRS_DC_IN_acl extended permit tcp object-group MRLiu host SIS_Server1 eq 3090 access-list TRS_DC_IN_acl extended permit tcp object-group MRLiu host CLNS01 object-group NetbiosTcpIP access-list TRS_DC_IN_acl extended permit udp object-group MRLiu host CLNS01 object-group NetbiosTcpIP access-list TRS_DC_IN_acl extended permit tcp object-group MRLiu host CLNS01 eq 524 access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_Hosts host Falleen eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group SBU_Control_Hosts host Falleen eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Falleen eq citrix-ica access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Falleen eq 1433 access-list TRS_DC_IN_acl extended permit udp Corp_BU_Net 255.255.248.0 host Falleen object-group NetbiosTcpIP access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Falleen object-group NetbiosTcpIP access-list TRS_DC_IN_acl extended permit udp object-group IT_Control_Hosts object-group Corp_Servers_VL134 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group IT_Control_Hosts object-group Corp_Servers_VL134 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs object-group SAP_PhySvr_Group range ssh telnet access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs host Brocade_Switch eq telnet access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs host Fortigate eq https access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs DCB_RHL_Subnet 255.255.255.0 eq citrix-ica access-list TRS_DC_IN_acl extended permit tcp object-group RHL_Svr object-group DC_Control_Hosts eq 6502 access-list TRS_DC_IN_acl extended permit tcp object-group RHL_Svr object-group SBU_Control_PCs eq 6502 access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs object-group RHL_Svr eq 6502 access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs host Sidaster eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group SBU_Control_PCs host Sidaster eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs TMP_CG_subnet 255.255.255.192 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group SBU_Control_PCs TMP_CG_subnet 255.255.255.192 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs TMP_SZ2 255.255.255.240 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group SBU_Control_PCs TMP_SZ2 255.255.255.240 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs DMZ 255.255.255.192 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group SBU_Control_PCs DMZ 255.255.255.192 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs TMP_AS_Subnet 255.255.255.240 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group SBU_Control_PCs TMP_AS_Subnet 255.255.255.240 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs TMP_A2_Subnet 255.255.255.240 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group SBU_Control_PCs TMP_A2_Subnet 255.255.255.240 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs TMP_CM_Subnet 255.255.255.240 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group SBU_Control_PCs TMP_CM_Subnet 255.255.255.240 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs TMP_RS_Subnet 255.255.255.240 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group SBU_Control_PCs TMP_RS_Subnet 255.255.255.240 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs STA_AS_Subnet 255.255.255.192 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group SBU_Control_PCs STA_AS_Subnet 255.255.255.192 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs CCL_AS_Subnet 255.255.255.192 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group SBU_Control_PCs CCL_AS_Subnet 255.255.255.192 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs 10.150.128.192 255.255.255.192 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group SBU_Control_PCs 10.150.128.192 255.255.255.192 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs TMP_SZ1_Subnet 255.255.255.192 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group SBU_Control_PCs TMP_SZ1_Subnet 255.255.255.192 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs TMP_SZ_Subnet 255.255.255.240 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group SBU_Control_PCs TMP_SZ_Subnet 255.255.255.240 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs DCB_AS_Subnet 255.255.255.0 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group SBU_Control_PCs DCB_AS_Subnet 255.255.255.0 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs DCB_CM_Subnet 255.255.255.0 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group SBU_Control_PCs DCB_CM_Subnet 255.255.255.0 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs DCB_CP_Subnet 255.255.255.0 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group SBU_Control_PCs DCB_CP_Subnet 255.255.255.0 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs DCB_RHL_Subnet 255.255.255.0 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group SBU_Control_PCs DCB_RHL_Subnet 255.255.255.0 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs Buz_Partner 255.255.255.0 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group SBU_Control_PCs Buz_Partner 255.255.255.0 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs ITC_NW_subnet 255.255.255.0 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group SBU_Control_PCs ITC_NW_subnet 255.255.255.0 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs Security_Ctrl_Zone 255.255.255.0 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group SBU_Control_PCs Security_Ctrl_Zone 255.255.255.0 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs CSR_CL_subnet 255.255.255.0 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group SBU_Control_PCs CSR_CL_subnet 255.255.255.0 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs CSR_CG_Subnet 255.255.255.0 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group SBU_Control_PCs CSR_CG_Subnet 255.255.255.0 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs EMC_DC 255.255.255.0 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group SBU_Control_PCs EMC_DC 255.255.255.0 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group TT_Control_Hosts host COMM-CONTROL1 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group TT_Control_Hosts host COMM-CONTROL1 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group TT_Control_Hosts host CT_CA_Console eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group TT_Control_Hosts host CT_CA_Console eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp host COMM-CONTROL1 object-group TT_Control_Hosts eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host COMM-CONTROL1 object-group TT_Control_Hosts eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp host COMM-CONTROL1 host CT_CA_Console eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host COMM-CONTROL1 host CT_CA_Console eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp host CT_CA_Console object-group TT_Control_Hosts eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host CT_CA_Console object-group TT_Control_Hosts eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp host CT_CA_Console host COMM-CONTROL1 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host CT_CA_Console host COMM-CONTROL1 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs Corp_BU_Net 255.255.248.0 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group SBU_Control_PCs Corp_BU_Net 255.255.248.0 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs Comm_BU_Net 255.255.248.0 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group SBU_Control_PCs Comm_BU_Net 255.255.248.0 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs object-group RHL_Svr eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group SBU_Control_PCs object-group RHL_Svr eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs object-group ILO_DC_Anti_Spoofing eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group SBU_Control_PCs object-group ILO_DC_Anti_Spoofing eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs Comm_BU_Net 255.255.248.0 eq 524 access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs Corp_BU_Net 255.255.248.0 eq 524 access-list TRS_DC_IN_acl extended permit tcp object-group IT_Control_Hosts host Retail_Net_GW41_1 eq ssh access-list TRS_DC_IN_acl extended deny tcp host CT_CA_Console host Trendmicro eq www access-list TRS_DC_IN_acl extended deny tcp host COMM-CONTROL1 host Trendmicro eq www access-list TRS_DC_IN_acl extended permit tcp object-group IT_Control_Hosts TMP_CG_subnet 255.255.255.192 eq www access-list TRS_DC_IN_acl extended permit tcp host 10.156.202.182 object-group Ascott_SG_Properties eq 5900 access-list TRS_DC_IN_acl extended permit tcp host 10.156.202.182 AScott_TT 255.255.255.0 eq 5900 access-list TRS_DC_IN_acl extended permit udp object-group CRL_PC host Lobot range netbios-ns 139 access-list TRS_DC_IN_acl extended permit tcp object-group Resi_DCs object-group Galadriel_Orome_Grp eq domain access-list TRS_DC_IN_acl extended permit udp object-group Resi_DCs object-group Galadriel_Orome_Grp eq domain access-list TRS_DC_IN_acl extended permit tcp object-group Resi_DCs host Rodian object-group Resi_AD_Trust_TCP access-list TRS_DC_IN_acl extended permit udp object-group Resi_DCs host Rodian object-group Resi_AD_Trust_UDP access-list TRS_DC_IN_acl extended permit tcp object-group Resi_DCs host Rodian range 7000 7200 access-list TRS_DC_IN_acl extended permit icmp object-group Resi_DCs host Rodian access-list TRS_DC_IN_acl extended permit tcp object-group Resi_DCs host Ackbar object-group Resi_AD_Trust_TCP access-list TRS_DC_IN_acl extended permit udp object-group Resi_DCs host Ackbar object-group Resi_AD_Trust_UDP access-list TRS_DC_IN_acl extended permit tcp object-group Resi_DCs host Ackbar range 7000 7200 access-list TRS_DC_IN_acl extended permit icmp object-group Resi_DCs host Ackbar access-list TRS_DC_IN_acl extended permit tcp host 10.157.3.30 host 202.138.112.194 object-group FTP access-list TRS_DC_IN_acl extended permit tcp host 10.157.3.21 host 202.138.112.194 object-group FTP access-list TRS_DC_IN_acl extended permit udp host TT_Monitoring_Host object-group DC_Control_Hosts eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host object-group DC_Control_Hosts eq pcanywhere-data access-list TRS_DC_IN_acl extended permit tcp host Corp_JenniferWong host host10_156_2_19 eq lotusnotes access-list TRS_DC_IN_acl extended permit udp AScott_Admin_TT 255.255.255.248 Ascott_Malaysia 255.255.255.0 object-group Ascott_Admi n_Ports_UDP access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 host Ascott_Malaysia object-group Ascott_Admin_Ports_T CP access-list TRS_DC_IN_acl extended permit udp AScott_Admin_TT 255.255.255.248 ASTL_NET_10-153-75 255.255.255.0 object-group Ascott_A dmin_Ports_UDP access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 ASTL_NET_10-153-75 255.255.255.0 object-group Ascott_A dmin_Ports_TCP access-list TRS_DC_IN_acl extended permit tcp object-group IT_Control_Hosts object-group DC_Exinda object-group ssh_https access-list TRS_DC_IN_acl extended permit udp object-group Ascott_TT object-group SGCalypsoX object-group NetbiosTcpIP access-list TRS_DC_IN_acl extended permit tcp object-group Ascott_TT object-group SGCalypsoX object-group NetbiosTcpIP access-list TRS_DC_IN_acl extended permit udp object-group Ascott_TT object-group SGCalypso5-8 object-group NetbiosTcpIP access-list TRS_DC_IN_acl extended permit tcp object-group Ascott_TT object-group SGCalypso5-8 object-group NetbiosTcpIP access-list TRS_DC_IN_acl extended permit tcp object-group CLL_CCL_CRL_BUs host Anakin_ range 1200 1215 access-list TRS_DC_IN_acl extended permit tcp object-group IT_Control_Hosts host AscottRT eq telnet access-list TRS_DC_IN_acl extended permit udp host 10.154.4.111 host Aumida object-group HTTP_HTTPS access-list TRS_DC_IN_acl extended permit udp AScott_Admin_TT 255.255.255.248 object-group AS_Oversea_Nets object-group Mike_KM_Leon _Svs access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 object-group AS_Oversea_Nets object-group Mike_KM_Leon _Svs access-list TRS_DC_IN_acl extended permit ip host Control_DT_102 Comm_BU_Net 255.255.0.0 access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_Hosts host CLNS01 eq 524 access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_Hosts host BACKUPCLNS eq 524 access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_Hosts host Jubilee eq 524 access-list TRS_DC_IN_acl extended permit udp host 172.22.22.4 host GALA eq syslog access-list TRS_DC_IN_acl extended permit udp host 172.22.22.6 host GALA eq syslog access-list TRS_DC_IN_acl extended permit tcp object-group Ascott_Admin_Hosts host Aumida object-group HTTP_HTTPS access-list TRS_DC_IN_acl extended permit tcp host Ascott_TT_Host_43 object-group AS_CN_AU_deimos eq pcanywhere-data access-list TRS_DC_IN_acl extended permit tcp host Ascott_TT_Host_47 object-group AS_CN_AU_deimos eq pcanywhere-data access-list TRS_DC_IN_acl extended permit tcp AScott_TT 255.255.255.0 host Ariel eq 2725 access-list TRS_DC_IN_acl extended permit tcp AScott_TT 255.255.255.0 host Ariel range 2393 2394 access-list TRS_DC_IN_acl extended permit tcp host 10.156.2.21 host Flamingo_SMTPRelay eq smtp access-list TRS_DC_IN_acl extended permit tcp host Control_DT_101 host Arien eq 52443 access-list TRS_DC_IN_acl extended permit tcp host AScott_TT host Ariel range 2393 2394 access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host host DPRStephano1 eq 5900 access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_Hosts host 10.150.205.6 eq telnet access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_Hosts host 10.150.205.6 eq ssh access-list TRS_DC_IN_acl extended permit tcp Net_RHL 255.255.0.0 10.200.0.0 255.254.0.0 eq www access-list TRS_DC_IN_acl extended permit tcp Net_RHL 255.255.0.0 10.200.0.0 255.254.0.0 eq https access-list TRS_DC_IN_acl extended permit tcp host 10.200.18.6 host Anakin eq www access-list TRS_DC_IN_acl extended permit tcp host Jubilee host Arien eq 524 access-list TRS_DC_IN_acl extended permit udp object-group CCL_Retail_Nets_Mgp host 10.154.1.254 eq syslog access-list TRS_DC_IN_acl extended permit udp host CannonBall host Rodian object-group AD_Trust_UDP access-list TRS_DC_IN_acl extended permit tcp object-group CSLucas_Hosts host Office_CVS_Server object-group CVS_Ports access-list TRS_DC_IN_acl extended permit tcp object-group CSLucas_Hosts host Office_CVS_Server eq 5900 access-list TRS_DC_IN_acl extended permit tcp object-group CSLucas_Hosts host Lucas_MailSvr eq pop3 access-list TRS_DC_IN_acl extended permit tcp object-group CSLucas_Hosts host Singnet_SMTP eq smtp access-list TRS_DC_IN_acl extended permit tcp object-group CSLucas_Hosts host Wandrella eq www access-list TRS_DC_IN_acl extended permit tcp object-group CSLucas_Hosts host Worrt eq www access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 host Arien eq 51080 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 host Rodian eq www access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 host Arien eq www access-list TRS_DC_IN_acl extended permit tcp host 10.154.4.99 host Aumida eq www access-list TRS_DC_IN_acl extended permit tcp Raffles_BU_Net 255.255.0.0 host Arien eq www access-list TRS_DC_IN_acl extended permit tcp object-group Ascott_SGCalyso1-2 Ascott_BU_Net 255.255.0.0 range 2512 2513 access-list TRS_DC_IN_acl extended permit tcp object-group Ascott_SGCalys3-8 Ascott_BU_Net 255.255.0.0 eq citrix-ica access-list TRS_DC_IN_acl extended permit udp object-group Ascott_SGCalys3-8 Ascott_BU_Net 255.255.0.0 eq 1604 access-list TRS_DC_IN_acl extended permit tcp object-group Ascott_SGCalys3-8 Ascott_BU_Net 255.255.0.0 range 2512 2513 access-list TRS_DC_IN_acl extended permit ip object-group Raffles_Bloomberg_Hosts any access-list TRS_DC_IN_acl extended permit ip host Corp_Bloomberg any access-list TRS_DC_IN_acl extended permit tcp 10.154.4.224 255.255.255.224 host CCL_Bishop eq 2638 access-list TRS_DC_IN_acl extended permit tcp host CCL_Rogue object-group CCL_DC_Citrix_Svrs eq www access-list TRS_DC_IN_acl extended permit tcp host CCL_Rogue object-group CCL_DC_Citrix_Svrs eq citrix-ica access-list TRS_DC_IN_acl extended permit tcp host CCL_Rogue object-group Intranet_Citrix_Svrs eq 2512 access-list TRS_DC_IN_acl extended permit tcp host CCL_Rogue object-group CCL_DC_Citrix_Svrs eq 2512 access-list TRS_DC_IN_acl extended permit tcp Ascott_TT_Host_42 255.255.255.254 host Neucleus1 eq https access-list TRS_DC_IN_acl extended permit tcp Jason_PC 255.255.255.254 host Neucleus1 eq https access-list TRS_DC_IN_acl extended permit udp object-group SBU_Novell_Servers host Phoenix eq ntp access-list TRS_DC_IN_acl extended permit tcp host Comm_BU_Net host Phoenix eq lpd access-list TRS_DC_IN_acl extended permit tcp Ascott_TT_Host_42 255.255.255.254 host Aumida eq www access-list TRS_DC_IN_acl extended permit tcp host Ascott_Mediaring_Qbox host MediaRing_Host2 eq 10000 access-list TRS_DC_IN_acl extended permit udp host Ascott_Mediaring_Qbox host MediaRing_Host3 eq 1800 access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_Hosts host 10.150.200.17 object-group KVM_IP access-list TRS_DC_IN_acl extended permit esp object-group HP_VPN_Access_Group object-group HP_VPN_Group access-list TRS_DC_IN_acl extended permit udp object-group HP_VPN_Access_Group object-group HP_VPN_Group eq isakmp access-list TRS_DC_IN_acl extended permit tcp object-group USPSD_clients host Warrick object-group USPSD access-list TRS_DC_IN_acl extended permit tcp object-group CLL_CCL_CRL_BUs host Neucleus1 eq 8081 access-list TRS_DC_IN_acl extended permit tcp object-group IT_Control_Hosts object-group VPN_Aventail_Box object-group Aventail_Mng_ ports access-list TRS_DC_IN_acl extended permit tcp 10.150.0.0 255.255.0.0 host Neucleus1 eq https access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host CLNT07 object-group AD_TCP_Services access-list TRS_DC_IN_acl extended permit udp Corp_BU_Net 255.255.248.0 host CLNT07 object-group AD_UDP_Services access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Neucleus1 eq https access-list TRS_DC_IN_acl extended permit tcp 10.154.4.224 255.255.255.240 host 10.150.210.103 eq 7001 access-list TRS_DC_IN_acl extended permit tcp 10.154.4.224 255.255.255.240 host Worrt eq www access-list TRS_DC_IN_acl extended permit tcp host 10.156.202.246 host Worrt eq www access-list TRS_DC_IN_acl extended permit tcp 10.156.202.0 255.255.255.0 host Neucleus1 object-group Nucleus1_Video access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.224.0 host Neucleus1 object-group Nucleus1_Video access-list TRS_DC_IN_acl extended permit tcp object-group CL_SBUs host Rodian object-group AD_TCP_Services access-list TRS_DC_IN_acl extended permit udp object-group CL_SBUs host Rodian object-group AD_UDP_Services access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Arien eq ldap access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Orome eq ldap access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Rodian eq 2362 access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Rodian range 2977 2978 access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_Hosts host Phoenix eq 524 access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_Hosts host Phoenix eq ldap access-list TRS_DC_IN_acl extended permit ip object-group CL_SBUs host Rodian access-list TRS_DC_IN_acl extended permit tcp host CommHost_11-25 host Postman201-smts eq smtp access-list TRS_DC_IN_acl extended permit tcp host CommHost_11-25 host Flamingo_SMTPRelay eq smtp access-list TRS_DC_IN_acl extended permit tcp host Resi_Host_CHN_MX host host10_156_129_74 eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 host Orome eq www access-list TRS_DC_IN_acl extended permit tcp Raffles_BU_Net 255.255.0.0 host Orome eq www access-list TRS_DC_IN_acl extended permit udp 10.154.16.0 255.255.255.0 host Galadriel eq domain access-list TRS_DC_IN_acl extended permit udp 10.154.16.0 255.255.255.0 host Orome eq domain access-list TRS_DC_IN_acl extended permit tcp Security_Ctrl_Zone 255.255.255.0 host Neucleus1 eq 8080 access-list TRS_DC_IN_acl extended permit tcp object-group CL_SBUs any object-group Internet_Services access-list TRS_DC_IN_acl extended permit tcp object-group TRS_DC_IN_Anti_Spoofing object-group HP_Mon_Hosts eq 135 access-list TRS_DC_IN_acl extended permit tcp object-group TRS_DC_IN_Anti_Spoofing object-group HP_Mon_Hosts range 381 383 access-list TRS_DC_IN_acl extended permit tcp object-group TRS_DC_IN_Anti_Spoofing object-group HP_Mon_Hosts range 10000 10200 access-list TRS_DC_IN_acl extended permit tcp object-group TRS_DC_IN_Anti_Spoofing object-group HP_Mon_Hosts range 14000 14010 access-list TRS_DC_IN_acl extended permit udp object-group TRS_DC_IN_Anti_Spoofing object-group HP_Mon_Hosts range snmp snmptrap access-list TRS_DC_IN_acl extended permit udp object-group TRS_DC_IN_Anti_Spoofing host HPMon3 range snmp snmptrap access-list TRS_DC_IN_acl extended permit icmp object-group TRS_DC_IN_Anti_Spoofing host HP_Pri_OVO_MgtSvr echo-reply access-list TRS_DC_IN_acl extended permit icmp object-group TRS_DC_IN_Anti_Spoofing host HP_Sec_OVO_MgtSvr echo-reply access-list TRS_DC_IN_acl extended permit icmp object-group TRS_DC_IN_Anti_Spoofing host HPMon3 echo-reply access-list TRS_DC_IN_acl extended permit tcp host RP_CA_console host 10.150.210.103 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host RP_CA_console host 10.150.210.103 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp host RP_CA_console host Dianoga eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host RP_CA_console host Dianoga eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp host RP_CA_console host Worrt eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host RP_CA_console host Worrt eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp Acklay 255.255.255.254 host Dianoga eq sqlnet access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host host 10.150.210.103 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host TT_Monitoring_Host host 10.150.210.103 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host host Dianoga eq sqlnet access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host host Dianoga eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host TT_Monitoring_Host host Dianoga eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Worrt eq www access-list TRS_DC_IN_acl extended permit tcp host 10.156.202.220 host Fortigate eq ssh access-list TRS_DC_IN_acl extended permit icmp host Calisto host Rodian access-list TRS_DC_IN_acl extended permit icmp VLAN888 255.255.255.192 host HPMon3 echo-reply access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host CLNT07 range 3000 3004 access-list TRS_DC_IN_acl extended permit tcp ControlPC1 255.255.255.252 DCB_CP_Subnet 255.255.255.0 eq 4899 access-list TRS_DC_IN_acl extended permit tcp object-group CCL_Retail_Nets_Mgp any object-group HTTP_HTTPS access-list TRS_DC_IN_acl extended permit tcp 10.150.0.0 255.255.0.0 host Neucleus1 eq 8080 access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Arien eq 445 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Arien eq 445 access-list TRS_DC_IN_acl remark SCRS 2274 access-list TRS_DC_IN_acl remark SCRS 2269 access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Orome eq www access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Arien eq 524 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 host Orome eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Orome eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Orome eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp Raffles_BU_Net 255.255.0.0 host Orome eq domain access-list TRS_DC_IN_acl extended permit tcp Raffles_BU_Net 255.255.0.0 host Orome eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Rodian eq 445 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Rodian eq 1025 access-list TRS_DC_IN_acl extended permit tcp object-group CCL_Retail_Nets_Mgp host Orome eq www access-list TRS_DC_IN_acl extended permit udp host Ascott_TT_Host_47 object-group AS_CN_AU_deimos eq pcanywhere-status access-list TRS_DC_IN_acl extended permit udp host Ascott_TT_Host_43 object-group AS_CN_AU_deimos eq pcanywhere-status access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing host Galadriel access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing 192.168.181.0 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing 10.153.138.0 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing 10.153.139.0 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing 10.153.140.0 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing 10.153.141.0 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing 10.153.142.0 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing 10.153.143.0 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing 10.153.144.0 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing 10.153.145.0 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing 10.153.146.0 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing 10.153.147.0 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing 10.153.148.0 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing 10.153.149.0 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing 10.153.150.0 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing 10.153.151.0 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing 10.153.35.0 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing 10.153.36.0 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing 10.153.37.0 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing 10.153.38.0 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing 10.153.39.0 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing 10.153.40.0 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing 10.153.100.0 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing 10.153.50.0 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing 10.153.51.0 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing 10.153.52.0 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing 10.153.53.0 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing host Ascott_Dubai access-list TRS_DC_IN_acl extended permit udp object-group TRS_DC_IN_Anti_Spoofing any eq isakmp access-list TRS_DC_IN_acl extended permit esp object-group TRS_DC_IN_Anti_Spoofing any access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing DMZ 255.255.255.192 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing Buz_Partner 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing 10.153.71.0 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing 10.153.73.0 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing 10.153.74.0 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing Security_Ctrl_Zone 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing Pri_Svr_Zone 255.255.255.0 access-list TRS_DC_IN_acl extended permit tcp object-group TRS_DC_IN_Anti_Spoofing host Fortigate eq https access-list TRS_DC_IN_acl extended permit udp object-group TRS_DC_IN_Anti_Spoofing host Galadriel eq domain access-list TRS_DC_IN_acl extended permit udp AScott_TT 255.255.255.0 object-group SGDeimosX object-group AD_Replication access-list TRS_DC_IN_acl extended permit tcp AScott_TT 255.255.255.0 object-group SGDeimosX object-group AD_Replication access-list TRS_DC_IN_acl remark SCRS 2274 access-list TRS_DC_IN_acl remark SCRS 2269 access-list TRS_DC_IN_acl remark Access to SAP router via PCAnywhere access-list TRS_DC_IN_acl extended permit tcp AScott_TT 255.255.255.0 object-group SGDeimosX eq 50000 access-list TRS_DC_IN_acl extended permit tcp object-group CL_SBUs host Arien eq 52443 access-list TRS_DC_IN_acl extended permit tcp host Control_DT_102 host Arien eq 52443 access-list TRS_DC_IN_acl extended permit tcp host Control_DT_101 host Arien eq www access-list TRS_DC_IN_acl extended permit tcp host Control_DT_101 host Arien eq 51080 access-list TRS_DC_IN_acl extended permit tcp host Control_DT_102 host Arien eq www access-list TRS_DC_IN_acl extended permit tcp host Control_DT_102 host Arien eq 51080 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.224.0 host Anakin range 1200 1215 access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Anakin range 1200 1215 access-list TRS_DC_IN_acl extended permit tcp host 172.24.20.10 host 172.22.22.4 eq ssh access-list TRS_DC_IN_acl extended permit udp host Ascott_H3 host Ariel eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp host Ascott_H3 host Ariel eq pcanywhere-data access-list TRS_DC_IN_acl extended permit tcp host DPRStephano1 host Ariel range 1433 1434 access-list TRS_DC_IN_acl extended permit tcp host DPRStephano1 object-group Ascott_SQL_ALL range 1433 1434 access-list TRS_DC_IN_acl extended permit tcp host AScott_TT host Ariel eq 2725 access-list TRS_DC_IN_acl extended permit udp host AScott_TT object-group SGDeimosX object-group AD_Replication access-list TRS_DC_IN_acl extended permit tcp host AScott_TT object-group SGDeimosX object-group AD_Replication access-list TRS_DC_IN_acl extended permit tcp host 10.150.1.89 host Ariel range 1433 1434 access-list TRS_DC_IN_acl extended permit tcp host DanielTan host CLNS01 eq 524 access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host object-group SGTitanX eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host TT_Monitoring_Host object-group SGTitanX eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp Net_RHL 255.255.0.0 10.200.0.0 255.254.0.0 eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp host 10.156.10.24 object-group SIS_Station_Site range 3090 3091 access-list TRS_DC_IN_acl extended permit tcp host 10.200.18.6 host Anakin range 1200 1215 access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_Hosts host Arien eq 524 access-list TRS_DC_IN_acl extended permit tcp host BACKUPCLNS host Arien eq 524 access-list TRS_DC_IN_acl extended permit tcp host BACKUPCLNS host Phoenix eq 524 access-list TRS_DC_IN_acl extended permit tcp host Resi_Host2-23 host Resi_Proche_Server eq 4899 access-list TRS_DC_IN_acl extended permit tcp host Calisto host Rodian object-group AD_Trust_TCP access-list TRS_DC_IN_acl extended permit udp host Calisto host Rodian object-group AD_Trust_UDP access-list TRS_DC_IN_acl extended permit tcp host CannonBall host Rodian object-group AD_Trust_TCP access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing 10.156.129.0 255.255.255.0 access-list TRS_DC_IN_acl extended permit tcp object-group TRS_DC_IN_Anti_Spoofing host Luthien eq 5555 access-list TRS_DC_IN_acl extended permit tcp object-group TRS_DC_IN_Anti_Spoofing host Luthien range 6000 6099 access-list TRS_DC_IN_acl extended permit tcp object-group TRS_DC_IN_Anti_Spoofing host Galadriel eq 5555 access-list TRS_DC_IN_acl extended permit tcp object-group TRS_DC_IN_Anti_Spoofing host Galadriel range 6000 6099 access-list TRS_DC_IN_acl extended permit ip host 10.154.4.188 192.168.181.0 255.255.255.0 access-list TRS_DC_IN_acl extended permit tcp host 10.150.119.105 host 10.150.200.16 eq 8192 access-list TRS_DC_IN_acl extended permit tcp host 10.150.119.105 host 10.150.200.16 eq 2068 access-list TRS_DC_IN_acl extended permit tcp host COMM-CONTROL1 host 10.150.200.16 eq 8192 access-list TRS_DC_IN_acl remark SCRS 2274 access-list TRS_DC_IN_acl extended permit tcp host 10.154.4.99 host Aumida eq https access-list TRS_DC_IN_acl extended permit tcp host 10.154.4.99 host Rodian object-group AD_TCP_Services access-list TRS_DC_IN_acl extended permit udp host 10.154.4.99 host Rodian object-group AD_UDP_Services access-list TRS_DC_IN_acl extended permit tcp Raffles_BU_Net 255.255.0.0 host Arien eq 51080 access-list TRS_DC_IN_acl extended permit tcp Raffles_BU_Net 255.255.0.0 host Arien eq 52080 access-list TRS_DC_IN_acl extended permit tcp Raffles_BU_Net 255.255.0.0 host Arien eq 52443 access-list TRS_DC_IN_acl extended permit tcp 10.156.201.0 255.255.255.0 host 10.61.12.34 eq www access-list TRS_DC_IN_acl extended permit tcp 10.156.202.0 255.255.255.0 host 10.61.12.34 eq www access-list TRS_DC_IN_acl extended permit tcp object-group Ascott_SGCalyso1-2 Ascott_BU_Net 255.255.0.0 eq citrix-ica access-list TRS_DC_IN_acl extended permit udp object-group Ascott_SGCalyso1-2 Ascott_BU_Net 255.255.0.0 eq 1604 access-list TRS_DC_IN_acl remark SCRS 2269 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host CCL_Bishop eq 1433 access-list TRS_DC_IN_acl extended permit tcp host CCL_Rogue object-group Intranet_Citrix_Svrs eq www access-list TRS_DC_IN_acl extended permit tcp host CCL_Rogue object-group Intranet_Citrix_Svrs eq citrix-ica access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Novell_Servers host Phoenix eq 524 access-list TRS_DC_IN_acl extended permit udp object-group SBU_Novell_Servers host Phoenix eq 524 access-list TRS_DC_IN_acl extended permit tcp Ascott_TT_Host_42 255.255.255.254 host Aumida eq https access-list TRS_DC_IN_acl extended permit tcp Jason_PC 255.255.255.254 host Aumida eq www access-list TRS_DC_IN_acl extended permit tcp Jason_PC 255.255.255.254 host Aumida eq https access-list TRS_DC_IN_acl extended permit tcp host 10.156.202.182 host Ascott-BPE-Srv eq www access-list TRS_DC_IN_acl extended permit tcp 10.154.4.224 255.255.255.224 host CCL_Bishop eq 135 access-list TRS_DC_IN_acl extended permit udp 10.154.4.224 255.255.255.224 host CCL_Bishop range netbios-ns netbios-dgm access-list TRS_DC_IN_acl extended permit tcp 10.154.4.224 255.255.255.224 host CCL_Bishop eq netbios-ssn access-list TRS_DC_IN_acl extended permit tcp 10.154.4.224 255.255.255.224 host CCL_Bishop eq 1130 access-list TRS_DC_IN_acl extended permit udp 10.154.4.224 255.255.255.224 host CCL_Bishop range 1132 1133 access-list TRS_DC_IN_acl extended permit tcp 10.154.4.224 255.255.255.224 host CCL_Bishop eq 8000 access-list TRS_DC_IN_acl extended permit tcp 10.154.4.224 255.255.255.224 host CCL_Bishop eq 8005 access-list TRS_DC_IN_acl extended permit udp Comm_BU_Net 255.255.0.0 host CCL_Bishop range 8009 8010 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host CCL_Bishop range 8080 8089 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host CCL_Bishop range 9000 9009 access-list TRS_DC_IN_acl extended permit tcp host Ascott_Mediaring_Qbox host MediaRing_Host8 range h323 1721 access-list TRS_DC_IN_acl extended permit tcp host Ascott_Mediaring_Qbox host MediaRing_Host8 eq 31720 access-list TRS_DC_IN_acl extended permit tcp host Ascott_Mediaring_Qbox host MediaRing_Host8 range 51720 51721 access-list TRS_DC_IN_acl extended permit udp host Ascott_Mediaring_Qbox host MediaRing_Host8 eq 1719 access-list TRS_DC_IN_acl extended permit udp host Ascott_Mediaring_Qbox host MediaRing_Host8 eq 51719 access-list TRS_DC_IN_acl extended permit udp host Ascott_Mediaring_Qbox object-group MediaRing_Svr_Group eq 1800 access-list TRS_DC_IN_acl extended permit udp host Ascott_Mediaring_Qbox object-group MediaRing_Svr_Group range 8000 64000 access-list TRS_DC_IN_acl extended permit tcp host 10.153.1.48 host Galaxy eq pcanywhere-data access-list TRS_DC_IN_acl remark SCRS 2473 access-list TRS_DC_IN_acl extended permit udp host 10.153.1.48 host Galaxy eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_Hosts host Xavier object-group KVM_IP_Mng access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_Hosts host 10.150.200.16 object-group KVM_IP access-list TRS_DC_IN_acl extended permit ah object-group HP_VPN_Access_Group object-group HP_VPN_Group access-list TRS_DC_IN_acl remark Access to SAP router via PCAnywhere access-list TRS_DC_IN_acl remark TT control hosts to access Comm Servers. access-list TRS_DC_IN_acl extended permit udp object-group TRS_DC_IN_Anti_Spoofing host DCPC eq syslog access-list TRS_DC_IN_acl extended permit udp object-group TRS_DC_IN_Anti_Spoofing host GALA eq syslog access-list TRS_DC_IN_acl extended permit udp object-group TRS_DC_IN_Anti_Spoofing host Xavier eq syslog access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host CLNT07 eq 3372 access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host CLNT07 eq 4000 access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host CLNT07 eq 4010 access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host CLNT07 eq 4020 access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host CLNT07 eq 22050 access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host CLNT07 eq 22210 access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host CLNT07 eq 22220 access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host CLNT07 eq 135 access-list TRS_DC_IN_acl extended permit udp Corp_BU_Net 255.255.248.0 host CLNT07 eq 135 access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host CLNT07 range 137 netbios-ssn access-list TRS_DC_IN_acl extended permit udp Corp_BU_Net 255.255.248.0 host CLNT07 range netbios-ns 139 access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host CLNT07 eq ldap access-list TRS_DC_IN_acl extended permit udp Corp_BU_Net 255.255.248.0 host CLNT07 eq 389 access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host CLNT07 eq 445 access-list TRS_DC_IN_acl extended permit udp Corp_BU_Net 255.255.248.0 host CLNT07 eq 445 access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host CLNT07 eq 524 access-list TRS_DC_IN_acl extended permit tcp host 10.154.9.10 host Marlex eq 8222 access-list TRS_DC_IN_acl extended permit tcp ControlPC1 255.255.255.252 DCB_CP_Subnet 255.255.255.0 eq ssh access-list TRS_DC_IN_acl extended permit tcp ControlPC1 255.255.255.252 DCB_CP_Subnet 255.255.255.0 eq telnet access-list TRS_DC_IN_acl extended permit tcp ControlPC1 255.255.255.252 DCB_CP_Subnet 255.255.255.0 eq citrix-ica access-list TRS_DC_IN_acl extended permit tcp ControlPC1 255.255.255.252 host Resi_Jaguar_Server eq 4899 access-list TRS_DC_IN_acl extended permit tcp ControlPC1 255.255.255.252 host Resi_Proche_Server eq 4899 access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.24 host CRLNT10 eq www access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.98 host CRLNT10 eq www access-list TRS_DC_IN_acl extended permit udp Resi_BU_Net 255.255.0.0 host Resi_Proche_Server range netbios-ns 139 access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Resi_Proche_Server eq 445 access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Resi_Proche_Server eq domain access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Resi_Proche_Server eq 135 access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Resi_Proche_Server eq netbios-ssn access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Resi_Proche_Server eq 1433 access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Resi_Proche_Server range 5492 5495 access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Resi_Proche_Server range ftp-data ftp access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Resi_Jaguar_Server eq www access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Resi_Jaguar_Server eq https access-list TRS_DC_IN_acl extended permit icmp host CRLNT02 host Rodian access-list TRS_DC_IN_acl extended permit icmp host CRLNT09 host Rodian access-list TRS_DC_IN_acl extended permit tcp host CRLNT02 host Rodian range 7000 7200 access-list TRS_DC_IN_acl extended permit tcp host CRLNT02 host Resi_Proche_Server range 7000 7200 access-list TRS_DC_IN_acl extended permit tcp host CRLNT09 host Rodian range 7000 7200 access-list TRS_DC_IN_acl extended permit tcp host CRLNT09 host Resi_Proche_Server range 7000 7200 access-list TRS_DC_IN_acl extended permit tcp host 10.156.2.15 host Resi_Proche_Server eq 4899 access-list TRS_DC_IN_acl extended permit tcp host 10.156.2.15 host Resi_Jaguar_Server eq 4899 access-list TRS_DC_IN_acl extended permit udp host 10.156.3.2 host Resi_Jaguar_Server range netbios-ns netbios-dgm access-list TRS_DC_IN_acl extended permit tcp host 10.156.3.2 host Resi_Jaguar_Server eq 445 access-list TRS_DC_IN_acl extended permit tcp host 10.156.3.2 host Resi_Proche_Server eq 4899 access-list TRS_DC_IN_acl extended permit tcp host 10.156.3.2 host Resi_Jaguar_Server eq 4899 access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_Hosts host Trendmicro eq 1812 access-list TRS_DC_IN_acl remark remark Z-- Corp/Resi/Comm to acess IIS -- SCRS 639------------ access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Marlex range 797 799 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Neucleus1 eq 8080 access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Neucleus1 eq 8080 access-list TRS_DC_IN_acl extended permit udp EMC_DC 255.255.255.0 host 10.61.12.4 eq ntp access-list TRS_DC_IN_acl extended permit udp MGT_DC_Subnet 255.255.255.0 host 10.61.12.4 eq ntp access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Bigatom eq netbios-ssn access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Bigatom eq 445 access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Lobot eq netbios-ssn access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Lobot eq 445 access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Lobot eq netbios-ssn access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Lobot eq 445 access-list TRS_DC_IN_acl extended permit tcp TMP_A2_Subnet 255.255.255.240 host Lobot eq www access-list TRS_DC_IN_acl extended permit tcp host 10.156.9.102 host Lobot eq www access-list TRS_DC_IN_acl remark remark Chripa Ports and Services access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Chripa eq 2512 access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Chripa eq citrix-ica access-list TRS_DC_IN_acl extended permit tcp TMP_CM_Subnet 255.255.255.240 host Chripa eq 2512 access-list TRS_DC_IN_acl remark remark Corde Ports and Services access-list TRS_DC_IN_acl extended permit udp Resi_BU_Net 255.255.0.0 host Marlex eq 800 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Corde eq 445 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Corde eq 524 access-list TRS_DC_IN_acl remark remark For Yavin Ports and services access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Yavin eq www access-list TRS_DC_IN_acl extended permit tcp TMP_SZ1_Subnet 255.255.255.0 host Yavin eq www access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Yavin eq www access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Yavin eq www access-list TRS_DC_IN_acl remark remark For Arien Ports and services access-list TRS_DC_IN_acl extended permit icmp object-group TRS_DC_IN_Anti_Spoofing host Arien access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Arien eq 445 access-list TRS_DC_IN_acl extended permit tcp host CLNS01 host Arien eq 524 access-list TRS_DC_IN_acl extended permit tcp TMP_CM_Subnet 255.255.255.240 host Arien eq 524 access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Arien eq 524 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Arien eq 524 access-list TRS_DC_IN_acl extended permit tcp VLAN252 255.255.255.0 host Arien eq 524 access-list TRS_DC_IN_acl extended permit tcp Pri_Svr_Zone 255.255.255.0 host Arien eq ldaps access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Arien eq www access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Arien eq 51080 access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Arien eq 52080 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Arien eq www access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Arien eq 51080 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Arien eq 52080 access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Arien eq www access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Arien eq 51080 access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Arien eq 52080 access-list TRS_DC_IN_acl extended permit udp host CLNS01 host Arien eq ntp access-list TRS_DC_IN_acl extended permit udp host BACKUPCLNS host Arien eq ntp access-list TRS_DC_IN_acl extended permit udp host Phoenix host Arien eq ntp access-list TRS_DC_IN_acl extended permit udp host Jubilee host Arien eq 524 access-list TRS_DC_IN_acl extended permit udp Comm_BU_Net 255.255.0.0 host Arien eq netbios-ns access-list TRS_DC_IN_acl extended permit udp Resi_BU_Net 255.255.0.0 host Arien eq 427 access-list TRS_DC_IN_acl extended permit udp host CCL_Rogue host Arien eq 427 access-list TRS_DC_IN_acl extended permit udp host Phoenix host Arien eq 524 access-list TRS_DC_IN_acl extended permit tcp host 10.150.119.105 host Arien eq 524 access-list TRS_DC_IN_acl extended permit udp Comm_BU_Net 255.255.0.0 host Arien eq 427 access-list TRS_DC_IN_acl extended permit tcp host CLNS01 host Phoenix eq 427 access-list TRS_DC_IN_acl extended permit tcp host CLNS01 host Arien eq 427 access-list TRS_DC_IN_acl extended permit tcp host BACKUPCLNS host Arien eq 427 access-list TRS_DC_IN_acl remark remark For Orome ports and services access-list TRS_DC_IN_acl extended permit icmp object-group TRS_DC_IN_Anti_Spoofing host Orome access-list TRS_DC_IN_acl extended permit udp host Jubilee host Orome eq 1036 access-list TRS_DC_IN_acl extended permit udp object-group TRS_DC_IN_Anti_Spoofing host Orome eq domain access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Orome eq www access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Orome eq www access-list TRS_DC_IN_acl extended permit tcp host CLNS01 host Orome eq 427 access-list TRS_DC_IN_acl extended permit tcp host CLNS01 host Orome eq 524 access-list TRS_DC_IN_acl extended permit tcp host BACKUPCLNS host Orome eq 524 access-list TRS_DC_IN_acl extended permit udp host CLNS01 host Orome eq 1036 access-list TRS_DC_IN_acl extended permit udp host BACKUPCLNS host Orome eq 1036 access-list TRS_DC_IN_acl extended permit udp Corp_BU_Net 255.255.248.0 host Orome eq 524 access-list TRS_DC_IN_acl extended permit udp Comm_BU_Net 255.255.0.0 host Orome eq 524 access-list TRS_DC_IN_acl extended permit tcp Corp_Control_Subnet 255.255.255.0 host Orome eq 524 access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Orome eq 524 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Orome eq 524 access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Orome eq 524 access-list TRS_DC_IN_acl extended permit tcp Pri_Svr_Zone 255.255.255.0 host Orome eq ldaps access-list TRS_DC_IN_acl remark TT control hosts to access Corp Servers. access-list TRS_DC_IN_acl remark TT control hosts to access Comm Servers. access-list TRS_DC_IN_acl remark TT control hosts to access Comm Servers. access-list TRS_DC_IN_acl remark Request by Susie Chia access-list TRS_DC_IN_acl remark SCRS 1423 -- Jeremy Soh to access FW & Sys Analyzer -- access-list TRS_DC_IN_acl remark Remark--------SCRS 847---------- access-list TRS_DC_IN_acl remark SCRS 826 access-list TRS_DC_IN_acl remark SCRS 826 access-list TRS_DC_IN_acl remark remark---IMM Print send Fax via SMTP--- access-list TRS_DC_IN_acl remark remark Z---START--Acl for traffic flow toward FWSM CSR_CG or vlan 211--Z access-list TRS_DC_IN_acl remark remark --- Soon seng Urgent request - 14/dec/04----------------- access-list TRS_DC_IN_acl remark remark For Citrix servers to access Aumida --SCRS 746-- access-list TRS_DC_IN_acl remark SCRS 1376 access-list TRS_DC_IN_acl remark remark For HP Monitoring Ports/Services------------ access-list TRS_DC_IN_acl remark remark Z---FINISH--Acl for traffic flow toward FWSM CSR_CG or vlan 211--Z access-list TRS_DC_IN_acl remark remark Z---START--Acl for traffic flow toward FWSM CSR_CL or vlan 210--Z access-list TRS_DC_IN_acl remark remark PCAnywhere access to Treasury servers from RP Ctrl Host Z--SCRS 737-- access-list TRS_DC_IN_acl remark SCRS 1351 access-list TRS_DC_IN_acl remark SCRS 1331 access-list TRS_DC_IN_acl remark remark Z-------------------END-------------------------- access-list TRS_DC_IN_acl remark remark Z--------Jouis urgent request Dec "12 " 4 Wandreall/Auklay--------- access-list TRS_DC_IN_acl remark remark Z--------End Jouis urgent request Dec "12 " 04--------- access-list TRS_DC_IN_acl remark remark For CT access to Worrt--SCRS 401-- access-list TRS_DC_IN_acl remark remark For CL Shared zone access ( Vlan 210 ) access-list TRS_DC_IN_acl remark SCRS 1657 access-list TRS_DC_IN_acl remark SCRS 1657 access-list TRS_DC_IN_acl remark SCRS 1629 access-list TRS_DC_IN_acl remark SCRS 1629 access-list TRS_DC_IN_acl remark SCRS 1592 - Gerald Lee access to Titania. access-list TRS_DC_IN_acl remark SCRS 1794 access-list TRS_DC_IN_acl remark SCRS 1571 access-list TRS_DC_IN_acl remark SCRS 1571 access-list TRS_DC_IN_acl remark SCRS 1544 access-list TRS_DC_IN_acl remark TT control hosts to access Corp Servers. access-list TRS_DC_IN_acl remark TT control hosts to access Comm Servers. access-list TRS_DC_IN_acl remark TT control hosts to access Comm Servers. access-list TRS_DC_IN_acl remark For AD Trust between Calisto and Rodian --SCRS 998-- access-list TRS_DC_IN_acl remark Request by Susie Chia access-list TRS_DC_IN_acl remark SCRS 1423 -- Jeremy Soh to access FW & Sys Analyzer -- access-list TRS_DC_IN_acl remark For CSLucas developers relocated to 19 floor, TT. access-list TRS_DC_IN_acl remark Request by Yiu San on 28 March 2005 access-list TRS_DC_IN_acl remark Remark ---Ascott sites to access SGCalyso 1 - 2 ---SCRS960--- access-list TRS_DC_IN_acl remark Remark ---Ascott sites to access SGCalyso 3 - 8 ---SCRS960--- access-list TRS_DC_IN_acl remark Remark--For Raffles Hosts to access Bloomberg sites-- access-list TRS_DC_IN_acl remark SCRS 2473 access-list TRS_DC_IN_acl remark Remark--For Corporate Host to access Bloomberg sites-- access-list TRS_DC_IN_acl remark Remark -- CCL to access Bishop via port 1433 access-list TRS_DC_IN_acl remark Remark --For Jason and Javen to access Neucleus1 --SCRS 924 -- access-list TRS_DC_IN_acl remark SCRS 1477 -- To allow SMTP traffic from pestpatrol server to Equinix SMTP relay (202.79.193.20). access-list TRS_DC_IN_acl extended permit tcp object-group CCL_Retail_Nets_Mgp any object-group Internet_Services access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Orome eq lotusnotes access-list TRS_DC_IN_acl remark SCRS 1429 -- CCL users to access Vision -- access-list TRS_DC_IN_acl remark As requested by John Fung access-list TRS_DC_IN_acl remark As requested by Cassandra. access-list TRS_DC_IN_acl remark SCRS 1391 access-list TRS_DC_IN_acl remark SCRS 1294 access-list TRS_DC_IN_acl remark SCRS 1391 access-list TRS_DC_IN_acl remark SCRS 1391 access-list TRS_DC_IN_acl remark SCRS 1391 access-list TRS_DC_IN_acl remark SCRS 1376 access-list TRS_DC_IN_acl remark SCRS 1351 access-list TRS_DC_IN_acl remark SCRS 1331 access-list TRS_DC_IN_acl remark SCRS 1294 access-list TRS_DC_IN_acl remark SBU Control PCs PCAnywhere access to DC servers access-list TRS_DC_IN_acl remark SCRS 889 access-list TRS_DC_IN_acl remark SCRS 1190 access-list TRS_DC_IN_acl remark --------SCRS 1192 -------------- access-list TRS_DC_IN_acl remark Remark ----Request by Soon Seng---- access-list TRS_DC_IN_acl remark Ascott Admin Hosts to access Aimuda ----SCRS 908---- access-list TRS_DC_IN_acl remark To allow Residential Server to access SMTP --SCRS 1170-- access-list TRS_DC_IN_acl remark SCRS 1013 access-list TRS_DC_IN_acl extended permit udp host BACKUPCLNS host Orome eq 1032 access-list TRS_DC_IN_acl extended permit tcp VLAN252 255.255.255.0 host Orome eq 524 access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Evanzan eq citrix-ica access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Evanzan eq citrix-ica access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Evanzan eq citrix-ica access-list TRS_DC_IN_acl remark remark For Evanzon Ports and Services access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Evanzon eq 2512 access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Evanzon eq citrix-ica access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Trendmicro eq www access-list TRS_DC_IN_acl extended permit tcp VLAN252 255.255.255.0 host Trendmicro eq www access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 host Trendmicro eq www access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Trendmicro eq www access-list TRS_DC_IN_acl extended permit udp host 10.150.253.12 host 10.61.12.37 eq syslog access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host 10.61.12.41 eq 524 access-list TRS_DC_IN_acl remark remark For Nucleus1 Ports and Services access-list TRS_DC_IN_acl remark SCRS 1429 -- CCL users to access Vision -- access-list TRS_DC_IN_acl remark remark For SBUs access to Lotus Notes Sametime access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Neucleus1 eq 1533 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 host Neucleus1 eq 1533 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Neucleus1 eq 1533 access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Neucleus1 eq 1533 access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Neucleus1 eq www access-list TRS_DC_IN_acl extended permit tcp 10.156.202.0 255.255.255.0 host Neucleus1 eq www access-list TRS_DC_IN_acl extended permit tcp 10.156.202.0 255.255.255.0 host Neucleus1 eq lotusnotes access-list TRS_DC_IN_acl remark remark For Holocam Ports and Services access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Holocam eq https access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Holocam eq https access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Holocam eq https access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Rodian eq 135 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Rodian eq netbios-ssn access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Rodian eq ldap access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_Hosts host Rodian object-group AD_TCP_Services access-list TRS_DC_IN_acl extended permit udp object-group SBU_Control_Hosts host Rodian object-group AD_UDP_Services access-list TRS_DC_IN_acl extended permit udp Comm_BU_Net 255.255.0.0 host Rodian eq 88 access-list TRS_DC_IN_acl extended permit udp Comm_BU_Net 255.255.0.0 host Rodian eq ntp access-list TRS_DC_IN_acl extended permit udp Comm_BU_Net 255.255.0.0 host Rodian eq netbios-ns access-list TRS_DC_IN_acl extended permit udp Comm_BU_Net 255.255.0.0 host Rodian eq 389 access-list TRS_DC_IN_acl extended permit tcp host 10.154.1.26 host Rodian eq 1073 access-list TRS_DC_IN_acl remark remark For Monitor-PC Ports and Services access-list TRS_DC_IN_acl remark remark For Ctrl Zone PCs Web access to What's Up in Monitor-PC access-list TRS_DC_IN_acl extended permit tcp host 10.150.119.105 host Monitor-PC eq www access-list TRS_DC_IN_acl extended permit tcp host COMM-CONTROL1 host Monitor-PC eq www access-list TRS_DC_IN_acl extended permit tcp host Control_DT_101 host Monitor-PC eq www access-list TRS_DC_IN_acl extended permit tcp host Control_DT_102 host Monitor-PC eq www access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host host Monitor-PC eq www access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Monitor-PC eq www access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Monitor-PC eq www access-list TRS_DC_IN_acl extended permit tcp 10.156.202.0 255.255.255.0 host Monitor-PC eq www access-list TRS_DC_IN_acl remark remark For Sicrus ports and services access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Sicrus_Server eq www access-list TRS_DC_IN_acl extended permit tcp WOR_DC_Subnet 255.255.255.0 host Sicrus_Server eq www access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 host Sicrus_Server eq www access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Sicrus_Server eq www access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Sicrus_Server eq www access-list TRS_DC_IN_acl extended permit tcp Raffles_BU_Net 255.255.0.0 host Sicrus_Server eq www access-list TRS_DC_IN_acl remark remark For China VPN to access Citrix-ica in Yavin--SCRS 538-- access-list TRS_DC_IN_acl extended permit tcp 10.156.137.0 255.255.255.0 host Yavin eq citrix-ica access-list TRS_DC_IN_acl remark remark Z--------SCRS532--for access from Melasia1(Sys Analyser)---------- access-list TRS_DC_IN_acl remark remark For Corp LAN access to Rodian access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Rodian eq 135 access-list TRS_DC_IN_acl extended permit udp Corp_BU_Net 255.255.248.0 host Rodian eq 135 access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Rodian range 137 netbios-ssn access-list TRS_DC_IN_acl extended permit udp Corp_BU_Net 255.255.248.0 host Rodian range netbios-ns 139 access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Rodian eq 445 access-list TRS_DC_IN_acl extended permit udp Corp_BU_Net 255.255.248.0 host Rodian eq 445 access-list TRS_DC_IN_acl remark remark Z--------Luthien/Galadriel Omni to Coporate VLAN--SCRS 523-- access-list TRS_DC_IN_acl remark remark RESI SBU access to Arien Z----------SCRS 399------------- access-list TRS_DC_IN_acl extended permit tcp host 10.156.10.25 host Arien eq 524 access-list TRS_DC_IN_acl remark remark Z--------------- SCRS 262------------------------------------- access-list TRS_DC_IN_acl extended permit tcp host Control_DT_101 host Galadriel eq 18184 access-list TRS_DC_IN_acl extended permit tcp host Control_DT_102 host Galadriel eq 18184 access-list TRS_DC_IN_acl remark remark Z---------------End of of SCRS 262------------------------------------ access-list TRS_DC_IN_acl extended permit tcp 10.154.64.0 255.255.255.0 host Holocam eq www access-list TRS_DC_IN_acl extended permit tcp 10.154.64.0 255.255.255.0 host Holocam eq https access-list TRS_DC_IN_acl extended permit tcp 10.154.64.0 255.255.255.0 host Holocam eq citrix-ica access-list TRS_DC_IN_acl extended permit tcp 10.154.64.0 255.255.255.0 host Yavin eq www access-list TRS_DC_IN_acl extended permit tcp 10.154.64.0 255.255.255.0 host Orome eq www access-list TRS_DC_IN_acl extended permit udp 10.154.64.0 255.255.255.0 host Orome eq domain access-list TRS_DC_IN_acl extended permit udp 10.154.64.0 255.255.255.0 host Galadriel eq domain access-list TRS_DC_IN_acl extended permit tcp 10.154.64.0 255.255.255.0 host Orome eq 524 access-list TRS_DC_IN_acl extended permit tcp 10.154.64.0 255.255.255.0 host Orome eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp 10.154.64.0 255.255.255.0 host Arien eq 524 access-list TRS_DC_IN_acl remark remark For Raffles SBU to access Raffles Server farm (Next 3 lines) access-list TRS_DC_IN_acl remark For AD Trust between Calisto and Rodian --SCRS 998-- access-list TRS_DC_IN_acl extended permit tcp host Raffles_FW2 host Raffles_FW1 eq 256 access-list TRS_DC_IN_acl remark SBU Control PCs PCAnywhere access to DC servers access-list TRS_DC_IN_acl remark remark Z----- Working Zone Novel access ------------------ access-list TRS_DC_IN_acl remark remark For Premas to access DC Services access-list TRS_DC_IN_acl remark SCRS 1477 -- To allow SMTP traffic from pestpatrol server to Equinix SMTP relay (202.79.193.20). access-list TRS_DC_IN_acl remark remark For Resi Mon Station to Ping China ( Next 1 line) access-list TRS_DC_IN_acl remark SCRS 1461 access-list TRS_DC_IN_acl remark remark For Corp & CCL to access China Intranet( Next 8 lines) access-list TRS_DC_IN_acl remark Remark --SCRS 908-- access-list TRS_DC_IN_acl remark Request by Susie Chia access-list TRS_DC_IN_acl remark remark For China VPN Remote sites access control ( Next 10 lines) access-list TRS_DC_IN_acl remark SCRS 1423 -- Jeremy Soh to access FW & Sys Analyzer -- access-list TRS_DC_IN_acl remark As requested by John Fung access-list TRS_DC_IN_acl remark SBU Control PCs PCAnywhere access to DC servers access-list TRS_DC_IN_acl remark remark Z---Acl for traffic flow toward Subnet behind NetscreenVPN----Z access-list TRS_DC_IN_acl remark SCRS 1862 access-list TRS_DC_IN_acl remark Remark --SCRS 889 -- access-list TRS_DC_IN_acl remark SCRS 1862 access-list TRS_DC_IN_acl remark FTP SERVICE TO MANWE. access-list TRS_DC_IN_acl remark SCRS 1858 access-list TRS_DC_IN_acl remark SCRS 1858 access-list TRS_DC_IN_acl remark SCRS 1828 access-list TRS_DC_IN_acl remark SCRS 1828 access-list TRS_DC_IN_acl remark remark Z---Acl for IPSec tunnel traffic flow (RaffleFW)----Z access-list TRS_DC_IN_acl remark SCRS 1629 - amended with SCRS 1729 access-list TRS_DC_IN_acl remark SCRS 1629 - Amended SCRS 1729 access-list TRS_DC_IN_acl remark SCRS 1675 access-list TRS_DC_IN_acl remark remark Z---Acl for traffic flow toward CheckpointFW DMZ Server Subnet--Z access-list TRS_DC_IN_acl remark SCRS 1675 access-list TRS_DC_IN_acl remark SCRS 1690 access-list TRS_DC_IN_acl remark remark Z---Acl for traffic flow toward Fortigate BU Zone Subnet--Z access-list TRS_DC_IN_acl remark SCRS 1690 access-list TRS_DC_IN_acl remark As requested by Cassandra. access-list TRS_DC_IN_acl remark SBU Control PCs PCAnywhere access to DC servers access-list TRS_DC_IN_acl remark remark Z---FINISH--Additional Acl for traffic flow toward DMZ----Z access-list TRS_DC_IN_acl remark remark Z---START-- DENY Acl for traffic flow toward all Capitaland Corp Range----Z access-list TRS_DC_IN_acl remark SCRS 1391 access-list TRS_DC_IN_acl remark remark TestPCs to access Fortuna1 access-list TRS_DC_IN_acl remark remark Z---FINISH--Additional Acl for traffic flow toward DMZ----Z access-list TRS_DC_IN_acl remark SCRS 1391 access-list TRS_DC_IN_acl remark Remark ------SCRS 874------- access-list TRS_DC_IN_acl remark remark Z---START-- DENY Acl for traffic flow toward all Capitaland Corp Range----Z access-list TRS_DC_IN_acl remark remark CT BMO Connection access-list TRS_DC_IN_acl remark remark TestPCs to access Fortuna1 access-list TRS_DC_IN_acl remark SCRS 1391 access-list TRS_DC_IN_acl remark Request by Yiu San on 28 March 2005 access-list TRS_DC_IN_acl remark Remark--------SCRS 847---------- access-list TRS_DC_IN_acl remark SCRS 826 access-list TRS_DC_IN_acl remark remark Z---FINISH--Additional Acl for traffic flow toward DMZ----Z access-list TRS_DC_IN_acl remark SCRS 826 access-list TRS_DC_IN_acl remark remark Z---START-- DENY Acl for traffic flow toward all Capitaland Corp Range----Z access-list TRS_DC_IN_acl remark SCRS 1391 access-list TRS_DC_IN_acl remark Remark ---Ascott sites to access SGCalyso 1 - 2 ---SCRS960--- access-list TRS_DC_IN_acl remark remark---IMM Print send Fax via SMTP--- access-list TRS_DC_IN_acl remark remark TestPCs to access Fortuna1 access-list TRS_DC_IN_acl remark remark ----SCRS 643--KVM over IP ---------------------- access-list TRS_DC_IN_acl remark remark Z---START--Acl for traffic flow toward FWSM CSR_CG or vlan 211--Z access-list TRS_DC_IN_acl remark SCRS 889 access-list TRS_DC_IN_acl remark remark --- Soon seng Urgent request - 14/dec/04----------------- access-list TRS_DC_IN_acl remark remark For Citrix servers to access Aumida --SCRS 746-- access-list TRS_DC_IN_acl remark remark --------SCRS532--Control PCs to Melasia1 & Gala -------- access-list TRS_DC_IN_acl remark Remark ---Ascott sites to access SGCalyso 3 - 8 ---SCRS960--- access-list TRS_DC_IN_acl remark remark For PIXVPN & STFW traffic logging to Gala--SCRS 510-- access-list TRS_DC_IN_acl remark remark ----- PCanywhere to Melasia1----- SCRS 509 ----------- access-list TRS_DC_IN_acl remark SCRS 1376 access-list TRS_DC_IN_acl remark remark For HP Monitoring Ports/Services------------ access-list TRS_DC_IN_acl remark Remark--For Raffles Hosts to access Bloomberg sites-- access-list TRS_DC_IN_acl remark remark ----- PCanywhere from Corp to Syslog ----------------- access-list TRS_DC_IN_acl remark remark Z---FINISH--Acl for traffic flow toward FWSM CSR_CG or vlan 211--Z access-list TRS_DC_IN_acl remark ==== Strating of Megapop Retail Migration ======================== access-list TRS_DC_IN_acl remark remark --- Syslog for new Server .98----PROJECT Migration- access-list TRS_DC_IN_acl remark remark Z---START--Acl for traffic flow toward FWSM CSR_CL or vlan 210--Z access-list TRS_DC_IN_acl remark Remark--For Corporate Host to access Bloomberg sites-- access-list TRS_DC_IN_acl remark remark --- Project Syslog -- PCanywehre---- access-list TRS_DC_IN_acl remark Remark --SCRS 932---SQLAnywhere access to Rational Robot in Bishop access-list TRS_DC_IN_acl remark remark For RPMONDO access to Marlex access-list TRS_DC_IN_acl remark remark PCAnywhere access to Treasury servers from RP Ctrl Host Z--SCRS 737-- access-list TRS_DC_IN_acl remark SCRS 1351 access-list TRS_DC_IN_acl remark Remark -- CCL to access Bishop via port 1433 access-list TRS_DC_IN_acl remark remark For RP CA Helpdesk Admin Console access-list TRS_DC_IN_acl remark remark For MRTG Server data Collection access-list TRS_DC_IN_acl remark remark ---- Allow Syslog to new syslog Server-- access-list TRS_DC_IN_acl remark SCRS 1190 access-list TRS_DC_IN_acl remark SCRS 1331 access-list TRS_DC_IN_acl remark remark Secure Remote clients IP subnet (Next two lines) access-list TRS_DC_IN_acl remark remark Z-------------------END-------------------------- access-list TRS_DC_IN_acl remark remark ----For PCAnywhere access from ControlZone to TestPCs &Vice versa --- access-list TRS_DC_IN_acl remark remark Z--------Jouis urgent request Dec "12 " 4 Wandreall/Auklay--------- access-list TRS_DC_IN_acl remark Remark --For Jason and Javen to access Neucleus1 --SCRS 924 -- access-list TRS_DC_IN_acl remark --------SCRS 1192 -------------- access-list TRS_DC_IN_acl remark remark For SBU (Corp ,Comm,Resi) access to Unicenter server access-list TRS_DC_IN_acl remark SCRS 1294 access-list TRS_DC_IN_acl remark remark Z-END-Traffic flowing toward ITC_NW (v200) Subnet--Z access-list TRS_DC_IN_acl remark remark Z-START--traffic flow to vlan16(TNP_SZ)---Z access-list TRS_DC_IN_acl remark Remark --SCRS 908-- access-list TRS_DC_IN_acl remark remark Z--------End Jouis urgent request Dec "12 " 04--------- access-list TRS_DC_IN_acl remark Remark --SCRS 889 -- access-list TRS_DC_IN_acl remark remark For HP Monitoring Ports/Services-------------- access-list TRS_DC_IN_acl remark Remark ---RP hosts to ClearQuest in Bishop ---SCRS 707 replaced by SCRS 850---- access-list TRS_DC_IN_acl remark remark For CT access to Worrt--SCRS 401-- access-list TRS_DC_IN_acl remark remark For CL Shared zone access ( Vlan 210 ) access-list TRS_DC_IN_acl remark Remark ----Request by Soon Seng---- access-list TRS_DC_IN_acl remark Ascott Admin Hosts to access Aimuda ----SCRS 908---- access-list TRS_DC_IN_acl remark remark ------ NREMS Ports for Copr LAN to CLNT07------------------ access-list TRS_DC_IN_acl remark remark ------ Drive Mapping for Corp Users------------------ access-list TRS_DC_IN_acl remark SCRS 1477 -- To allow SMTP traffic from pestpatrol server to Equinix SMTP relay (202.79.193.20). access-list TRS_DC_IN_acl remark To allow Residential Server to access SMTP --SCRS 1170-- access-list TRS_DC_IN_acl remark SCRS 1657 access-list TRS_DC_IN_acl remark SCRS 1657 access-list TRS_DC_IN_acl remark SCRS 1629 access-list TRS_DC_IN_acl remark SCRS 1629 access-list TRS_DC_IN_acl remark SCRS 1592 - Gerald Lee access to Titania. access-list TRS_DC_IN_acl remark remark ---------- For Access from DC Z-IT Control zone ----------------------- access-list TRS_DC_IN_acl remark SCRS 1794 access-list TRS_DC_IN_acl remark SCRS 1571 access-list TRS_DC_IN_acl remark SCRS 1571 access-list TRS_DC_IN_acl remark SCRS 1544 access-list TRS_DC_IN_acl remark Remark ---Access to AMOS,IIOP and SQL in Bishop--SCRS844-- access-list TRS_DC_IN_acl remark SCRS 1461 access-list TRS_DC_IN_acl remark remark For management of ResiSw access-list TRS_DC_IN_acl remark Remark ---Access to AMOS,IIOP and SQL in Bishop--SCRS844-- access-list TRS_DC_IN_acl remark TT control hosts to access Corp Servers. access-list TRS_DC_IN_acl remark remark For Access from IT Control zone ( Next 9 lines) access-list TRS_DC_IN_acl remark TT control hosts to access Comm Servers. access-list TRS_DC_IN_acl remark TT control hosts to access Comm Servers. access-list TRS_DC_IN_acl remark For AD Trust between Calisto and Rodian --SCRS 998-- access-list TRS_DC_IN_acl remark Request by Susie Chia access-list TRS_DC_IN_acl remark David Pillay from CT to access CRLNT10 via http -- SCRS 747 -- access-list TRS_DC_IN_acl remark SCRS 1423 -- Jeremy Soh to access FW & Sys Analyzer -- access-list TRS_DC_IN_acl remark Wendy Tan from CT to access CRLNT10 via http -- SCRS 1054 -- access-list TRS_DC_IN_acl remark SBU Control PCs PCAnywhere access to DC servers access-list TRS_DC_IN_acl remark For CSLucas developers relocated to 19 floor, TT. access-list TRS_DC_IN_acl remark Request by Yiu San on 28 March 2005 access-list TRS_DC_IN_acl remark remark For SBU to Residential(VLAN 208) access-list TRS_DC_IN_acl remark Remark ---Ascott sites to access SGCalyso 1 - 2 ---SCRS960--- access-list TRS_DC_IN_acl remark Remark ---Ascott sites to access SGCalyso 3 - 8 ---SCRS960--- access-list TRS_DC_IN_acl remark Remark--For Raffles Hosts to access Bloomberg sites-- access-list TRS_DC_IN_acl remark Remark--For Corporate Host to access Bloomberg sites-- access-list TRS_DC_IN_acl remark Remark -- CCL to access Bishop via port 1433 access-list TRS_DC_IN_acl remark Remark --For Jason and Javen to access Neucleus1 --SCRS 924 -- access-list TRS_DC_IN_acl remark remark For HP Monitoring Ports/Services-------------- access-list TRS_DC_IN_acl remark Remark ---RP hosts to ClearQuest in Bishop ---SCRS 707 replaced by SCRS 850---- access-list TRS_DC_IN_acl remark Remark ---Access to AMOS,IIOP and SQL in Bishop--SCRS844-- access-list TRS_DC_IN_acl remark Remark ---Access to AMOS,IIOP and SQL in Bishop--SCRS844-- access-list TRS_DC_IN_acl remark SBU Control PCs PCAnywhere access to DC servers access-list TRS_DC_IN_acl remark Remark ------SCRS 874------- access-list TRS_DC_IN_acl remark SBU Control PCs PCAnywhere access to DC servers access-list TRS_DC_IN_acl remark SCRS 1477 -- To allow SMTP traffic from pestpatrol server to Equinix SMTP relay (202.79.193.20). access-list TRS_DC_IN_acl remark SCRS 1461 access-list TRS_DC_IN_acl extended permit icmp host Raffles_FW2 host Raffles_FW1 access-list TRS_DC_IN_acl extended permit udp host Raffles_FW2 host Raffles_FW1 eq isakmp access-list TRS_DC_IN_acl extended permit esp host Raffles_FW2 host Raffles_FW1 access-list TRS_DC_IN_acl remark remark CT BMO Connection access-list TRS_DC_IN_acl remark SBU Control PCs PCAnywhere access to DC servers access-list TRS_DC_IN_acl extended permit ah host Raffles_FW2 host Raffles_FW1 access-list TRS_DC_IN_acl remark remark Z----- Working Zone Novel access ------------------ access-list TRS_DC_IN_acl extended permit tcp WOR_DC_Subnet 255.255.255.0 host Arien eq 524 access-list TRS_DC_IN_acl extended permit tcp WOR_DC_Subnet 255.255.255.0 host Orome eq 524 access-list TRS_DC_IN_acl remark remark For Premas to access DC Services access-list TRS_DC_IN_acl remark SCRS 1477 -- To allow SMTP traffic from pestpatrol server to Equinix SMTP relay (202.79.193.20). access-list TRS_DC_IN_acl extended permit tcp Secura_VPN_Pool1 255.255.255.240 host Orome eq www access-list TRS_DC_IN_acl remark remark For Resi Mon Station to Ping China ( Next 1 line) access-list TRS_DC_IN_acl remark SCRS 1461 access-list TRS_DC_IN_acl remark remark Z-END--traffic flow to vlan16(TNP_SZ)---Z access-list TRS_DC_IN_acl remark remark For Corp & CCL to access China Intranet( Next 8 lines) access-list TRS_DC_IN_acl remark Remark --SCRS 908-- access-list TRS_DC_IN_acl remark Request by Susie Chia access-list TRS_DC_IN_acl remark remark Z-START--traffic flow to vlan17(TNP_SZ1)---Z access-list TRS_DC_IN_acl remark remark For China VPN Remote sites access control ( Next 10 lines) access-list TRS_DC_IN_acl remark SCRS 1423 -- Jeremy Soh to access FW & Sys Analyzer -- access-list TRS_DC_IN_acl remark As requested by John Fung access-list TRS_DC_IN_acl remark SBU Control PCs PCAnywhere access to DC servers access-list TRS_DC_IN_acl extended permit tcp 10.156.17.0 255.255.255.0 host Orome eq www access-list TRS_DC_IN_acl extended permit tcp 10.156.201.0 255.255.255.0 any eq ssh access-list TRS_DC_IN_acl extended permit udp object-group TRS_DC_IN_Anti_Spoofing host GALA eq snmptrap access-list TRS_DC_IN_acl extended permit icmp object-group TRS_DC_IN_Anti_Spoofing host GALA access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing host Luthien access-list TRS_DC_IN_acl remark remark Z---Acl for traffic flow toward Subnet behind NetscreenVPN----Z access-list TRS_DC_IN_acl remark remark Z-END--traffic flow to vlan17(TNP_SZ1)---Z access-list TRS_DC_IN_acl remark remark Z-START-vlan128 acl- access-list TRS_DC_IN_acl remark SCRS 1862 access-list TRS_DC_IN_acl remark Remark --SCRS 889 -- access-list TRS_DC_IN_acl remark remark For HP Monitoring Ports/Services-------------- access-list TRS_DC_IN_acl remark Remark ---RP hosts to ClearQuest in Bishop ---SCRS 707 replaced by SCRS 850---- access-list TRS_DC_IN_acl remark SCRS 1862 access-list TRS_DC_IN_acl remark FTP SERVICE TO MANWE. access-list TRS_DC_IN_acl remark SCRS 1858 access-list TRS_DC_IN_acl remark SCRS 1858 access-list TRS_DC_IN_acl remark SCRS 1828 access-list TRS_DC_IN_acl remark SCRS 1828 access-list TRS_DC_IN_acl remark remark Z---Acl for IPSec tunnel traffic flow (RaffleFW)----Z access-list TRS_DC_IN_acl remark SCRS 1629 - amended with SCRS 1729 access-list TRS_DC_IN_acl remark SCRS 1629 - Amended SCRS 1729 access-list TRS_DC_IN_acl remark SCRS 1675 access-list TRS_DC_IN_acl remark remark Z---Acl for traffic flow toward CheckpointFW DMZ Server Subnet--Z access-list TRS_DC_IN_acl remark SCRS 1675 access-list TRS_DC_IN_acl remark SCRS 1690 access-list TRS_DC_IN_acl remark remark Z---Acl for traffic flow toward Fortigate BU Zone Subnet--Z access-list TRS_DC_IN_acl remark SCRS 1690 access-list TRS_DC_IN_acl extended permit tcp 10.153.1.72 255.255.255.248 SGTitan1 255.255.255.254 eq 135 access-list TRS_DC_IN_acl extended permit tcp 10.153.1.72 255.255.255.248 SGTitan1 255.255.255.254 eq 445 access-list TRS_DC_IN_acl extended permit tcp 10.153.1.80 255.255.255.248 SGTitan1 255.255.255.254 eq 135 access-list TRS_DC_IN_acl extended permit tcp 10.153.1.80 255.255.255.248 SGTitan1 255.255.255.254 eq 445 access-list TRS_DC_IN_acl extended permit tcp host 10.153.1.48 SGTitan1 255.255.255.254 eq 135 access-list TRS_DC_IN_acl extended permit tcp host 10.153.1.48 SGTitan1 255.255.255.254 eq 445 access-list TRS_DC_IN_acl extended permit tcp host 10.153.1.48 host SGTitan1 eq 5900 access-list TRS_DC_IN_acl extended permit tcp host 10.153.1.48 host SGTitan2 eq 5900 access-list TRS_DC_IN_acl extended permit tcp host 10.153.1.48 SGTitan1 255.255.255.254 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host 10.153.1.48 SGTitan1 255.255.255.254 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGTitan1 255.255.255.254 eq 8000 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGTitan1 255.255.255.254 eq 8001 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGTitan1 255.255.255.254 eq 8002 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGTitan1 255.255.255.254 eq www access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGTitan1 255.255.255.254 eq https access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGTitan1 255.255.255.254 eq 9000 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGTitan1 255.255.255.254 eq 9001 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGTitan1 255.255.255.254 eq 9002 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGTitan1 255.255.255.254 eq sqlnet access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGTitan1 255.255.255.254 eq 1522 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGTitan1 255.255.255.254 eq 1523 access-list TRS_DC_IN_acl extended permit tcp 10.153.1.72 255.255.255.248 SGTitan1 255.255.255.254 range 137 netbios-ssn access-list TRS_DC_IN_acl extended permit udp 10.153.1.72 255.255.255.248 SGTitan1 255.255.255.254 range netbios-ns 139 access-list TRS_DC_IN_acl extended permit tcp 10.153.1.80 255.255.255.248 SGTitan1 255.255.255.254 range 137 netbios-ssn access-list TRS_DC_IN_acl extended permit udp 10.153.1.80 255.255.255.248 SGTitan1 255.255.255.254 range netbios-ns 139 access-list TRS_DC_IN_acl extended permit tcp host 10.153.1.48 SGTitan1 255.255.255.254 range 137 netbios-ssn access-list TRS_DC_IN_acl extended permit udp host 10.153.1.48 SGTitan1 255.255.255.254 range netbios-ns 139 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGTitan1 255.255.255.254 range 1626 1628 access-list TRS_DC_IN_acl remark remark ----For Susie Chia to access Phoenix----------------- access-list TRS_DC_IN_acl remark As requested by Cassandra. access-list TRS_DC_IN_acl remark Remark ---Access to AMOS,IIOP and SQL in Bishop--SCRS844-- access-list TRS_DC_IN_acl extended permit tcp host 10.156.202.138 host Phoenix eq 524 access-list TRS_DC_IN_acl remark remark For Rajagopal relocated to TT on 30 Dec 2004 by Paul access-list TRS_DC_IN_acl remark Remark ---Access to AMOS,IIOP and SQL in Bishop--SCRS844-- access-list TRS_DC_IN_acl extended permit tcp host 10.156.202.246 host Phoenix eq 524 access-list TRS_DC_IN_acl remark remark ----------Martin Tan access to Phoenix-------- access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.5 host Phoenix eq 524 access-list TRS_DC_IN_acl remark remark ----------EUC user access to Phoenix---------------- access-list TRS_DC_IN_acl extended permit tcp host Tham_Kui_Seng host Phoenix eq 524 access-list TRS_DC_IN_acl remark remark ----------Treasury Users access to Phoenix---------- access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.11 host Phoenix eq 524 access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.20 host Phoenix eq 524 access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.103 host Phoenix eq 524 access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.105 host Phoenix eq 524 access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.107 host Phoenix eq 524 access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.116 host Phoenix eq 524 access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.128 host Phoenix eq 524 access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.149 host Phoenix eq 524 access-list TRS_DC_IN_acl remark SBU Control PCs PCAnywhere access to DC servers access-list TRS_DC_IN_acl remark remark Z---FINISH--Additional Acl for traffic flow toward DMZ----Z access-list TRS_DC_IN_acl remark remark Z---START-- DENY Acl for traffic flow toward all Capitaland Corp Range----Z access-list TRS_DC_IN_acl remark SCRS 1391 access-list TRS_DC_IN_acl remark remark TestPCs to access Fortuna1 access-list TRS_DC_IN_acl remark remark Z---FINISH--Additional Acl for traffic flow toward DMZ----Z access-list TRS_DC_IN_acl remark remark ------RP network access to Gambit--------------------- access-list TRS_DC_IN_acl remark SCRS 1391 access-list TRS_DC_IN_acl remark Remark ------SCRS 874------- access-list TRS_DC_IN_acl remark remark Z---START-- DENY Acl for traffic flow toward all Capitaland Corp Range----Z access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Gambit eq 9000 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Gambit eq 9001 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Gambit eq 9002 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Gambit eq 9004 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Gambit eq 9005 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Gambit eq 9006 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Gambit eq 9007 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Gambit eq 9008 access-list TRS_DC_IN_acl remark remark CT BMO Connection access-list TRS_DC_IN_acl extended permit tcp 10.154.64.0 255.255.255.0 host Phoenix eq 524 access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Phoenix eq 524 access-list TRS_DC_IN_acl extended permit ip host CLNS01 host Phoenix access-list TRS_DC_IN_acl extended permit ip host BACKUPCLNS host Phoenix access-list TRS_DC_IN_acl remark remark For PCAnywhere access from Ctrl PCs in CT, RP and TT access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_Hosts TMP_CM_Subnet 255.255.255.240 eq 427 access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_Hosts TMP_CM_Subnet 255.255.255.240 eq 524 access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_Hosts TMP_CM_Subnet 255.255.255.240 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp object-group SBU_Control_Hosts TMP_CM_Subnet 255.255.255.240 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp 10.200.0.0 255.254.0.0 TMP_CM_Subnet 255.255.255.240 eq https access-list TRS_DC_IN_acl extended permit tcp 10.200.0.0 255.254.0.0 TMP_CM_Subnet 255.255.255.240 eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp 10.150.122.0 255.255.255.0 host Caliban eq sqlnet access-list TRS_DC_IN_acl extended permit tcp 10.150.122.0 255.255.255.0 host Caliban eq 1433 access-list TRS_DC_IN_acl extended permit tcp 10.150.122.0 255.255.255.0 host Caliban eq 5000 access-list TRS_DC_IN_acl extended permit tcp 10.150.122.0 255.255.255.0 host Corde access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing EMC_DC 255.255.255.248 access-list TRS_DC_IN_acl remark remark Z-END-Traffic flowing toward vlan 201 and 255 Subnet--Z access-list TRS_DC_IN_acl remark Z---last statement---Z access-list TRS_DC_IN_acl remark remark TestPCs to access Fortuna1 access-list TRS_DC_IN_acl remark remark START- From ACL131 --- access-list TRS_DC_IN_acl remark SCRS 1391 access-list TRS_DC_IN_acl remark remark Z------ SCRS 1011 (Consolidate Netbios for Ascott)------ access-list TRS_DC_IN_acl remark Request by Yiu San on 28 March 2005 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGCalypso8 255.255.255.254 eq 137 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGCalypso8 255.255.255.254 eq netbios-ssn access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGCalypso8 255.255.255.254 eq 445 access-list TRS_DC_IN_acl extended permit udp Ascott_BU_Net 255.255.0.0 SGCalypso8 255.255.255.254 range netbios-ns netbios-dgm access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGCalypso6 255.255.255.252 eq 137 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGCalypso6 255.255.255.252 eq netbios-ssn access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGCalypso6 255.255.255.252 eq 445 access-list TRS_DC_IN_acl extended permit udp Ascott_BU_Net 255.255.0.0 SGCalypso6 255.255.255.252 range netbios-ns netbios-dgm access-list TRS_DC_IN_acl remark remark For Ascott sites to access SGCalyso3 - 8 ---SCRS 960--- access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGCalypso8 255.255.255.254 eq citrix-ica access-list TRS_DC_IN_acl extended permit udp Ascott_BU_Net 255.255.0.0 SGCalypso8 255.255.255.254 eq 1604 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGCalypso8 255.255.255.254 eq 2513 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGCalypso6 255.255.255.252 eq citrix-ica access-list TRS_DC_IN_acl extended permit udp Ascott_BU_Net 255.255.0.0 SGCalypso6 255.255.255.252 eq 1604 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGCalypso6 255.255.255.252 eq 2513 access-list TRS_DC_IN_acl remark remark Z--------- SCRS 793 --------------------------------- access-list TRS_DC_IN_acl extended permit tcp AScott_TT 255.255.255.0 SGCalypso8 255.255.255.254 eq citrix-ica access-list TRS_DC_IN_acl remark Remark--------SCRS 847---------- access-list TRS_DC_IN_acl remark SCRS 826 access-list TRS_DC_IN_acl remark remark Z---FINISH--Additional Acl for traffic flow toward DMZ----Z access-list TRS_DC_IN_acl remark SCRS 826 access-list TRS_DC_IN_acl remark remark Z---START-- DENY Acl for traffic flow toward all Capitaland Corp Range----Z access-list TRS_DC_IN_acl extended permit udp AScott_TT 255.255.255.0 SGCalypso8 255.255.255.254 eq 1604 access-list TRS_DC_IN_acl extended permit tcp AScott_TT 255.255.255.0 SGCalypso8 255.255.255.254 eq 2513 access-list TRS_DC_IN_acl extended permit tcp AScott_TT 255.255.255.0 SGCalypso6 255.255.255.252 eq citrix-ica access-list TRS_DC_IN_acl extended permit udp AScott_TT 255.255.255.0 SGCalypso6 255.255.255.252 eq 1604 access-list TRS_DC_IN_acl extended permit tcp AScott_TT 255.255.255.0 SGCalypso6 255.255.255.252 eq 2513 access-list TRS_DC_IN_acl remark remark Z--------- Thomas & Jason PCanywhere Access scrs744---------- access-list TRS_DC_IN_acl remark SCRS 1391 access-list TRS_DC_IN_acl extended permit tcp host Ascott_TT_Host_47 SGOrion1 255.255.255.254 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host Ascott_TT_Host_47 SGOrion1 255.255.255.254 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp host Ascott_TT_Host_43 SGOrion1 255.255.255.254 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host Ascott_TT_Host_43 SGOrion1 255.255.255.254 eq pcanywhere-status access-list TRS_DC_IN_acl remark remark Z-------------- AScott Admin GR access SGcalypso 7/8 SCRS 644------------ access-list TRS_DC_IN_acl remark Remark ---Ascott sites to access SGCalyso 1 - 2 ---SCRS960--- access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 SGCalypso8 255.255.255.254 eq ldap access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 SGCalypso8 255.255.255.254 eq 445 access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 SGCalypso8 255.255.255.254 eq ldaps access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 SGCalypso8 255.255.255.254 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp AScott_Admin_TT 255.255.255.248 SGCalypso8 255.255.255.254 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 SGCalypso8 255.255.255.254 eq citrix-ica access-list TRS_DC_IN_acl extended permit udp AScott_Admin_TT 255.255.255.248 SGCalypso8 255.255.255.254 eq 1604 access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 SGCalypso8 255.255.255.254 eq 2513 access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 SGCalypso8 255.255.255.254 eq 5900 access-list TRS_DC_IN_acl extended permit icmp AScott_Admin_TT 255.255.255.248 SGCalypso8 255.255.255.254 access-list TRS_DC_IN_acl remark remark Z-------------- AScott Admin GR access SGcalypso 5/6 SCRS 644------------ access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 SGCalypso6 255.255.255.254 eq ldap access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 SGCalypso6 255.255.255.254 eq 445 access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 SGCalypso6 255.255.255.254 eq ldaps access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 SGCalypso6 255.255.255.254 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp AScott_Admin_TT 255.255.255.248 SGCalypso6 255.255.255.254 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 SGCalypso6 255.255.255.254 eq citrix-ica access-list TRS_DC_IN_acl extended permit udp AScott_Admin_TT 255.255.255.248 SGCalypso6 255.255.255.254 eq 1604 access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 SGCalypso6 255.255.255.254 eq 2513 access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 SGCalypso6 255.255.255.254 eq 5900 access-list TRS_DC_IN_acl extended permit icmp AScott_Admin_TT 255.255.255.248 SGCalypso6 255.255.255.254 access-list TRS_DC_IN_acl remark remark Z-------------- VN & SGCalypso 5/6/7/8 NetBios Both-ways SCRS644- --(Consolidated SCRS 1 0 access-list TRS_DC_IN_acl remark remark Z------------ ***** END SCRS 644 ******-------------------------------------------------- - access-list TRS_DC_IN_acl remark remark Z---------- SCRS 584 ---- Drive mapping to SG Calyoso5/6 & AscottTL -----(Consolidated SCRS access-list TRS_DC_IN_acl remark remark---IMM Print send Fax via SMTP--- access-list TRS_DC_IN_acl remark remark TestPCs to access Fortuna1 access-list TRS_DC_IN_acl remark remark Z-------------- SCRS 594 AScott Admin access SGcalyps3/4 ------------ access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 SGCalypso3 255.255.255.254 eq ldap access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 SGCalypso3 255.255.255.254 eq 445 access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 SGCalypso3 255.255.255.254 eq ldaps access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 SGCalypso3 255.255.255.254 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp AScott_Admin_TT 255.255.255.248 SGCalypso3 255.255.255.254 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 SGCalypso3 255.255.255.254 eq citrix-ica access-list TRS_DC_IN_acl extended permit udp AScott_Admin_TT 255.255.255.248 SGCalypso3 255.255.255.254 eq 1604 access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 SGCalypso3 255.255.255.254 eq 2513 access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 SGCalypso3 255.255.255.254 eq 5900 access-list TRS_DC_IN_acl extended permit udp ControlPC1 255.255.255.252 DCB_AS_Subnet 255.255.255.0 eq pcanywhere-status access-list TRS_DC_IN_acl remark remark Z--------- PC anywhere from Control PCs at TT ---------- access-list TRS_DC_IN_acl remark remark ----SCRS 643--KVM over IP ---------------------- access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host SGOrion1 255.255.255.254 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host TT_Monitoring_Host SGOrion1 255.255.255.254 eq pcanywhere-status access-list TRS_DC_IN_acl remark remark Z-----------------SCRS 462---------------------- access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host SGOrion1 255.255.255.254 eq sqlnet access-list TRS_DC_IN_acl remark remark Z---------- SCRS 317 ---- Drive mapping to Ascott 1.72 and 2.72 and Orion1 and Orion2 ---- access-list TRS_DC_IN_acl remark remark Z---START--Acl for traffic flow toward FWSM CSR_CG or vlan 211--Z access-list TRS_DC_IN_acl extended permit tcp 10.153.1.72 255.255.255.248 SGOrion1 255.255.255.254 eq 135 access-list TRS_DC_IN_acl extended permit tcp 10.153.1.72 255.255.255.248 SGOrion1 255.255.255.254 eq 445 access-list TRS_DC_IN_acl extended permit tcp 10.153.1.72 255.255.255.248 SGOrion1 255.255.255.254 range 137 netbios-ssn access-list TRS_DC_IN_acl remark SCRS 889 access-list TRS_DC_IN_acl extended permit udp 10.153.1.72 255.255.255.248 SGOrion1 255.255.255.254 range netbios-ns 139 access-list TRS_DC_IN_acl remark remark --- Soon seng Urgent request - 14/dec/04----------------- access-list TRS_DC_IN_acl remark remark For Citrix servers to access Aumida --SCRS 746-- access-list TRS_DC_IN_acl extended permit tcp host COMM-CONTROL1 host 10.150.200.16 eq 2068 access-list TRS_DC_IN_acl extended permit tcp host Control_DT_101 host Xavier eq 2068 access-list TRS_DC_IN_acl extended permit tcp host Control_DT_101 host Xavier eq 3211 access-list TRS_DC_IN_acl extended permit tcp host Control_DT_101 host Xavier eq 8190 access-list TRS_DC_IN_acl extended permit tcp host Control_DT_101 host Xavier eq www access-list TRS_DC_IN_acl extended permit tcp host Control_DT_101 host Xavier eq 8189 access-list TRS_DC_IN_acl extended permit tcp host Control_DT_101 host Xavier eq 8023 access-list TRS_DC_IN_acl extended permit tcp host Control_DT_102 host Xavier eq 2068 access-list TRS_DC_IN_acl extended permit tcp host Control_DT_102 host Xavier eq 3211 access-list TRS_DC_IN_acl extended permit tcp host Control_DT_102 host Xavier eq 8190 access-list TRS_DC_IN_acl extended permit tcp host Control_DT_102 host Xavier eq www access-list TRS_DC_IN_acl extended permit tcp host Control_DT_102 host Xavier eq 8189 access-list TRS_DC_IN_acl extended permit tcp host Control_DT_102 host Xavier eq 8023 access-list TRS_DC_IN_acl extended permit tcp host 10.150.119.105 host Xavier eq 2068 access-list TRS_DC_IN_acl extended permit tcp host 10.150.119.105 host Xavier eq 3211 access-list TRS_DC_IN_acl extended permit tcp host 10.150.119.105 host Xavier eq 8190 access-list TRS_DC_IN_acl extended permit tcp host 10.150.119.105 host Xavier eq www access-list TRS_DC_IN_acl extended permit tcp host 10.150.119.105 host Xavier eq 8189 access-list TRS_DC_IN_acl extended permit tcp host 10.150.119.105 host Xavier eq 8023 access-list TRS_DC_IN_acl extended permit tcp host COMM-CONTROL1 host Xavier eq 2068 access-list TRS_DC_IN_acl extended permit tcp host COMM-CONTROL1 host Xavier eq 3211 access-list TRS_DC_IN_acl extended permit tcp host COMM-CONTROL1 host Xavier eq 8190 access-list TRS_DC_IN_acl extended permit tcp host COMM-CONTROL1 host Xavier eq www access-list TRS_DC_IN_acl extended permit tcp host COMM-CONTROL1 host Xavier eq 8189 access-list TRS_DC_IN_acl extended permit tcp host COMM-CONTROL1 host Xavier eq 8023 access-list TRS_DC_IN_acl remark remark --------SCRS532--Control PCs to Melasia1 & Gala -------- access-list TRS_DC_IN_acl extended permit tcp host 10.150.119.105 host Melasia1 eq 10816 access-list TRS_DC_IN_acl extended permit tcp host 10.150.119.105 host GALA eq 8216 access-list TRS_DC_IN_acl extended permit tcp host 10.150.119.105 host Melasia1 eq 8416 access-list TRS_DC_IN_acl extended permit tcp host Control_DT_101 host GALA eq 8216 access-list TRS_DC_IN_acl extended permit tcp host Control_DT_102 host GALA eq 8216 access-list TRS_DC_IN_acl remark Remark ---Ascott sites to access SGCalyso 3 - 8 ---SCRS960--- access-list TRS_DC_IN_acl extended permit tcp host Control_DT_101 host Melasia1 eq 8416 access-list TRS_DC_IN_acl extended permit tcp host Control_DT_102 host Melasia1 eq 8416 access-list TRS_DC_IN_acl extended permit tcp host COMM-CONTROL1 host GALA eq 8216 access-list TRS_DC_IN_acl extended permit tcp host COMM-CONTROL1 host Melasia1 eq 8416 access-list TRS_DC_IN_acl remark remark For PIXVPN & STFW traffic logging to Gala--SCRS 510-- access-list TRS_DC_IN_acl extended permit udp host PIX_VPN_Inside_int host GALA eq 1688 access-list TRS_DC_IN_acl extended permit udp host PIX_VPN_SEC host GALA eq 1688 access-list TRS_DC_IN_acl extended permit udp host 10.150.205.3 host GALA eq 1688 access-list TRS_DC_IN_acl extended permit udp host 10.150.253.12 host GALA eq 1688 access-list TRS_DC_IN_acl extended permit udp host 172.22.22.4 host GALA eq 1688 access-list TRS_DC_IN_acl extended permit udp host 172.22.22.6 host GALA eq 1688 access-list TRS_DC_IN_acl remark remark ----- PCanywhere to Melasia1----- SCRS 509 ----------- access-list TRS_DC_IN_acl remark SCRS 1376 access-list TRS_DC_IN_acl remark remark For HP Monitoring Ports/Services------------ access-list TRS_DC_IN_acl remark Remark--For Raffles Hosts to access Bloomberg sites-- access-list TRS_DC_IN_acl extended permit tcp 10.153.1.80 255.255.255.248 SGOrion1 255.255.255.254 eq 135 access-list TRS_DC_IN_acl extended permit tcp 10.153.1.80 255.255.255.248 SGOrion1 255.255.255.254 eq 445 access-list TRS_DC_IN_acl extended permit tcp 10.153.1.80 255.255.255.248 SGOrion1 255.255.255.254 range 137 netbios-ssn access-list TRS_DC_IN_acl extended permit udp 10.153.1.80 255.255.255.248 SGOrion1 255.255.255.254 range netbios-ns 139 access-list TRS_DC_IN_acl remark remark For Ascott SG network access to Vlan access-list TRS_DC_IN_acl extended permit tcp host 10.150.119.105 host Melasia1 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host 10.150.119.105 host Melasia1 eq pcanywhere-status access-list TRS_DC_IN_acl remark remark ----- PCanywhere from Corp to Syslog ----------------- access-list TRS_DC_IN_acl extended permit tcp host Ascott_TT_Host_44 host SGCalypso3 eq citrix-ica access-list TRS_DC_IN_acl extended permit udp host Ascott_TT_Host_44 host SGCalypso3 eq 1604 access-list TRS_DC_IN_acl extended permit tcp host Ascott_TT_Host_44 host SGCalypso3 eq 2513 access-list TRS_DC_IN_acl extended permit tcp host Ascott_TT_Host_44 host SGCalypso4 eq citrix-ica access-list TRS_DC_IN_acl extended permit udp host Ascott_TT_Host_44 host SGCalypso4 eq 1604 access-list TRS_DC_IN_acl extended permit tcp host Ascott_TT_Host_44 host SGCalypso4 eq 2513 access-list TRS_DC_IN_acl remark remark For PcAnywhere access from Ascott SBU access-list TRS_DC_IN_acl remark remark Z---FINISH--Acl for traffic flow toward FWSM CSR_CG or vlan 211--Z access-list TRS_DC_IN_acl remark ==== Strating of Megapop Retail Migration ======================== access-list TRS_DC_IN_acl extended permit tcp host 10.150.119.105 host Xavier eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host 10.150.119.105 host Xavier eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp host 10.150.119.105 host GALA eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host 10.150.119.105 host GALA eq pcanywhere-status access-list TRS_DC_IN_acl remark remark --- Syslog for new Server .98----PROJECT Migration- access-list TRS_DC_IN_acl extended permit tcp host 10.153.1.48 host SGOrion1 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host 10.153.1.48 host SGOrion1 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp host 10.153.1.48 host SGOrion2 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host 10.153.1.48 host SGOrion2 eq pcanywhere-status access-list TRS_DC_IN_acl remark remark For VNC access from Ascott SBU access-list TRS_DC_IN_acl remark remark Z---START--Acl for traffic flow toward FWSM CSR_CL or vlan 210--Z access-list TRS_DC_IN_acl remark Remark--For Corporate Host to access Bloomberg sites-- access-list TRS_DC_IN_acl extended permit udp object-group TRS_DC_IN_Anti_Spoofing host host10_150_200_98 eq syslog access-list TRS_DC_IN_acl remark remark --- Project Syslog -- PCanywehre---- access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing ControlPC1 255.255.255.254 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing host 10.150.200.80 access-list TRS_DC_IN_acl remark Remark --SCRS 932---SQLAnywhere access to Rational Robot in Bishop access-list TRS_DC_IN_acl extended permit tcp host 10.153.1.48 host SGOrion1 eq 5900 access-list TRS_DC_IN_acl extended permit tcp host 10.153.1.48 host SGOrion2 eq 5900 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGOrion1 255.255.255.254 eq 8000 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGOrion1 255.255.255.254 eq 8001 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGOrion1 255.255.255.254 eq 8002 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGOrion1 255.255.255.254 eq www access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGOrion1 255.255.255.254 eq https access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGOrion1 255.255.255.254 eq 9000 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGOrion1 255.255.255.254 eq 9001 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGOrion1 255.255.255.254 eq 9002 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGOrion1 255.255.255.254 eq sqlnet access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGOrion1 255.255.255.254 eq 1522 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGOrion1 255.255.255.254 eq 1523 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 SGOrion1 255.255.255.254 range 1626 1628 access-list TRS_DC_IN_acl remark remark Z-----------End Adding printer ORACLE ------ access-list TRS_DC_IN_acl remark remark For RPMONDO access to Marlex access-list TRS_DC_IN_acl remark remark PCAnywhere access to Treasury servers from RP Ctrl Host Z--SCRS 737-- access-list TRS_DC_IN_acl remark SCRS 1351 access-list TRS_DC_IN_acl extended permit icmp Ascott_BU_Net 255.255.0.0 SGOrion1 255.255.255.254 access-list TRS_DC_IN_acl remark remark START -- ACl144 access-list TRS_DC_IN_acl remark Remark -- CCL to access Bishop via port 1433 access-list TRS_DC_IN_acl remark remark MSSQL access between drpsgstephano1 & SQLVirtual --SCRS 1032-- access-list TRS_DC_IN_acl extended permit icmp host 10.154.63.65 host Marlex access-list TRS_DC_IN_acl extended permit udp host 10.154.63.65 host Marlex range netbios-ns 139 access-list TRS_DC_IN_acl extended permit tcp host 10.154.63.65 host Marlex eq netbios-ssn access-list TRS_DC_IN_acl extended permit tcp host 10.154.63.65 host Marlex eq 445 access-list TRS_DC_IN_acl extended permit tcp host 10.154.63.65 host Marlex range 797 799 access-list TRS_DC_IN_acl extended permit udp host 10.154.63.65 host Marlex eq 800 access-list TRS_DC_IN_acl extended permit tcp host 10.154.63.65 host Marlex eq 1433 access-list TRS_DC_IN_acl extended permit udp host 10.154.63.65 host Marlex eq 4104 access-list TRS_DC_IN_acl extended permit tcp host 10.154.63.65 host Marlex eq 4105 access-list TRS_DC_IN_acl extended permit tcp host 10.154.63.65 host Marlex range 4721 4725 access-list TRS_DC_IN_acl extended permit udp host 10.154.63.65 host Marlex eq 4725 access-list TRS_DC_IN_acl extended permit tcp host 10.154.63.65 host Marlex eq 8034 access-list TRS_DC_IN_acl extended permit tcp host 10.154.63.65 host Marlex eq 8198 access-list TRS_DC_IN_acl extended permit tcp host 10.154.63.65 host Marlex eq 8222 access-list TRS_DC_IN_acl remark remark For RP CA Helpdesk Admin Console access-list TRS_DC_IN_acl extended permit udp host RP_CA_console host Marlex range netbios-ns 139 access-list TRS_DC_IN_acl extended permit tcp host RP_CA_console host Marlex eq netbios-ssn access-list TRS_DC_IN_acl extended permit tcp host RP_CA_console host Marlex eq 445 access-list TRS_DC_IN_acl extended permit tcp host RP_CA_console host Marlex range 799 800 access-list TRS_DC_IN_acl extended permit udp host RP_CA_console host Marlex eq 4104 access-list TRS_DC_IN_acl extended permit tcp host RP_CA_console host Marlex eq 4105 access-list TRS_DC_IN_acl extended permit tcp host RP_CA_console host Marlex eq 4721 access-list TRS_DC_IN_acl extended permit tcp host RP_CA_console host Marlex eq 4724 access-list TRS_DC_IN_acl extended permit udp host RP_CA_console host Marlex eq 4725 access-list TRS_DC_IN_acl extended permit tcp host RP_CA_console host Marlex eq 8198 access-list TRS_DC_IN_acl extended permit tcp host RP_CA_console host Marlex eq 8222 access-list TRS_DC_IN_acl extended permit tcp host 10.150.119.105 host GALA range 1741 1742 access-list TRS_DC_IN_acl extended permit tcp host 10.150.119.105 host GALA eq 1683 access-list TRS_DC_IN_acl extended permit tcp host 10.150.119.105 host GALA eq 1961 access-list TRS_DC_IN_acl extended permit tcp host 10.150.119.108 host GALA range 1741 1742 access-list TRS_DC_IN_acl extended permit tcp host 10.150.119.108 host GALA eq 1683 access-list TRS_DC_IN_acl extended permit tcp host 10.150.119.108 host GALA eq 1961 access-list TRS_DC_IN_acl extended permit tcp host COMM-CONTROL1 host GALA range 1741 1742 access-list TRS_DC_IN_acl extended permit tcp host COMM-CONTROL1 host GALA eq 1683 access-list TRS_DC_IN_acl extended permit tcp host COMM-CONTROL1 host GALA eq 1961 access-list TRS_DC_IN_acl extended permit udp 10.154.64.0 255.255.255.0 host Marlex range netbios-ns 139 access-list TRS_DC_IN_acl extended permit tcp 10.154.64.0 255.255.255.0 host Marlex eq netbios-ssn access-list TRS_DC_IN_acl extended permit tcp 10.154.64.0 255.255.255.0 host Marlex eq 1433 access-list TRS_DC_IN_acl extended permit tcp 10.154.64.0 255.255.255.0 host Marlex eq 4721 access-list TRS_DC_IN_acl extended permit tcp 10.154.64.0 255.255.255.0 host Marlex eq 799 access-list TRS_DC_IN_acl extended permit tcp 10.154.64.0 255.255.255.0 host Marlex eq 800 access-list TRS_DC_IN_acl extended permit tcp 10.154.64.0 255.255.255.0 host Marlex eq 4105 access-list TRS_DC_IN_acl extended permit tcp 10.154.64.0 255.255.255.0 host Marlex eq 4724 access-list TRS_DC_IN_acl remark remark For MRTG Server data Collection access-list TRS_DC_IN_acl extended permit udp object-group TRS_DC_IN_Anti_Spoofing host DCPC eq snmptrap access-list TRS_DC_IN_acl extended permit tcp host 10.153.1.91 host Ariel range 1433 1434 access-list TRS_DC_IN_acl extended permit udp host 10.153.1.91 host Ariel range 1433 1434 access-list TRS_DC_IN_acl remark remark ------ For Ascott Dubai to access MS-OLAP 1-4- SCRS915--------- access-list TRS_DC_IN_acl remark remark ---- Allow Syslog to new syslog Server-- access-list TRS_DC_IN_acl remark SCRS 1190 access-list TRS_DC_IN_acl remark SCRS 1331 access-list TRS_DC_IN_acl extended permit tcp Ascott_Dubai 255.255.255.0 host Ariel range 2393 2394 access-list TRS_DC_IN_acl extended permit tcp Ascott_Dubai 255.255.255.0 host Ariel eq 2725 access-list TRS_DC_IN_acl extended permit tcp Ascott_Dubai 255.255.255.0 host Prospero eq www access-list TRS_DC_IN_acl extended permit tcp Ascott_Dubai 255.255.255.0 host Prospero eq https access-list TRS_DC_IN_acl remark remark ------ THOMAS TEST need to remove later------------ access-list TRS_DC_IN_acl remark remark ------ SCRS 744 Thomas Ng Access Prospero------------ access-list TRS_DC_IN_acl remark remark Secure Remote clients IP subnet (Next two lines) access-list TRS_DC_IN_acl extended permit tcp host Ascott_TT_Host_47 host Prospero eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host Ascott_TT_Host_47 host Prospero eq pcanywhere-status access-list TRS_DC_IN_acl remark remark -------Prospero testing from Durge-------------------- access-list TRS_DC_IN_acl remark remark Z-------------------END-------------------------- access-list TRS_DC_IN_acl remark remark ----For PCAnywhere access from ControlZone to TestPCs &Vice versa --- access-list TRS_DC_IN_acl extended permit ip host TEST______ host Prospero access-list TRS_DC_IN_acl remark remark -------SCRS 466---PCAnywhere & SQL-------------------- access-list TRS_DC_IN_acl remark remark Z--------Jouis urgent request Dec "12 " 4 Wandreall/Auklay--------- access-list TRS_DC_IN_acl remark Remark --For Jason and Javen to access Neucleus1 --SCRS 924 -- access-list TRS_DC_IN_acl remark --------SCRS 1192 -------------- access-list TRS_DC_IN_acl extended permit tcp Corp_Control_Subnet 255.255.255.0 ControlPC1 255.255.255.252 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp Corp_Control_Subnet 255.255.255.0 ControlPC1 255.255.255.252 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp 10.154.63.0 255.255.255.0 ControlPC1 255.255.255.252 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp 10.154.63.0 255.255.255.0 ControlPC1 255.255.255.252 eq pcanywhere-status access-list TRS_DC_IN_acl remark remark For SBU (Corp ,Comm,Resi) access to Unicenter server access-list TRS_DC_IN_acl remark remark ----------------end SCRS 444 -------------------------------- access-list TRS_DC_IN_acl extended permit icmp host 10.150.119.65 host Marlex access-list TRS_DC_IN_acl extended permit udp Corp_BU_Net 255.255.248.0 host Marlex eq 4104 access-list TRS_DC_IN_acl extended permit udp host 10.150.119.65 host Marlex eq 4104 access-list TRS_DC_IN_acl extended permit udp Resi_BU_Net 255.255.0.0 host Marlex eq 4104 access-list TRS_DC_IN_acl extended permit udp Comm_BU_Net 255.255.0.0 host Marlex eq 4104 access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Marlex eq 4105 access-list TRS_DC_IN_acl extended permit tcp host 10.150.119.65 host Marlex eq 4105 access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Marlex eq 4105 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Marlex eq 4105 access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Marlex range 4721 4725 access-list TRS_DC_IN_acl extended permit tcp host 10.150.119.65 host Marlex range 4721 4725 access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Marlex range 4721 4725 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Marlex range 4721 4725 access-list TRS_DC_IN_acl extended permit udp host 10.150.119.65 host Marlex eq 4725 access-list TRS_DC_IN_acl extended permit udp host 10.156.5.10 host Marlex eq 4725 access-list TRS_DC_IN_acl extended permit udp host 10.154.1.32 host Marlex eq 4725 access-list TRS_DC_IN_acl extended permit udp host CCL_HB_StagingHost host Marlex eq 4725 access-list TRS_DC_IN_acl extended permit udp host 10.154.9.10 host Marlex eq 4725 access-list TRS_DC_IN_acl extended permit udp host 10.154.10.10 host Marlex eq 4725 access-list TRS_DC_IN_acl extended permit tcp host 10.150.119.65 host Marlex eq 8198 access-list TRS_DC_IN_acl extended permit tcp host 10.156.5.10 host Marlex eq 8198 access-list TRS_DC_IN_acl extended permit tcp host 10.154.1.32 host Marlex eq 8198 access-list TRS_DC_IN_acl extended permit tcp host CCL_HB_StagingHost host Marlex eq 8198 access-list TRS_DC_IN_acl extended permit tcp host 10.154.9.10 host Marlex eq 8198 access-list TRS_DC_IN_acl extended permit tcp host 10.154.10.10 host Marlex eq 8198 access-list TRS_DC_IN_acl extended permit tcp host CCL_IMM_StagingHost host Marlex eq 8198 access-list TRS_DC_IN_acl extended permit tcp host 10.150.119.65 host Marlex eq 8222 access-list TRS_DC_IN_acl extended permit tcp host 10.156.5.10 host Marlex eq 8222 access-list TRS_DC_IN_acl extended permit tcp host 10.154.1.32 host Marlex eq 8222 access-list TRS_DC_IN_acl extended permit tcp host CCL_HB_StagingHost host Marlex eq 8222 access-list TRS_DC_IN_acl extended permit tcp host 10.154.10.10 host Marlex eq 8222 access-list TRS_DC_IN_acl extended permit tcp host CCL_IMM_StagingHost host Marlex eq 8222 access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Marlex range 797 799 access-list TRS_DC_IN_acl extended permit tcp host 10.150.119.65 host Marlex range 797 799 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Marlex range 797 799 access-list TRS_DC_IN_acl extended permit udp Corp_BU_Net 255.255.248.0 host Marlex eq 800 access-list TRS_DC_IN_acl extended permit udp host 10.150.119.65 host Marlex eq 800 access-list TRS_DC_IN_acl extended permit udp Comm_BU_Net 255.255.0.0 host Marlex eq 800 access-list TRS_DC_IN_acl extended permit tcp host 10.150.119.65 host Marlex eq 1433 access-list TRS_DC_IN_acl extended permit tcp host 10.156.5.10 host Marlex eq 1433 access-list TRS_DC_IN_acl extended permit tcp host 10.156.5.11 host Marlex eq 1433 access-list TRS_DC_IN_acl extended permit tcp host 10.154.1.32 host Marlex eq 1433 access-list TRS_DC_IN_acl extended permit tcp host CCL_HB_StagingHost host Marlex eq 1433 access-list TRS_DC_IN_acl extended permit tcp host 10.154.9.10 host Marlex eq 1433 access-list TRS_DC_IN_acl extended permit tcp host 10.154.10.10 host Marlex eq 1433 access-list TRS_DC_IN_acl extended permit tcp host 10.150.119.65 host Marlex eq 8034 access-list TRS_DC_IN_acl extended permit tcp host 10.156.5.10 host Marlex eq 8036 access-list TRS_DC_IN_acl extended permit tcp host 10.154.1.32 host Marlex eq 8035 access-list TRS_DC_IN_acl remark SCRS 1294 access-list TRS_DC_IN_acl extended permit tcp host CCL_HB_StagingHost host Marlex eq 8045 access-list TRS_DC_IN_acl extended permit tcp host 10.154.9.10 host Marlex eq 8046 access-list TRS_DC_IN_acl extended permit tcp host 10.154.10.10 host Marlex eq 8047 access-list TRS_DC_IN_acl extended permit udp host 10.150.119.65 host Marlex range netbios-ns 139 access-list TRS_DC_IN_acl extended permit udp host 10.154.1.32 host Marlex range netbios-ns 139 access-list TRS_DC_IN_acl extended permit udp host 10.156.5.11 host Marlex range netbios-ns 139 access-list TRS_DC_IN_acl extended permit tcp host 10.156.5.11 host Marlex eq netbios-ssn access-list TRS_DC_IN_acl extended permit tcp host 10.156.5.11 host Marlex eq 445 access-list TRS_DC_IN_acl extended permit tcp host 10.150.119.65 host Marlex eq netbios-ssn access-list TRS_DC_IN_acl extended permit tcp host 10.154.1.32 host Marlex eq netbios-ssn access-list TRS_DC_IN_acl extended permit tcp host 10.150.119.65 host Marlex eq 445 access-list TRS_DC_IN_acl extended permit tcp host 10.150.34.10 host Marlex eq 445 access-list TRS_DC_IN_acl extended permit tcp host 10.154.1.32 host Marlex eq 445 access-list TRS_DC_IN_acl extended permit tcp host 10.150.35.10 host Marlex eq 445 access-list TRS_DC_IN_acl extended permit tcp host 10.150.32.10 host Marlex eq 445 access-list TRS_DC_IN_acl extended permit icmp Resi_BU_Net 255.255.0.0 host Marlex access-list TRS_DC_IN_acl extended permit icmp Comm_BU_Net 255.255.0.0 host Marlex access-list TRS_DC_IN_acl extended permit udp host CT_CA_Console host Marlex range netbios-ns 139 access-list TRS_DC_IN_acl extended permit tcp host CT_CA_Console host Marlex eq netbios-ssn access-list TRS_DC_IN_acl extended permit tcp host CT_CA_Console host Marlex eq 1433 access-list TRS_DC_IN_acl extended permit tcp host CT_CA_Console host Marlex eq 4721 access-list TRS_DC_IN_acl extended permit tcp host CT_CA_Console host Marlex eq 799 access-list TRS_DC_IN_acl extended permit tcp host CT_CA_Console host Marlex eq 800 access-list TRS_DC_IN_acl extended permit tcp host CT_CA_Console host Marlex eq 4105 access-list TRS_DC_IN_acl extended permit tcp host CT_CA_Console host Marlex eq 4724 access-list TRS_DC_IN_acl remark remark Z-END-Traffic flowing toward ITC_NW (v200) Subnet--Z access-list TRS_DC_IN_acl remark remark Z-START--traffic flow to vlan16(TNP_SZ)---Z access-list TRS_DC_IN_acl remark remark For TestPCs PCAnywhere access to Dianoga access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Iarwain eq www access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 host Iarwain eq www access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Iarwain eq www access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Iarwain eq www access-list TRS_DC_IN_acl extended permit tcp Raffles_BU_Net 255.255.0.0 host Iarwain eq www access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Iarwain eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 host Iarwain eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Iarwain eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host Iarwain eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp Raffles_BU_Net 255.255.0.0 host Iarwain eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp host host_172_24_20_12 host Iarwain eq www access-list TRS_DC_IN_acl remark remark Z-END--traffic flow to vlan16(TNP_SZ)---Z access-list TRS_DC_IN_acl remark remark For Ascott Vlan access access-list TRS_DC_IN_acl remark Remark --SCRS 908-- access-list TRS_DC_IN_acl remark remark -------SCRS 302-- MArk Chew SQL --------------- access-list TRS_DC_IN_acl remark remark Z-START--traffic flow to vlan17(TNP_SZ1)---Z access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host host Ariel range 1433 1434 access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host host 10.61.12.153 range 1433 1434 access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host host Neptune range 1433 1434 access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host host Saturn range 1433 1434 access-list TRS_DC_IN_acl remark remark -------End SCRS 302-- MArk Chew SQL ---------- access-list TRS_DC_IN_acl remark remark Z--------End Jouis urgent request Dec "12 " 04--------- access-list TRS_DC_IN_acl extended permit tcp 10.154.4.224 255.255.255.240 host Wandrella eq www access-list TRS_DC_IN_acl extended permit tcp 10.154.4.224 255.255.255.240 host Acklay eq 7001 access-list TRS_DC_IN_acl extended permit tcp host RP_CA_console host Acklay eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host RP_CA_console host Acklay eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp host RP_CA_console host Wandrella eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host RP_CA_console host Wandrella eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp host 10.156.202.246 host Wandrella eq www access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host host Acklay eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host TT_Monitoring_Host host Acklay eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host Wandrella eq www access-list TRS_DC_IN_acl extended permit tcp host COMM-CONTROL1 host Acklay eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host COMM-CONTROL1 host Acklay eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp host COMM-CONTROL1 host Wandrella eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host COMM-CONTROL1 host Wandrella eq pcanywhere-status access-list TRS_DC_IN_acl remark remark Z-END--traffic flow to vlan17(TNP_SZ1)---Z access-list TRS_DC_IN_acl remark remark Z-START-vlan128 acl- access-list TRS_DC_IN_acl remark remark -------SCRS 303-- MARK CHEW PCanyWhere -------- access-list TRS_DC_IN_acl extended permit tcp host Ascott_TT_Host_47 SGTitan1 255.255.255.254 eq pcanywhere-data access-list TRS_DC_IN_acl remark Remark --SCRS 889 -- access-list TRS_DC_IN_acl remark remark For HP Monitoring Ports/Services-------------- access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host host Ariel eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host TT_Monitoring_Host host Ariel eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host host 10.61.12.153 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host TT_Monitoring_Host host 10.61.12.153 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host host Neptune eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host TT_Monitoring_Host host Neptune eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host host Saturn eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host TT_Monitoring_Host host Saturn eq pcanywhere-status access-list TRS_DC_IN_acl remark remark For Access from IT Control zone ( Next 10 lines) access-list TRS_DC_IN_acl extended permit icmp host 10.150.100.225 host Ariel access-list TRS_DC_IN_acl extended permit tcp host 10.150.100.229 host Ariel eq 1433 access-list TRS_DC_IN_acl remark remark -------------- Clean up PCanywehre----------- access-list TRS_DC_IN_acl extended permit ip Ascott_BU_Net 255.255.0.0 any access-list TRS_DC_IN_acl remark remark END -- ACl144 access-list TRS_DC_IN_acl remark remark START - ACl160 access-list TRS_DC_IN_acl remark Remark ---RP hosts to ClearQuest in Bishop ---SCRS 707 replaced by SCRS 850---- access-list TRS_DC_IN_acl remark remark MSSQL access between drpsgstephano1 & SQLVirtual --SCRS 1032-- access-list TRS_DC_IN_acl extended permit udp host Ascott_TT_Host_47 SGTitan1 255.255.255.254 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp host Ascott_TT_Host_43 SGTitan1 255.255.255.254 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host Ascott_TT_Host_43 SGTitan1 255.255.255.254 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp host Thomas_PC SGTitan1 255.255.255.254 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host Thomas_PC SGTitan1 255.255.255.254 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp host Ascott_Host_2-43 SGTitan1 255.255.255.254 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host Ascott_Host_2-43 SGTitan1 255.255.255.254 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host host SGTitan1 eq 1522 access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host host SGTitan1 eq 1523 access-list TRS_DC_IN_acl extended permit tcp host Ariel host SGTitan1 eq 1522 access-list TRS_DC_IN_acl extended permit tcp host Prospero host SGTitan1 eq 1522 access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host host SGTitan1 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host TT_Monitoring_Host host SGTitan1 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host host SGTitan2 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host TT_Monitoring_Host host SGTitan2 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host host SGTitan1 eq sqlnet access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host host SGTitan2 eq sqlnet access-list TRS_DC_IN_acl remark remark For CT access to Worrt--SCRS 401-- access-list TRS_DC_IN_acl extended permit tcp host 10.153.1.91 host Ascott_SQL_VIP range 1433 1434 access-list TRS_DC_IN_acl remark remark For CL Shared zone access ( Vlan 210 ) access-list TRS_DC_IN_acl extended permit udp host 10.153.1.91 host Ascott_SQL_VIP range 1433 1434 access-list TRS_DC_IN_acl remark remark ------ SCRS 1011 ---(consolidated 1011 NetBios consolidated for Ascott)---- access-list TRS_DC_IN_acl remark Remark ----Request by Soon Seng---- access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 host SGCalyso1 eq 137 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 host SGCalyso1 eq 445 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 host SGCalyso1 eq netbios-ssn access-list TRS_DC_IN_acl extended permit udp Ascott_BU_Net 255.255.0.0 host SGCalyso1 range netbios-ns 139 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 host SGCalyso2 eq 137 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 host SGCalyso2 eq 445 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 host SGCalyso2 eq netbios-ssn access-list TRS_DC_IN_acl extended permit udp Ascott_BU_Net 255.255.0.0 host SGCalyso2 range netbios-ns 139 access-list TRS_DC_IN_acl remark remark --- SCRS 971 Thomas requests for HIS vendor---(consolidated SCRS 1011)------ access-list TRS_DC_IN_acl remark remark For Ascott sites to access SGCalyso1 & 2 ---SCRS 960--- access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 host SGCalyso1 eq citrix-ica access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 host SGCalyso2 eq citrix-ica access-list TRS_DC_IN_acl extended permit udp Ascott_BU_Net 255.255.0.0 host SGCalyso1 eq 1604 access-list TRS_DC_IN_acl extended permit udp Ascott_BU_Net 255.255.0.0 host SGCalyso2 eq 1604 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 host SGCalyso1 eq 2513 access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 host SGCalyso2 eq 2513 access-list TRS_DC_IN_acl remark remark ------ SCRS 793--------------------------------------------- access-list TRS_DC_IN_acl extended permit tcp AScott_TT 255.255.255.0 host SGCalyso1 eq citrix-ica access-list TRS_DC_IN_acl extended permit udp AScott_TT 255.255.255.0 host SGCalyso1 eq 1604 access-list TRS_DC_IN_acl extended permit tcp AScott_TT 255.255.255.0 host SGCalyso1 eq 2513 access-list TRS_DC_IN_acl extended permit tcp AScott_TT 255.255.255.0 host SGCalyso2 eq citrix-ica access-list TRS_DC_IN_acl extended permit udp AScott_TT 255.255.255.0 host SGCalyso2 eq 1604 access-list TRS_DC_IN_acl extended permit tcp AScott_TT 255.255.255.0 host SGCalyso2 eq 2513 access-list TRS_DC_IN_acl remark remark ------ Thomas To Access Stephano1/2 scrs 744------------------- access-list TRS_DC_IN_acl extended permit tcp host Ascott_TT_Host_47 host SGStephno1 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host Ascott_TT_Host_47 host SGStephno1 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp host Ascott_TT_Host_47 host SGStephno2 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host Ascott_TT_Host_47 host SGStephno2 eq pcanywhere-status access-list TRS_DC_IN_acl remark remark ------------ Begin SCRS 644 --------------------------------------- access-list TRS_DC_IN_acl remark remark -------------- AScott Admin GR access SGcalypso 1/2 SCRS 644------------ access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 host SGCalyso1 eq ldap access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 host SGCalyso1 eq 445 access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 host SGCalyso1 eq ldaps access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 host SGCalyso1 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp AScott_Admin_TT 255.255.255.248 host SGCalyso1 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 host SGCalyso1 eq citrix-ica access-list TRS_DC_IN_acl extended permit udp AScott_Admin_TT 255.255.255.248 host SGCalyso1 eq 1604 access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 host SGCalyso1 eq 2513 access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 host SGCalyso1 eq 5900 access-list TRS_DC_IN_acl extended permit icmp AScott_Admin_TT 255.255.255.248 host SGCalyso1 access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 host SGCalyso2 eq ldap access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 host SGCalyso2 eq 445 access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 host SGCalyso2 eq ldaps access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 host SGCalyso2 eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp AScott_Admin_TT 255.255.255.248 host SGCalyso2 eq pcanywhere-status access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 host SGCalyso2 eq citrix-ica access-list TRS_DC_IN_acl extended permit udp AScott_Admin_TT 255.255.255.248 host SGCalyso2 eq 1604 access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 host SGCalyso2 eq 2513 access-list TRS_DC_IN_acl extended permit tcp AScott_Admin_TT 255.255.255.248 host SGCalyso2 eq 5900 access-list TRS_DC_IN_acl extended permit icmp AScott_Admin_TT 255.255.255.248 host SGCalyso2 access-list TRS_DC_IN_acl remark remark ------ SCRS 466 -- PCanywhere & SQL--------------------------- access-list TRS_DC_IN_acl remark remark For SGStephno1/2 file transfer from HIS----SCRS 444---- access-list TRS_DC_IN_acl remark Ascott Admin Hosts to access Aimuda ----SCRS 908---- access-list TRS_DC_IN_acl extended permit tcp host 10.61.12.153 host SGStephno1 range 137 netbios-ssn access-list TRS_DC_IN_acl extended permit tcp host 10.61.12.153 host SGStephno2 range 137 netbios-ssn access-list TRS_DC_IN_acl extended permit tcp host 10.61.12.153 host SGStephno1 eq 445 access-list TRS_DC_IN_acl extended permit tcp host 10.61.12.153 host SGStephno2 eq 445 access-list TRS_DC_IN_acl remark remark --------------end SCRS 444 -------------------------------- access-list TRS_DC_IN_acl remark remark ------ NREMS Ports for Copr LAN to CLNT07------------------ access-list TRS_DC_IN_acl remark remark ----------------------Urgent FTP Control PC 28-09-04---- access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host host Ascott_SQL_VIP range ftp-data ftp access-list TRS_DC_IN_acl extended permit udp host TT_Monitoring_Host host Ascott_SQL_VIP range 20 21 access-list TRS_DC_IN_acl remark remark ----------------------SCRS 351 & 352--------------------- access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host host Ascott_SQL_VIP range 137 netbios-ssn access-list TRS_DC_IN_acl remark remark For TT & LC to access SGCALYPSO1 & 2 access-list TRS_DC_IN_acl remark remark -------SCRS 302-- MArk Chew SQL ------------------------- access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host host Ascott_SQL_VIP range 1433 1434 access-list TRS_DC_IN_acl remark remark -------End SCRS 302-- MArk Chew SQL --------------------- access-list TRS_DC_IN_acl remark remark -------SCRS 303-- MArk Chew PCAnyWhere------------------- access-list TRS_DC_IN_acl extended permit udp object-group CL_SBUs any eq domain access-list TRS_DC_IN_acl extended permit udp object-group CL_SBUs any eq ntp access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs object-group CCL_Retail_Nets_Mgp eq telnet access-list TRS_DC_IN_acl extended permit tcp object-group SBU_Control_PCs object-group CCL_Retail_Nets_Mgp eq ssh access-list TRS_DC_IN_acl extended permit icmp object-group CCL_Retail_Nets_Mgp host Monitor-PC echo-reply access-list TRS_DC_IN_acl extended permit tcp object-group CCL_Retail_Nets_Mgp host Neucleus1 object-group HTTP_HTTPS access-list TRS_DC_IN_acl extended permit tcp host TT_Monitoring_Host host Ascott_SQL_VIP eq pcanywhere-data access-list TRS_DC_IN_acl extended permit udp host TT_Monitoring_Host host Ascott_SQL_VIP eq pcanywhere-status access-list TRS_DC_IN_acl remark remark -------End SCRS 303-- MArk Chew PCAnyWhere--------------- access-list TRS_DC_IN_acl extended permit tcp host Ascott_TT_Host_44 host SGCalyso1 eq citrix-ica access-list TRS_DC_IN_acl extended permit udp host Ascott_TT_Host_44 host SGCalyso1 eq 1604 access-list TRS_DC_IN_acl extended permit tcp host Ascott_TT_Host_44 host SGCalyso1 eq 2513 access-list TRS_DC_IN_acl extended permit tcp host Ascott_TT_Host_44 host SGCalyso2 eq citrix-ica access-list TRS_DC_IN_acl extended permit udp host Ascott_TT_Host_44 host SGCalyso2 eq 1604 access-list TRS_DC_IN_acl extended permit tcp host Ascott_TT_Host_44 host SGCalyso2 eq 2513 access-list TRS_DC_IN_acl extended permit tcp host Blandine_PC host SGCalyso1 eq citrix-ica access-list TRS_DC_IN_acl remark remark ------ Drive Mapping for Corp Users------------------ access-list TRS_DC_IN_acl extended permit udp host Blandine_PC host SGCalyso1 eq 1604 access-list TRS_DC_IN_acl extended permit tcp host Blandine_PC host SGCalyso1 eq 2513 access-list TRS_DC_IN_acl extended permit tcp host Blandine_PC host SGCalyso2 eq citrix-ica access-list TRS_DC_IN_acl extended permit udp host Blandine_PC host SGCalyso2 eq 1604 access-list TRS_DC_IN_acl extended permit tcp host Blandine_PC host SGCalyso2 eq 2513 access-list TRS_DC_IN_acl remark remark For Ascott Aus Vlan access access-list TRS_DC_IN_acl remark SCRS 1477 -- To allow SMTP traffic from pestpatrol server to Equinix SMTP relay (202.79.193.20). access-list TRS_DC_IN_acl remark remark ** Next two lines for SCRS 217/219 26-08-04 --Pcanywhere to SQ Server ** access-list TRS_DC_IN_acl remark To allow Residential Server to access SMTP --SCRS 1170-- access-list TRS_DC_IN_acl extended permit tcp Blandine_PC 255.255.255.254 host Ascott_SQL_VIP eq pcanywhere-data log access-list TRS_DC_IN_acl extended permit udp Blandine_PC 255.255.255.254 host Ascott_SQL_VIP eq pcanywhere-status log access-list TRS_DC_IN_acl remark remark For Blocking RIL Network access ( Next 1line) access-list TRS_DC_IN_acl remark remark For HP Mon Servers to monitor the Vlan access-list TRS_DC_IN_acl remark remark ------------------ Clean Up PCanyhere------------- access-list TRS_DC_IN_acl remark remark END - ACl160 access-list TRS_DC_IN_acl remark SCRS 1657 access-list TRS_DC_IN_acl remark remark START InterSBU access-list TRS_DC_IN_acl remark SCRS 1657 access-list TRS_DC_IN_acl remark remark InterSBU Robinson Point to Data Centre access-list TRS_DC_IN_acl remark SCRS 1629 access-list TRS_DC_IN_acl remark remark ------Zalina PC access to CLNT05------------------ access-list TRS_DC_IN_acl remark SCRS 1629 access-list TRS_DC_IN_acl remark remark ------Bishop access to CLNS01--------------------- access-list TRS_DC_IN_acl remark SCRS 1592 - Gerald Lee access to Titania. access-list TRS_DC_IN_acl remark remark ---------- For Access from DC Z-IT Control zone ----------------------- access-list TRS_DC_IN_acl remark SCRS 1794 access-list TRS_DC_IN_acl remark SCRS 1571 access-list TRS_DC_IN_acl remark remark ----For Susie Chia to access Phoenix----------------- access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Iceman range 2512 2513 access-list TRS_DC_IN_acl remark SCRS 1571 access-list TRS_DC_IN_acl remark SCRS 1544 access-list TRS_DC_IN_acl remark Remark ---Access to AMOS,IIOP and SQL in Bishop--SCRS844-- access-list TRS_DC_IN_acl remark SCRS 1461 access-list TRS_DC_IN_acl remark remark For Rajagopal relocated to TT on 30 Dec 2004 by Paul access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Caliban range 5000 5001 access-list TRS_DC_IN_acl remark remark ------RP network access to Gambit--------------------- access-list TRS_DC_IN_acl remark remark For management of ResiSw access-list TRS_DC_IN_acl remark Remark ---Access to AMOS,IIOP and SQL in Bishop--SCRS844-- access-list TRS_DC_IN_acl remark remark ----------Martin Tan access to Phoenix-------- access-list TRS_DC_IN_acl remark TT control hosts to access Corp Servers. access-list TRS_DC_IN_acl remark remark For Access from IT Control zone ( Next 9 lines) access-list TRS_DC_IN_acl remark TT control hosts to access Comm Servers. access-list TRS_DC_IN_acl remark remark ----------Martin Tan access to Phoenix-------- access-list TRS_DC_IN_acl remark remark ----------EUC user access to Phoenix---------------- access-list TRS_DC_IN_acl remark TT control hosts to access Comm Servers. access-list TRS_DC_IN_acl remark remark ----------Treasury Users access to Phoenix---------- access-list TRS_DC_IN_acl remark For AD Trust between Calisto and Rodian --SCRS 998-- access-list TRS_DC_IN_acl remark remark ----------EUC user access to Phoenix---------------- access-list TRS_DC_IN_acl extended permit tcp object-group Corp_Treasury_Hosts host Phoenix eq 524 access-list TRS_DC_IN_acl remark remark ----------HR Users access to Phoenix--------------- access-list TRS_DC_IN_acl remark Request by Susie Chia access-list TRS_DC_IN_acl remark David Pillay from CT to access CRLNT10 via http -- SCRS 747 -- access-list TRS_DC_IN_acl remark SCRS 1423 -- Jeremy Soh to access FW & Sys Analyzer -- access-list TRS_DC_IN_acl extended permit tcp object-group Corp_HR_Hosts host Phoenix eq 524 access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.200 host 10.156.2.197 eq 524 access-list TRS_DC_IN_acl remark remark ----------HR Users access to CRLNT10 (RESI)--------- access-list TRS_DC_IN_acl extended permit tcp object-group Corp_HR_Hosts host CRLNT10 eq www access-list TRS_DC_IN_acl remark remark ----------HR Users access to CRLNT10 (RESI)--------- access-list TRS_DC_IN_acl remark Wendy Tan from CT to access CRLNT10 via http -- SCRS 1054 -- access-list TRS_DC_IN_acl remark remark ----------Treasury Users access to Phoenix---------- access-list TRS_DC_IN_acl remark SBU Control PCs PCAnywhere access to DC servers access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.15 host CRLNT10 eq www access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.200 host CRLNT10 eq www access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.210 host CRLNT10 eq www access-list TRS_DC_IN_acl remark remark ----------CLNS01 & BackupCLNS access to Bishop---- access-list TRS_DC_IN_acl remark For CSLucas developers relocated to 19 floor, TT. access-list TRS_DC_IN_acl extended permit tcp host CLNS01 host Jubilee eq 524 access-list TRS_DC_IN_acl extended permit icmp host CLNS01 host Jubilee access-list TRS_DC_IN_acl extended permit tcp host BACKUPCLNS host Jubilee eq 524 access-list TRS_DC_IN_acl extended permit icmp host BACKUPCLNS host Jubilee access-list TRS_DC_IN_acl remark remark InterSBU Residential (Temasek Tower) to Capital Tower access-list TRS_DC_IN_acl remark Request by Yiu San on 28 March 2005 access-list TRS_DC_IN_acl remark remark For SBU to Residential(VLAN 208) access-list TRS_DC_IN_acl remark Remark ---Ascott sites to access SGCalyso 1 - 2 ---SCRS960--- access-list TRS_DC_IN_acl extended permit tcp 10.156.202.0 255.255.255.192 host CLNS01 eq 524 access-list TRS_DC_IN_acl remark remark END InterSBU access-list TRS_DC_IN_acl remark Remark ---Ascott sites to access SGCalyso 3 - 8 ---SCRS960--- access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Gambit range 9000 9009 access-list TRS_DC_IN_acl remark START STMS acl access-list TRS_DC_IN_acl remark Remark--For Raffles Hosts to access Bloomberg sites-- access-list TRS_DC_IN_acl extended permit tcp 10.150.0.0 255.255.0.0 host 10.1.100.4 access-list TRS_DC_IN_acl remark SCRS 2473 access-list TRS_DC_IN_acl extended permit tcp AScott_TT 255.255.255.0 host Ascott-BPE-Srv eq 5252 access-list TRS_DC_IN_acl extended permit tcp AScott_TT 255.255.255.0 host 10.1.100.4 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.224.0 host 10.1.100.4 access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host 10.1.100.4 access-list TRS_DC_IN_acl extended permit tcp Raffles_BU_Net 255.255.0.0 host 10.1.100.4 access-list TRS_DC_IN_acl extended permit tcp Raffles_RCH 255.255.0.0 host 10.1.100.4 access-list TRS_DC_IN_acl extended permit tcp Raffles-Swissotel 255.255.252.0 host 10.1.100.4 access-list TRS_DC_IN_acl extended permit tcp 195.35.121.0 255.255.255.0 host 10.1.100.4 access-list TRS_DC_IN_acl remark Z---------SBUs Control Hosts to access FWMS PDM----------------------- access-list TRS_DC_IN_acl extended permit tcp object-group CL_SBUs 10.200.0.0 255.254.0.0 eq www access-list TRS_DC_IN_acl extended permit tcp object-group CL_SBUs 10.200.0.0 255.254.0.0 eq https access-list TRS_DC_IN_acl extended permit tcp object-group CL_SBUs 10.200.0.0 255.254.0.0 eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp Raffles-Swissotel 255.255.252.0 10.200.0.0 255.254.0.0 eq www access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.224.0 10.200.0.0 255.254.0.0 eq www access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 10.200.0.0 255.254.0.0 eq www access-list TRS_DC_IN_acl extended permit tcp Raffles_BU_Net 255.255.0.0 10.200.0.0 255.254.0.0 eq www access-list TRS_DC_IN_acl extended permit tcp 10.150.0.0 255.255.0.0 10.200.0.0 255.254.0.0 eq www access-list TRS_DC_IN_acl extended permit tcp Raffles_RCH 255.255.0.0 10.200.0.0 255.254.0.0 eq www access-list TRS_DC_IN_acl extended permit tcp 195.35.121.0 255.255.255.0 10.200.0.0 255.254.0.0 eq www access-list TRS_DC_IN_acl extended permit tcp Raffles-Swissotel 255.255.252.0 10.200.0.0 255.254.0.0 eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.224.0 10.200.0.0 255.254.0.0 eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 10.200.0.0 255.254.0.0 eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp Raffles_BU_Net 255.255.0.0 10.200.0.0 255.254.0.0 eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp 10.150.0.0 255.255.0.0 10.200.0.0 255.254.0.0 eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp Raffles_RCH 255.255.0.0 10.200.0.0 255.254.0.0 eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp 195.35.121.0 255.255.255.0 10.200.0.0 255.254.0.0 eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp Raffles-Swissotel 255.255.252.0 10.200.0.0 255.254.0.0 eq https access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.224.0 10.200.0.0 255.254.0.0 eq https access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 10.200.0.0 255.254.0.0 eq https access-list TRS_DC_IN_acl extended permit tcp Raffles_BU_Net 255.255.0.0 10.200.0.0 255.254.0.0 eq https access-list TRS_DC_IN_acl extended permit tcp 10.150.0.0 255.255.0.0 10.200.0.0 255.254.0.0 eq https access-list TRS_DC_IN_acl extended permit tcp Raffles_RCH 255.255.0.0 10.200.0.0 255.254.0.0 eq https access-list TRS_DC_IN_acl extended permit tcp 192.168.181.0 255.255.255.0 10.200.0.0 255.254.0.0 eq https access-list TRS_DC_IN_acl extended permit tcp 195.35.121.0 255.255.255.0 10.200.0.0 255.254.0.0 eq https access-list TRS_DC_IN_acl extended permit tcp Raffles-Swissotel 255.255.252.0 host 10.61.18.11 eq www access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.224.0 host 10.61.18.11 eq www access-list TRS_DC_IN_acl extended permit tcp Resi_BU_Net 255.255.0.0 host 10.61.18.11 eq www access-list TRS_DC_IN_acl extended permit tcp Raffles_BU_Net 255.255.0.0 host 10.61.18.11 eq www access-list TRS_DC_IN_acl extended permit tcp 10.150.0.0 255.255.0.0 host 10.61.18.11 eq www access-list TRS_DC_IN_acl extended permit tcp Raffles_RCH 255.255.0.0 host 10.61.18.11 eq www access-list TRS_DC_IN_acl extended permit tcp 195.35.121.0 255.255.255.0 host 10.61.18.11 eq www access-list TRS_DC_IN_acl extended permit tcp Ascott_BU_Net 255.255.0.0 host 10.61.18.11 eq www access-list TRS_DC_IN_acl extended permit tcp 172.16.67.0 255.255.255.0 10.200.0.0 255.254.0.0 eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp Secura_VPN_Pool1 255.255.255.240 10.200.0.0 255.254.0.0 eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host 10.61.18.55 eq www access-list TRS_DC_IN_acl extended permit tcp Corp_BU_Net 255.255.248.0 host 10.61.18.54 eq www access-list TRS_DC_IN_acl extended permit tcp host host_172_24_20_12 host 10.61.18.11 eq www access-list TRS_DC_IN_acl extended permit tcp AScott_TT 255.255.255.0 10.200.0.0 255.254.0.0 eq lotusnotes access-list TRS_DC_IN_acl remark Remark--For Corporate Host to access Bloomberg sites-- access-list TRS_DC_IN_acl remark access-list TRS_DC_IN_acl remark Remark -- CCL to access Bishop via port 1433 access-list TRS_DC_IN_acl extended permit tcp 10.154.64.0 255.255.255.0 any object-group HTTP_HTTPS access-list TRS_DC_IN_acl extended permit tcp 10.154.64.0 255.255.255.0 10.200.0.0 255.254.0.0 eq www access-list TRS_DC_IN_acl extended permit tcp 10.154.64.0 255.255.255.0 10.200.0.0 255.254.0.0 eq lotusnotes access-list TRS_DC_IN_acl extended permit tcp 10.154.64.0 255.255.255.0 10.200.0.0 255.254.0.0 eq https access-list TRS_DC_IN_acl extended permit tcp 10.154.64.0 255.255.255.0 host 10.61.18.11 eq www access-list TRS_DC_IN_acl extended permit icmp object-group TRS_DC_IN_Anti_Spoofing 10.200.0.0 255.254.0.0 access-list TRS_DC_IN_acl remark END STMS acl access-list TRS_DC_IN_acl remark remark START - AscottRT - Ascott SG property access-list TRS_DC_IN_acl remark Remark --For Jason and Javen to access Neucleus1 --SCRS 924 -- access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing 10.153.2.0 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing AS_Grand_Carnhill 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing AS_Orchard 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing AS_Bencoolen 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing AS_Compass 255.255.255.0 access-list TRS_DC_IN_acl extended permit ip object-group TRS_DC_IN_Anti_Spoofing AS_TAS 255.255.255.0 access-list TRS_DC_IN_acl remark Remark ---CCL Citrix Farm to access AMOS, IRS application ---SCRS941--- access-list TRS_DC_IN_acl extended permit tcp host CCL_Rogue host CCL_Bishop eq citrix-ica access-list TRS_DC_IN_acl extended permit udp host Raffles-Proxy-Server Raffles_BU_Net 255.255.0.0 object-group Raffles-Proxy-UDP access-list TRS_DC_IN_acl extended permit tcp host Raffles-Proxy-Server Raffles_BU_Net 255.255.0.0 object-group Raffles-Proxy access-list TRS_DC_IN_acl remark access-list TRS_DC_IN_acl remark remark For HP Monitoring Ports/Services-------------- access-list TRS_DC_IN_acl remark access-list TRS_DC_IN_acl remark Remark ---RP hosts to ClearQuest in Bishop ---SCRS 707 replaced by SCRS 850---- access-list TRS_DC_IN_acl remark access-list TRS_DC_IN_acl remark Remark ---Access to AMOS,IIOP and SQL in Bishop--SCRS844-- access-list TRS_DC_IN_acl remark access-list TRS_DC_IN_acl remark Remark ---Access to AMOS,IIOP and SQL in Bishop--SCRS844-- access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.200 host Phoenix eq 524 access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.217 host Phoenix eq 524 access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.221 host Phoenix eq 524 access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.223 host Phoenix eq 524 access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.224 host Phoenix eq 524 access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.232 host Phoenix eq 524 access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.238 host Phoenix eq 524 access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.236 host Phoenix eq 524 access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.241 host Phoenix eq 524 access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.244 host Phoenix eq 524 access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.248 host Phoenix eq 524 access-list TRS_DC_IN_acl remark remark ----------HR Users access to Phoenix-------- access-list TRS_DC_IN_acl remark SBU Control PCs PCAnywhere access to DC servers access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.15 host Phoenix eq 524 access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.24 host Phoenix eq 524 access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.210 host Phoenix eq 524 access-list TRS_DC_IN_acl extended permit tcp host 10.150.122.240 host Phoenix eq 524 access-list TRS_DC_IN_acl remark access-list TRS_DC_IN_acl extended permit tcp 10.154.15.0 255.255.255.0 host Phoenix eq 524 access-list TRS_DC_IN_acl remark remark ------Zalina PC access to CLNT05--------------------- access-list TRS_DC_IN_acl remark Remark ------SCRS 874------- access-list TRS_DC_IN_acl remark SBU Control PCs PCAnywhere access to DC servers access-list TRS_DC_IN_acl remark SCRS 1477 -- To allow SMTP traffic from pestpatrol server to Equinix SMTP relay (202.79.193.20). access-list TRS_DC_IN_acl remark access-list TRS_DC_IN_acl extended permit udp host 10.154.4.108 host 10.150.120.38 eq domain access-list TRS_DC_IN_acl remark remark ------Bishop access to CLNS01------------------------ access-list TRS_DC_IN_acl extended permit tcp host Jubilee host CLNS01 eq 524 access-list TRS_DC_IN_acl remark remark ------CCL Mgmt team access to Phoenix---------------- access-list TRS_DC_IN_acl extended permit tcp 10.154.4.224 255.255.255.224 host Phoenix eq ldap access-list TRS_DC_IN_acl remark remark ------RP network access to Havok--------------------- access-list TRS_DC_IN_acl remark remark ------RP network access to Iceman--------------------- access-list TRS_DC_IN_acl remark SCRS 1461 access-list TRS_DC_IN_acl remark remark ------RP network access to Cyclops--------------------- access-list TRS_DC_IN_acl remark remark ------RP network access to Maverick--------------------- access-list TRS_DC_IN_acl remark access-list TRS_DC_IN_acl remark remark ------RP network access to Caliban--------------------- access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.248.0 host Phoenix eq 445 access-list TRS_DC_IN_acl remark remark ------RP network access to Havok--------------------- access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Havok eq www access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Havok eq https access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Havok eq citrix-ica access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Havok eq 2512 access-list TRS_DC_IN_acl extended permit udp Comm_BU_Net 255.255.0.0 host Iceman eq 1604 access-list TRS_DC_IN_acl remark remark ------RP network access to Iceman--------------------- access-list TRS_DC_IN_acl extended deny udp host Raffles-Proxy-Server 10.0.0.0 255.0.0.0 object-group Raffles-Proxy-UDP access-list TRS_DC_IN_acl extended deny tcp host Raffles-Proxy-Server 10.0.0.0 255.0.0.0 object-group Raffles-Proxy access-list TRS_DC_IN_acl extended permit udp host Raffles-Proxy-Server any object-group Raffles-Proxy-UDP access-list TRS_DC_IN_acl extended permit tcp host Raffles-Proxy-Server any object-group Raffles-Proxy access-list TRS_DC_IN_acl remark remark Z---Permit Acl for all other internet bound traffic flow---Z access-list TRS_DC_IN_acl remark SCRS 1461 access-list TRS_DC_IN_acl remark remark Z---Permit Acl for all other internet bound traffic flow---Z access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Iceman eq www access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Iceman eq https access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Iceman eq 445 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Iceman eq citrix-ica access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Iceman eq 2512 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Iceman eq 2513 access-list TRS_DC_IN_acl remark remark ------RP network access to Cyclops--------------------- access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Cyclops eq www access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Cyclops eq lotusnotes access-list TRS_DC_IN_acl remark remark ------RP network access to Maverick--------------------- access-list TRS_DC_IN_acl remark access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Maverick eq www access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Caliban eq netbios-ssn access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Caliban eq 445 access-list TRS_DC_IN_acl extended permit udp Comm_BU_Net 255.255.0.0 host Caliban eq 445 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Caliban eq 1433 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Caliban eq 5000 access-list TRS_DC_IN_acl extended permit tcp Comm_BU_Net 255.255.0.0 host Caliban eq 5001 access-list TRS_DC_IN_acl extended deny ip 10.157.176.0 255.255.255.0 any access-list TRS_DC_IN_acl extended deny ip host host10_61_12_15 any access-list TRS_DC_IN_acl extended deny ip 10.156.17.0 255.255.255.0 TMP_CG_subnet 255.255.255.0 access-list TRS_DC_IN_acl extended deny ip 10.156.128.0 255.255.192.0 any access-list TRS_DC_IN_acl extended deny ip 10.156.192.0 255.255.248.0 any access-list TRS_DC_IN_acl extended deny ip any 192.168.0.0 255.255.0.0 log access-list TRS_DC_IN_acl extended deny ip any 10.0.0.0 255.0.0.0 log access-list TRS_DC_IN_acl remark remark ------RP network access to Caliban--------------------- access-list TRS_DC_IN_acl extended deny ip any any access-list ITC_NW_acl remark SCRS 2429 access-list ITC_NW_acl extended permit tcp host Trebor host 10.154.1.32 eq 6688 access-list ITC_NW_acl remark SCRS 2429 access-list ITC_NW_acl extended permit udp host Trebor host 10.154.1.32 eq 42508 access-list ITC_NW_acl remark SCRS 2429 access-list ITC_NW_acl extended permit tcp host Trebor host 10.154.1.32 range 42509 42511 access-list ITC_NW_acl remark SCRS 2429 access-list ITC_NW_acl extended permit tcp host Trebor Corp_BU_Net 255.255.248.0 eq 135 access-list ITC_NW_acl remark SCRS 2429 access-list ITC_NW_acl extended permit tcp host Trebor Corp_BU_Net 255.255.248.0 eq 5000 access-list ITC_NW_acl remark SCRS 2429 access-list ITC_NW_acl extended permit tcp host Trebor Comm_BU_Net 255.255.224.0 eq 135 access-list ITC_NW_acl remark SCRS 2429 access-list ITC_NW_acl extended permit tcp host Trebor Comm_BU_Net 255.255.224.0 eq 5000 access-list ITC_NW_acl remark SCRS 2429 access-list ITC_NW_acl extended permit tcp host Trebor 10.156.202.0 255.255.255.0 eq 135 access-list ITC_NW_acl remark SCRS 2429 access-list ITC_NW_acl extended permit tcp host Trebor 10.156.202.0 255.255.255.0 eq 5000 access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts 10.157.176.0 255.255.255.0 eq 6502 access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts 10.157.176.0 255.255.255.0 eq 6502 access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts Comm_BU_Net 255.255.0.0 object-group HTTP_HTTPS access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts VLAN888 255.255.255.248 eq telnet access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts VLAN888 255.255.255.248 eq ssh access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts Comm_BU_Net 255.255.0.0 eq ssh access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts Comm_BU_Net 255.255.0.0 eq telnet access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts object-group SGDeimosX eq domain access-list ITC_NW_acl extended permit tcp host 10.150.200.73 host Saelt1 eq 2163 access-list ITC_NW_acl extended permit tcp host 10.150.200.73 host Saelt2 eq 2163 access-list ITC_NW_acl extended permit tcp host 10.150.200.73 host Saelt2 eq 2162 access-list ITC_NW_acl extended permit tcp host 10.150.200.73 host Saelt1 eq 2162 access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host 10.154.65.250 object-group telnet_ssh access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host 10.154.65.250 object-group HTTP_HTTPS access-list ITC_NW_acl extended permit tcp object-group Omniback_Svrs TMP_CG_subnet 255.255.255.192 object-group OmniBackup access-list ITC_NW_acl extended permit tcp object-group Omniback_Svrs DMZ 255.255.255.192 object-group OmniBackup access-list ITC_NW_acl extended permit tcp object-group Omniback_Svrs TMP_AS_Subnet 255.255.255.240 object-group OmniBackup access-list ITC_NW_acl extended permit tcp object-group Omniback_Svrs TMP_A2_Subnet 255.255.255.240 object-group OmniBackup access-list ITC_NW_acl extended permit tcp object-group Omniback_Svrs TMP_CM_Subnet 255.255.255.240 object-group OmniBackup access-list ITC_NW_acl extended permit tcp object-group Omniback_Svrs TMP_RS_Subnet 255.255.255.240 object-group OmniBackup access-list ITC_NW_acl extended permit tcp object-group Omniback_Svrs object-group STA_AS_Anti_Spoofing object-group OmniBackup access-list ITC_NW_acl extended permit tcp object-group Omniback_Svrs object-group CCL_AS_Anti_Spoofing object-group OmniBackup access-list ITC_NW_acl extended permit tcp object-group Omniback_Svrs 10.150.128.192 255.255.255.192 object-group OmniBackup access-list ITC_NW_acl extended permit tcp object-group Omniback_Svrs object-group TMP_SZ1_Anti_Spoofing object-group OmniBackup access-list ITC_NW_acl extended permit tcp object-group Omniback_Svrs object-group TMP_SZ2_Anti_Spoofing object-group OmniBackup access-list ITC_NW_acl extended permit tcp object-group Omniback_Svrs object-group TMP_SZ_Anti_Spoofing object-group OmniBackup access-list ITC_NW_acl extended permit tcp object-group Omniback_Svrs object-group DCB_AS_Anti_Spoofing object-group OmniBackup access-list ITC_NW_acl extended permit tcp object-group Omniback_Svrs object-group DCB_CM_Anti_Spoofing object-group OmniBackup access-list ITC_NW_acl extended permit tcp object-group Omniback_Svrs object-group DCB_CP_Anti_Spoofing object-group OmniBackup access-list ITC_NW_acl extended permit tcp object-group Omniback_Svrs object-group DCB_RHL_Anti_Spoofing object-group OmniBackup access-list ITC_NW_acl extended permit tcp object-group Omniback_Svrs Buz_Partner 255.255.255.0 object-group OmniBackup access-list ITC_NW_acl extended permit tcp object-group Omniback_Svrs Security_Ctrl_Zone 255.255.255.0 object-group OmniBackup access-list ITC_NW_acl extended permit tcp object-group Omniback_Svrs object-group CSR_CL_Anti_Spoofing object-group OmniBackup access-list ITC_NW_acl extended permit tcp object-group Omniback_Svrs object-group CSR_CG_Anti_Spoofing object-group OmniBackup access-list ITC_NW_acl extended permit tcp object-group Omniback_Svrs EMC_DC 255.255.255.248 object-group OmniBackup access-list ITC_NW_acl extended permit tcp object-group Omniback_Svrs ENR_DC 255.255.255.240 object-group OmniBackup access-list ITC_NW_acl extended permit tcp object-group Omniback_Svrs host 172.200.1.1 object-group OmniBackup access-list ITC_NW_acl extended permit tcp host Marlex object-group CCL_VIP_VPN eq 4105 access-list ITC_NW_acl extended permit udp host Marlex object-group CCL_VIP_VPN eq 4104 access-list ITC_NW_acl extended permit udp host Marlex Comm_BU_Net 255.255.0.0 eq 4104 access-list ITC_NW_acl extended permit tcp host Trebor host Rodian range 7000 7200 access-list ITC_NW_acl extended permit tcp host Trebor host Ackbar range 7000 7200 access-list ITC_NW_acl extended permit udp host Trebor host Ackbar object-group AD_UDP_Services access-list ITC_NW_acl extended permit tcp host Trebor host Ackbar object-group AD_TCP_Services access-list ITC_NW_acl extended permit tcp host Trebor host Rodian object-group AD_TCP_Services access-list ITC_NW_acl extended permit udp host Trebor host Rodian object-group AD_UDP_Services access-list ITC_NW_acl extended permit tcp host Trebor Comm_BU_Net 255.255.224.0 object-group TCP135_TCP5000 access-list ITC_NW_acl extended permit tcp host Trebor Corp_BU_Net 255.255.248.0 object-group TCP135_TCP5000 access-list ITC_NW_acl extended permit tcp host Trebor host 10.156.202.0 object-group TCP135_TCP5000 access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host Aumida eq ssh access-list ITC_NW_acl extended permit tcp host Muftakia host Acapulco object-group Omniback_Ports access-list ITC_NW_acl extended permit ip object-group DC_Control_Hosts host 172.24.7.78 access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host RHLSVRNOM1 eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts host 10.150.128.196 eq pcanywhere-status access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host 10.150.128.196 eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts host RHLSVRNOM1 eq pcanywhere-status access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host 10.155.0.2 eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts host 10.155.0.2 eq pcanywhere-status access-list ITC_NW_acl extended permit udp host Marlex object-group CCL_VIP_VPN_Stagging object-group Unicenter_SD2 access-list ITC_NW_acl extended permit tcp host Marlex object-group CCL_VIP_VPN_Stagging object-group Unicenter_SD1_RC1 access-list ITC_NW_acl extended permit udp host Marlex object-group CCL_VIP_VPN object-group Unicenter_RC2 access-list ITC_NW_acl extended permit tcp host Marlex object-group CCL_VIP_VPN object-group Unicenter-RC1 access-list ITC_NW_acl extended permit icmp object-group DC_Control_Hosts object-group CSR_CL_Anti_Spoofing access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts object-group SAP_PhySvr_Group range ssh telnet access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host 10.156.202.188 object-group HTTP_HTTPS access-list ITC_NW_acl extended permit icmp host Marlex Comm_BU_Net 255.255.0.0 access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host VPN_Aventail2 eq 8443 access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host 10.150.203.105 eq 8443 access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts MGT_DC_Subnet 255.255.255.0 range ssh telnet access-list ITC_NW_acl remark FTP SERVICE TO MANWE. access-list ITC_NW_acl extended permit tcp object-group ITC_NW_Anti_Spoofing host ManWe range ftp-data ftp access-list ITC_NW_acl extended permit icmp object-group DC_Control_Hosts object-group CCL_Retail_Nets_Mgp access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts object-group CCL_Retail_GWs range ssh telnet access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts object-group RHL_Svr eq 6502 access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts object-group RHL_Svr eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts object-group RHL_Svr eq pcanywhere-status access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts object-group SBU_Control_Hosts eq pcanywhere-data access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host Sidaster eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts host Sidaster eq pcanywhere-status access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts object-group SBU_Control_Hosts eq pcanywhere-status access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts DCB_RHL_Subnet 255.255.255.0 eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts DCB_RHL_Subnet 255.255.255.0 eq pcanywhere-status access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts TMP_CG_subnet 255.255.255.192 eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts TMP_CG_subnet 255.255.255.192 eq pcanywhere-status access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts DMZ 255.255.255.240 eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts DMZ 255.255.255.240 eq pcanywhere-status access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts TMP_AS_Subnet 255.255.255.240 eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts TMP_AS_Subnet 255.255.255.240 eq pcanywhere-status access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts TMP_A2_Subnet 255.255.255.240 eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts TMP_A2_Subnet 255.255.255.240 eq pcanywhere-status access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts TMP_RS_Subnet 255.255.255.240 eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts TMP_RS_Subnet 255.255.255.240 eq pcanywhere-status access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts STA_AS_Subnet 255.255.255.192 eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts STA_AS_Subnet 255.255.255.192 eq pcanywhere-status access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts CCL_AS_Subnet 255.255.255.192 eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts CCL_AS_Subnet 255.255.255.192 eq pcanywhere-status access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts TMP_SZ1_Subnet 255.255.255.192 eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts TMP_SZ1_Subnet 255.255.255.192 eq pcanywhere-status access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts TMP_SZ2 255.255.255.240 eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts TMP_SZ2 255.255.255.240 eq pcanywhere-status access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts TMP_SZ_Subnet 255.255.255.240 eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts TMP_SZ_Subnet 255.255.255.240 eq pcanywhere-status access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts DCB_AS_Subnet 255.255.255.0 eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts DCB_AS_Subnet 255.255.255.0 eq pcanywhere-status access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts DCB_CM_Subnet 255.255.255.0 eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts DCB_CM_Subnet 255.255.255.0 eq pcanywhere-status access-list ITC_NW_acl remark remark ----- ----------------- PCanywhere to Corporate VLAN 134 access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts DCB_CP_Subnet 255.255.255.0 eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts DCB_CP_Subnet 255.255.255.0 eq pcanywhere-status access-list ITC_NW_acl remark remark ------- TestPCs to access Titania --------------------- access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host Ascott-BPE-Srv eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts host Ascott-BPE-Srv eq pcanywhere-status access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts Security_Ctrl_Zone 255.255.255.0 eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts Security_Ctrl_Zone 255.255.255.0 eq pcanywhere-status access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts CSR_CL_subnet 255.255.255.0 eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts CSR_CL_subnet 255.255.255.0 eq pcanywhere-status access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts CSR_CG_Subnet 255.255.255.0 eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts CSR_CG_Subnet 255.255.255.0 eq pcanywhere-status access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts host Anakin_ eq pcanywhere-status access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host Anakin_ eq pcanywhere-data access-list ITC_NW_acl remark access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts ILO_Net 255.255.0.0 eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts ILO_Net 255.255.0.0 eq pcanywhere-status access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host 10.150.120.2 eq www access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts DMZ 255.255.255.240 eq ssh access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host Jubilee eq 524 access-list ITC_NW_acl remark NAI Dat update. access-list ITC_NW_acl extended permit tcp object-group ITC_NW_Anti_Spoofing host Monitor-PC eq ftp access-list ITC_NW_acl remark To access public internet via proxy. access-list ITC_NW_acl extended permit tcp object-group ITC_NW_Anti_Spoofing host Trendmicro eq www access-list ITC_NW_acl extended permit icmp object-group DC_Control_Hosts host Retail_Net_GW41_1 access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host Retail_Net_GW41_1 eq ssh access-list ITC_NW_acl remark access-list ITC_NW_acl extended permit tcp host Muftakia object-group CSR_CL_Anti_Spoofing object-group Omniback_Ports access-list ITC_NW_acl extended permit tcp object-group ITC_NW_Anti_Spoofing object-group Luthien_Galadriel object-group Omniback_Po rts access-list ITC_NW_acl extended permit icmp ControlPC1 255.255.255.252 host Control_DT_101 access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts object-group VPN_Aventail_Box object-group Aventail_Mng_por ts access-list ITC_NW_acl extended permit icmp object-group DC_Control_Hosts any access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host Dashade eq ssh access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts object-group DC_Exinda object-group ssh_https access-list ITC_NW_acl extended permit tcp ControlPC1 255.255.255.252 host 10.150.201.102 eq 5001 access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host AscottRT eq telnet access-list ITC_NW_acl remark Remark ---For DC Control Hosts to access Webadmin service at Arien access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host Arien eq 8009 access-list ITC_NW_acl remark Remark ---For Symantec Management DAT update ---SCRS 923--- access-list ITC_NW_acl extended permit tcp ITC_NW_subnet 255.255.255.0 DCB_CP_Subnet 255.255.255.0 eq 38292 access-list ITC_NW_acl extended permit udp ITC_NW_subnet 255.255.255.0 host Monitor-PC object-group NAV_CLIENT_DAT access-list ITC_NW_acl remark DC Control PCs to access RP Exinda Optimizer via https access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host RP_Exinda_Opt eq telnet access-list ITC_NW_acl remark DC Control PCs to access RP Exinda Optimizer via https access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host RP_Exinda_Opt eq https access-list ITC_NW_acl remark remark For Gala to send Traffic Reports--SCRS-- access-list ITC_NW_acl extended permit tcp host GALA host Postman201-smts eq smtp log access-list ITC_NW_acl extended permit udp host DCPC host Phoenix eq snmp access-list ITC_NW_acl extended permit udp host DCPC host Phoenix eq snmptrap access-list ITC_NW_acl remark remark DC_Control_Hosts to access FWMS PDM------------- access-list ITC_NW_acl remark remark DC_Control_Hosts to access FWMS PDM------------- access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host 10.150.205.3 eq https access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host 10.150.205.6 eq ssh access-list ITC_NW_acl remark remark For DC TestPCs to access Fortuna1---------------------------- access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host Fortigate eq https access-list ITC_NW_acl extended permit tcp object-group ITC_NW_Anti_Spoofing object-group HP_Mon_Hosts eq 135 access-list ITC_NW_acl extended permit tcp object-group ITC_NW_Anti_Spoofing object-group HP_Mon_Hosts range 381 383 access-list ITC_NW_acl extended permit tcp object-group ITC_NW_Anti_Spoofing object-group HP_Mon_Hosts range 10000 10200 access-list ITC_NW_acl extended permit tcp object-group ITC_NW_Anti_Spoofing object-group HP_Mon_Hosts range 14000 14010 access-list ITC_NW_acl extended permit udp object-group ITC_NW_Anti_Spoofing object-group HP_Mon_Hosts range snmp snmptrap access-list ITC_NW_acl extended permit udp object-group ITC_NW_Anti_Spoofing host HPMon3 range snmp snmptrap access-list ITC_NW_acl extended permit icmp object-group ITC_NW_Anti_Spoofing host HP_Pri_OVO_MgtSvr access-list ITC_NW_acl extended permit icmp object-group ITC_NW_Anti_Spoofing host HP_Sec_OVO_MgtSvr access-list ITC_NW_acl extended permit icmp object-group ITC_NW_Anti_Spoofing host HPMon3 access-list ITC_NW_acl remark remark For TrendMicro TestPCs to remote access to access-list ITC_NW_acl extended permit tcp STA_AS_Subnet 255.255.255.252 host Trendmicro eq 1812 access-list ITC_NW_acl remark remark ---------------------- System Analyser access--------------------------------- access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_CG_subnet 255.255.255.192 eq 135 access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_CG_subnet 255.255.255.192 eq 445 access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_CG_subnet 255.255.255.192 range 137 netbios-ssn access-list ITC_NW_acl extended permit udp host Melasia1 TMP_CG_subnet 255.255.255.192 range netbios-ns 139 access-list ITC_NW_acl extended permit tcp host Melasia1 DMZ 255.255.255.192 eq 135 access-list ITC_NW_acl extended permit tcp host Melasia1 DMZ 255.255.255.192 eq 445 access-list ITC_NW_acl extended permit tcp host Melasia1 DMZ 255.255.255.192 range 137 netbios-ssn access-list ITC_NW_acl extended permit udp host Melasia1 DMZ 255.255.255.192 range netbios-ns 139 access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_AS_Subnet 255.255.255.240 eq 135 access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_AS_Subnet 255.255.255.240 eq 445 access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_AS_Subnet 255.255.255.240 range 137 netbios-ssn access-list ITC_NW_acl extended permit udp host Melasia1 TMP_AS_Subnet 255.255.255.240 range netbios-ns 139 access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_A2_Subnet 255.255.255.240 eq 135 access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_A2_Subnet 255.255.255.240 eq 445 access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_A2_Subnet 255.255.255.240 range 137 netbios-ssn access-list ITC_NW_acl extended permit udp host Melasia1 TMP_A2_Subnet 255.255.255.240 range netbios-ns 139 access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_CM_Subnet 255.255.255.240 eq 135 access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_CM_Subnet 255.255.255.240 eq 445 access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_CM_Subnet 255.255.255.240 range 137 netbios-ssn access-list ITC_NW_acl extended permit udp host Melasia1 TMP_CM_Subnet 255.255.255.240 range netbios-ns 139 access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_RS_Subnet 255.255.255.240 eq 135 access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_RS_Subnet 255.255.255.240 eq 445 access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_RS_Subnet 255.255.255.240 range 137 netbios-ssn access-list ITC_NW_acl extended permit udp host Melasia1 TMP_RS_Subnet 255.255.255.240 range netbios-ns 139 access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_SZ_Subnet 255.255.255.240 eq 135 access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_SZ_Subnet 255.255.255.240 eq 445 access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_SZ_Subnet 255.255.255.240 range 137 netbios-ssn access-list ITC_NW_acl extended permit udp host Melasia1 TMP_SZ_Subnet 255.255.255.240 range netbios-ns 139 access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_SZ1_Subnet 255.255.255.192 eq 135 access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_SZ1_Subnet 255.255.255.192 eq 445 access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_SZ1_Subnet 255.255.255.192 range 137 netbios-ssn access-list ITC_NW_acl extended permit udp host Melasia1 TMP_SZ1_Subnet 255.255.255.192 range netbios-ns 139 access-list ITC_NW_acl extended permit tcp host Melasia1 STA_AS_Subnet 255.255.255.0 eq 135 access-list ITC_NW_acl extended permit tcp host Melasia1 STA_AS_Subnet 255.255.255.0 eq 445 access-list ITC_NW_acl extended permit tcp host Melasia1 STA_AS_Subnet 255.255.255.0 range 137 netbios-ssn access-list ITC_NW_acl extended permit udp host Melasia1 STA_AS_Subnet 255.255.255.0 range netbios-ns 139 access-list ITC_NW_acl extended permit tcp host Melasia1 DCB_AS_Subnet 255.255.255.0 eq 135 access-list ITC_NW_acl extended permit tcp host Melasia1 DCB_AS_Subnet 255.255.255.0 eq 445 access-list ITC_NW_acl extended permit tcp host Melasia1 DCB_AS_Subnet 255.255.255.0 range 137 netbios-ssn access-list ITC_NW_acl extended permit udp host Melasia1 DCB_AS_Subnet 255.255.255.0 range netbios-ns 139 access-list ITC_NW_acl extended permit tcp host Melasia1 DCB_CP_Subnet 255.255.255.0 eq 135 access-list ITC_NW_acl extended permit tcp host Melasia1 DCB_CP_Subnet 255.255.255.0 eq 445 access-list ITC_NW_acl extended permit tcp host Melasia1 DCB_CP_Subnet 255.255.255.0 range 137 netbios-ssn access-list ITC_NW_acl extended permit udp host Melasia1 DCB_CP_Subnet 255.255.255.0 range netbios-ns 139 access-list ITC_NW_acl extended permit tcp host Melasia1 Security_Ctrl_Zone 255.255.255.0 eq 135 access-list ITC_NW_acl extended permit tcp host Melasia1 Security_Ctrl_Zone 255.255.255.0 eq 445 access-list ITC_NW_acl extended permit tcp host Melasia1 Security_Ctrl_Zone 255.255.255.0 range 137 netbios-ssn access-list ITC_NW_acl extended permit udp host Melasia1 Security_Ctrl_Zone 255.255.255.0 range netbios-ns 139 access-list ITC_NW_acl extended permit tcp host Melasia1 CSR_CL_subnet 255.255.255.0 eq 135 access-list ITC_NW_acl extended permit tcp host Melasia1 CSR_CL_subnet 255.255.255.0 eq 445 access-list ITC_NW_acl extended permit tcp host Melasia1 CSR_CL_subnet 255.255.255.0 range 137 netbios-ssn access-list ITC_NW_acl extended permit udp host Melasia1 CSR_CL_subnet 255.255.255.0 range netbios-ns 139 access-list ITC_NW_acl extended permit tcp host Melasia1 CSR_CG_Subnet 255.255.255.0 eq 135 access-list ITC_NW_acl extended permit tcp host Melasia1 CSR_CG_Subnet 255.255.255.0 eq 445 access-list ITC_NW_acl extended permit tcp host Melasia1 CSR_CG_Subnet 255.255.255.0 range 137 netbios-ssn access-list ITC_NW_acl extended permit udp host Melasia1 CSR_CG_Subnet 255.255.255.0 range netbios-ns 139 access-list ITC_NW_acl remark remark For SERGIO--SCRS -- TestPCs to access AUMIDA and access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host Aumida eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts host Aumida eq pcanywhere-status access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host Exindar_MonitorUnit eq https access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host Exindar_MonitorUnit eq ssh access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host 172.22.22.6 eq ssh access-list ITC_NW_acl remark remark For Bandwidth Optimizer IT Ctrl Zone to access in DC access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host host_172_24_20_12 eq https access-list ITC_NW_acl remark remark Z--------SCRS532--for access Servers- Melasia1(Sys Analyser)---------- access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_CG_subnet 255.255.255.192 eq 10817 access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_CG_subnet 255.255.255.192 eq 10818 access-list ITC_NW_acl extended permit tcp host Melasia1 DMZ 255.255.255.192 eq 10817 access-list ITC_NW_acl extended permit tcp host Melasia1 DMZ 255.255.255.192 eq 10818 access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_AS_Subnet 255.255.255.240 eq 10817 access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_AS_Subnet 255.255.255.240 eq 10818 access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_A2_Subnet 255.255.255.240 eq 10817 access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_A2_Subnet 255.255.255.240 eq 10818 access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_CM_Subnet 255.255.255.240 eq 10817 access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_CM_Subnet 255.255.255.240 eq 10818 access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_RS_Subnet 255.255.255.240 eq 10817 access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_RS_Subnet 255.255.255.240 eq 10818 access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_SZ_Subnet 255.255.255.240 eq 10817 access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_SZ_Subnet 255.255.255.240 eq 10818 access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_SZ1_Subnet 255.255.255.192 eq 10817 access-list ITC_NW_acl extended permit tcp host Melasia1 TMP_SZ1_Subnet 255.255.255.192 eq 10818 access-list ITC_NW_acl extended permit tcp host Melasia1 STA_AS_Subnet 255.255.255.0 eq 10817 access-list ITC_NW_acl extended permit tcp host Melasia1 STA_AS_Subnet 255.255.255.0 eq 10818 access-list ITC_NW_acl extended permit tcp host Melasia1 DCB_AS_Subnet 255.255.255.0 eq 10817 access-list ITC_NW_acl extended permit tcp host Melasia1 DCB_AS_Subnet 255.255.255.0 eq 10818 access-list ITC_NW_acl extended permit tcp host Melasia1 DCB_CP_Subnet 255.255.255.0 eq 10817 access-list ITC_NW_acl extended permit tcp host Melasia1 DCB_CP_Subnet 255.255.255.0 eq 10818 access-list ITC_NW_acl extended permit tcp host Melasia1 Security_Ctrl_Zone 255.255.255.0 eq 10817 access-list ITC_NW_acl extended permit tcp host Melasia1 Security_Ctrl_Zone 255.255.255.0 eq 10818 access-list ITC_NW_acl extended permit tcp host Melasia1 CSR_CL_subnet 255.255.255.0 eq 10817 access-list ITC_NW_acl extended permit tcp host Melasia1 CSR_CL_subnet 255.255.255.0 eq 10818 access-list ITC_NW_acl extended permit tcp host Melasia1 CSR_CG_Subnet 255.255.255.0 eq 10817 access-list ITC_NW_acl extended permit tcp host Melasia1 CSR_CG_Subnet 255.255.255.0 eq 10818 access-list ITC_NW_acl remark remark Z--------SCRS532--Melasia SMTP Flamingo ------------------------------ access-list ITC_NW_acl extended permit tcp host Melasia1 host Flamingo_SMTPRelay eq smtp access-list ITC_NW_acl extended permit tcp host GALA host Galadriel eq 257 access-list ITC_NW_acl extended permit tcp host GALA host Galadriel eq 18184 access-list ITC_NW_acl extended permit udp host GALA host Galadriel eq 18184 access-list ITC_NW_acl extended permit tcp host GALA host Galadriel eq 18186 access-list ITC_NW_acl extended permit tcp host GALA host Galadriel range 18190 18192 access-list ITC_NW_acl extended permit tcp host GALA host Galadriel range 18210 18211 access-list ITC_NW_acl extended permit udp host GALA host PIX_VPN_Inside_int eq 1688 access-list ITC_NW_acl extended permit udp host GALA host PIX_VPN_SEC eq 1688 access-list ITC_NW_acl extended permit udp host GALA host 10.150.205.3 eq 1688 access-list ITC_NW_acl extended permit udp host GALA host 10.150.253.12 eq 1688 access-list ITC_NW_acl extended permit udp host GALA host 172.22.22.4 eq 1688 access-list ITC_NW_acl extended permit udp host GALA host 172.22.22.6 eq 1688 access-list ITC_NW_acl remark remark For STFirewall traffic Monitoring from DCPC access-list ITC_NW_acl extended permit udp host DCPC host 10.150.253.12 eq snmp access-list ITC_NW_acl extended permit udp host DCPC host 10.150.253.12 eq snmptrap access-list ITC_NW_acl extended permit udp host DCPC host PIX_VPN_Inside_int eq snmp access-list ITC_NW_acl extended permit udp host DCPC host PIX_VPN_Inside_int eq snmptrap access-list ITC_NW_acl remark remark -------------- SCRS 407 & 479--------------------- access-list ITC_NW_acl extended permit tcp host GALA host Flamingo_SMTPRelay eq smtp access-list ITC_NW_acl extended permit tcp host Xavier host Flamingo_SMTPRelay eq smtp access-list ITC_NW_acl remark access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts 172.24.0.0 255.255.0.0 range ssh telnet access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host SGCalypso8 eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts host SGCalypso8 eq pcanywhere-status access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host SGCalypso7 eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts host SGCalypso7 eq pcanywhere-status access-list ITC_NW_acl remark remark For 131-&- SCRS to access Ascott VLAN 480---- access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts SGCalypso6 255.255.255.248 eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts SGCalypso6 255.255.255.248 eq pcanywhere-status access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts SGTitan1 255.255.255.254 eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts SGTitan1 255.255.255.254 eq pcanywhere-status access-list ITC_NW_acl extended permit tcp host Marlex host 10.154.63.65 range 797 799 access-list ITC_NW_acl extended permit udp host Marlex host 10.154.63.65 eq 800 access-list ITC_NW_acl extended permit tcp host Marlex host 10.154.63.65 eq 1433 access-list ITC_NW_acl extended permit udp host Marlex host 10.154.63.65 eq 4104 access-list ITC_NW_acl extended permit tcp host Marlex host 10.154.63.65 eq 4105 access-list ITC_NW_acl extended permit tcp host Marlex host 10.154.63.65 range 4721 4725 access-list ITC_NW_acl extended permit udp host Marlex host 10.154.63.65 eq 4725 access-list ITC_NW_acl extended permit tcp host Marlex host 10.154.63.65 eq 8034 access-list ITC_NW_acl extended permit tcp host Marlex host 10.154.63.65 eq 8198 access-list ITC_NW_acl extended permit tcp host Marlex host 10.154.63.65 eq 8222 access-list ITC_NW_acl extended permit udp host Marlex host RP_CA_console range netbios-ns netbios-dgm access-list ITC_NW_acl extended permit udp host Marlex object-group CCL_Retail_Stagging_Hosts_Mgp eq 4104 access-list ITC_NW_acl extended permit tcp host Marlex host RP_CA_console eq netbios-ssn access-list ITC_NW_acl extended permit tcp host Marlex host RP_CA_console eq 445 access-list ITC_NW_acl extended permit tcp host Marlex host RP_CA_console range 799 800 access-list ITC_NW_acl extended permit udp host Marlex host RP_CA_console eq 4104 access-list ITC_NW_acl extended permit tcp host Marlex host RP_CA_console eq 4105 access-list ITC_NW_acl extended permit tcp host Marlex host RP_CA_console eq 4721 access-list ITC_NW_acl extended permit tcp host Marlex host RP_CA_console eq 4724 access-list ITC_NW_acl extended permit udp host Marlex host RP_CA_console eq 4725 access-list ITC_NW_acl extended permit tcp host Marlex host RP_CA_console eq 8198 access-list ITC_NW_acl extended permit tcp host Marlex host RP_CA_console eq 8222 access-list ITC_NW_acl extended permit tcp host GALA host Control_DT_101 eq 1684 access-list ITC_NW_acl extended permit tcp host GALA host Control_DT_102 eq 1684 access-list ITC_NW_acl extended permit tcp host GALA host 10.150.119.105 eq 1684 access-list ITC_NW_acl extended permit tcp host GALA host 10.150.119.108 eq 1684 access-list ITC_NW_acl extended permit tcp host GALA host COMM-CONTROL1 eq 1684 access-list ITC_NW_acl extended permit tcp host Marlex object-group CCL_Retail_Nets_Mgp object-group Unicenter-RC1 access-list ITC_NW_acl extended permit tcp host Marlex object-group CCL_Retail_Stagging_Hosts_Mgp object-group Unicenter_SD1_RC1 access-list ITC_NW_acl remark remark CT BMO Connection access-list ITC_NW_acl extended permit tcp host Marlex 10.154.64.0 255.255.255.0 eq 799 access-list ITC_NW_acl extended permit tcp host Marlex 10.154.64.0 255.255.255.0 eq 800 access-list ITC_NW_acl extended permit udp host Marlex 10.154.64.0 255.255.255.0 eq 4104 access-list ITC_NW_acl extended permit tcp host Marlex 10.154.64.0 255.255.255.0 eq 4105 access-list ITC_NW_acl extended permit tcp host Marlex 10.154.64.0 255.255.255.0 eq 4721 access-list ITC_NW_acl extended permit tcp host Marlex 10.154.64.0 255.255.255.0 eq 4725 access-list ITC_NW_acl extended permit udp host Marlex 10.154.64.0 255.255.255.0 eq 4725 access-list ITC_NW_acl extended permit tcp host Marlex 10.154.64.0 255.255.255.0 eq 8198 access-list ITC_NW_acl extended permit tcp host Marlex 10.154.64.0 255.255.255.0 eq 8222 access-list ITC_NW_acl extended permit tcp host Marlex 10.154.64.0 255.255.255.0 eq 4724 access-list ITC_NW_acl extended permit tcp host Marlex 10.154.64.0 255.255.255.0 eq 445 access-list ITC_NW_acl extended permit tcp host Marlex 10.154.64.0 255.255.255.0 eq netbios-ssn access-list ITC_NW_acl extended permit udp host Marlex 10.154.64.0 255.255.255.0 range netbios-ns netbios-dgm access-list ITC_NW_acl extended permit udp host DCPC any eq snmp access-list ITC_NW_acl remark remark For line) CiscoWorks data collection ( 1 access-list ITC_NW_acl extended permit tcp host GALA any eq telnet access-list ITC_NW_acl extended permit udp host GALA any eq snmp access-list ITC_NW_acl extended permit tcp host GALA any eq 161 access-list ITC_NW_acl extended permit tcp host GALA any eq ssh access-list ITC_NW_acl remark remark For Novell servers IT Control Zone access to access-list ITC_NW_acl extended permit tcp object-group ITC_NW_Anti_Spoofing host CLNS01 eq 524 access-list ITC_NW_acl extended permit tcp object-group ITC_NW_Anti_Spoofing host BACKUPCLNS eq 524 access-list ITC_NW_acl extended permit tcp object-group ITC_NW_Anti_Spoofing TMP_CG_subnet 255.255.255.0 eq 524 access-list ITC_NW_acl remark remark For purposes IT Control Zone access- Administration access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host Resi_Proche_Server eq 4899 access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host Resi_Jaguar_Server eq 4899 access-list ITC_NW_acl remark remark TestPCs PCAnywhere access to Acklay access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host Acklay eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts host Acklay eq pcanywhere-status access-list ITC_NW_acl remark remark For and Dianoga TestPCs PCAnywhere access to Wandrella access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host Wandrella eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts host Wandrella eq pcanywhere-status access-list ITC_NW_acl remark access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts object-group DCB_RHL_Anti_Spoofing eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts object-group DCB_RHL_Anti_Spoofing eq pcanywhere-status access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host 10.150.210.103 eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts host 10.150.210.103 eq pcanywhere-status access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host Dianoga eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts host Dianoga eq pcanywhere-status access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host Worrt eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts host Worrt eq pcanywhere-status access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host Magneto eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts host Magneto eq pcanywhere-status access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts Corp_Control_Subnet 255.255.255.0 eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts Corp_Control_Subnet 255.255.255.0 eq pcanywhere-status access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts 10.154.63.0 255.255.255.0 eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts 10.154.63.0 255.255.255.0 eq pcanywhere-status access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts 10.156.201.0 255.255.255.0 eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts 10.156.201.0 255.255.255.0 eq pcanywhere-status access-list ITC_NW_acl remark remark Z----For PCs ------------------ Servers to back to TEST access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts TMP_CG_subnet 255.255.255.0 eq pcanywhere-data access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts TMP_CG_subnet 255.255.255.0 eq pcanywhere-status access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts TMP_CG_subnet 255.255.255.0 eq ssh access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts TMP_CG_subnet 255.255.255.0 eq telnet access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts TMP_CG_subnet 255.255.255.0 eq citrix-ica access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host CCL_Rogue eq citrix-ica access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host 172.22.22.4 eq ssh access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts 172.24.8.64 255.255.255.192 eq telnet access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts host 172.24.8.130 eq telnet access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts Core_Rtr_Zone 255.255.255.240 eq telnet access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts Core_Rtr_Zone 255.255.255.240 eq ssh access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts host Galadriel eq domain access-list ITC_NW_acl extended permit udp object-group DC_Control_Hosts host Orome eq domain access-list ITC_NW_acl extended permit udp 10.150.200.64 255.255.255.192 host Galadriel eq domain access-list ITC_NW_acl extended permit udp 10.150.200.64 255.255.255.192 host Orome eq domain access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts 10.157.176.0 255.255.255.0 eq ssh access-list ITC_NW_acl extended permit tcp object-group DC_Control_Hosts 10.157.176.0 255.255.255.0 eq citrix-ica access-list ITC_NW_acl extended permit udp host host10_150_200_98 host Retail_Net_GW32_1 eq snmptrap access-list ITC_NW_acl extended permit udp host host10_150_200_98 host Retail_Net_GW32_1 eq snmp access-list ITC_NW_acl extended permit udp host host10_150_200_98 host Retail_Net_GW33_1 eq snmptrap access-list ITC_NW_acl extended permit udp host host10_150_200_98 host Retail_Net_GW33_1 eq snmp access-list ITC_NW_acl extended permit udp host host10_150_200_98 host Retail_Net_GW34_1 eq snmptrap access-list ITC_NW_acl extended permit udp host host10_150_200_98 host Retail_Net_GW34_1 eq snmp access-list ITC_NW_acl extended permit udp host host10_150_200_98 host Retail_Net_GW35_1 eq snmptrap access-list ITC_NW_acl extended permit udp host host10_150_200_98 host Retail_Net_GW35_1 eq snmp access-list ITC_NW_acl extended permit udp host host10_150_200_98 host Retail_Net_GW36_1 eq snmptrap access-list ITC_NW_acl extended permit udp host host10_150_200_98 host Retail_Net_GW36_1 eq snmp access-list ITC_NW_acl extended permit udp host host10_150_200_98 host Retail_Net_GW37_1 eq snmptrap access-list ITC_NW_acl extended permit udp host host10_150_200_98 host Retail_Net_GW37_1 eq snmp access-list ITC_NW_acl extended permit udp host host10_150_200_98 host Retail_Net_GW39_1 eq snmptrap access-list ITC_NW_acl extended permit udp host host10_150_200_98 host Retail_Net_GW39_1 eq snmp access-list ITC_NW_acl extended permit udp host host10_150_200_98 host Retail_Net_GW40_1 eq snmptrap access-list ITC_NW_acl extended permit udp host host10_150_200_98 host Retail_Net_GW40_1 eq snmp access-list ITC_NW_acl extended permit udp host Marlex host 10.150.119.65 eq 4104 access-list ITC_NW_acl extended permit tcp host Marlex host 10.150.119.65 eq 4105 access-list ITC_NW_acl extended permit tcp host Marlex Corp_BU_Net 255.255.248.0 eq 4105 access-list ITC_NW_acl extended permit udp host Marlex Resi_BU_Net 255.255.0.0 eq 4104 access-list ITC_NW_acl extended permit tcp host Marlex Resi_BU_Net 255.255.0.0 eq 4105 access-list ITC_NW_acl extended permit tcp host Marlex Comm_BU_Net 255.255.0.0 eq 4105 access-list ITC_NW_acl extended permit tcp host Marlex host 10.150.119.65 range 4721 4725 access-list ITC_NW_acl extended permit tcp host Marlex Resi_BU_Net 255.255.0.0 range 4721 4725 access-list ITC_NW_acl extended permit udp host Marlex host 10.150.119.65 eq 4725 access-list ITC_NW_acl extended permit tcp host Marlex host 10.150.119.65 eq 8198 access-list ITC_NW_acl extended permit tcp host Marlex host 10.150.119.65 eq 8222 access-list ITC_NW_acl extended permit tcp host Marlex host 10.156.5.10 eq 8222 access-list ITC_NW_acl extended permit tcp host Marlex host 10.154.1.32 eq 8222 access-list ITC_NW_acl extended permit tcp host Marlex host CCL_HB_StagingHost eq 8222 access-list ITC_NW_acl extended permit tcp host Marlex host 10.154.9.10 eq 8222 access-list ITC_NW_acl extended permit tcp host Marlex host 10.154.10.10 eq 8222 access-list ITC_NW_acl extended permit tcp host Marlex host CCL_IMM_StagingHost eq 8222 access-list ITC_NW_acl extended permit tcp host Marlex host Re_Sta_Host32_10 eq 8222 access-list ITC_NW_acl extended permit tcp host Marlex host Re_Sta_Host33_10 eq 8222 access-list ITC_NW_acl extended permit tcp host Marlex host Re_Sta_Host34_10 eq 8222 access-list ITC_NW_acl extended permit tcp host Marlex host Re_Sta_Host35_10 eq 8222 access-list ITC_NW_acl extended permit tcp host Marlex host Re_Sta_Host36_10 eq 8222 access-list ITC_NW_acl extended permit tcp host Marlex host Re_Sta_Host37_10 eq 8222 access-list ITC_NW_acl extended permit tcp host Marlex host Re_Sta_Host39_10 eq 8222 access-list ITC_NW_acl extended permit tcp host Marlex host Re_Sta_Host40_10 eq 8222 access-list ITC_NW_acl extended permit tcp host Marlex host 10.150.119.65 range 797 799 access-list ITC_NW_acl extended permit tcp host Marlex Corp_BU_Net 255.255.248.0 range 797 799 access-list ITC_NW_acl extended permit tcp host Marlex Resi_BU_Net 255.255.0.0 range 797 799 access-list ITC_NW_acl extended permit tcp host Marlex Comm_BU_Net 255.255.0.0 range 797 799 access-list ITC_NW_acl extended permit udp host Marlex Corp_BU_Net 255.255.248.0 eq 800 access-list ITC_NW_acl extended permit udp host Marlex host 10.150.119.65 eq 800 access-list ITC_NW_acl extended permit udp host Marlex Resi_BU_Net 255.255.0.0 eq 800 access-list ITC_NW_acl extended permit udp host Marlex Comm_BU_Net 255.255.0.0 eq 800 access-list ITC_NW_acl extended permit tcp host Marlex host 10.150.119.65 eq 8034 access-list ITC_NW_acl extended permit tcp host Marlex host 10.156.5.10 eq 8036 access-list ITC_NW_acl extended permit tcp host Marlex host 10.154.1.32 eq 8035 access-list ITC_NW_acl extended permit tcp host Marlex host CCL_HB_StagingHost eq 8045 access-list ITC_NW_acl extended permit tcp host Marlex host 10.154.9.10 eq 8046 access-list ITC_NW_acl extended permit tcp host Marlex host 10.154.10.10 eq 8047 access-list ITC_NW_acl extended permit tcp host Marlex host CCL_IMM_StagingHost eq 8048 access-list ITC_NW_acl extended permit tcp host Marlex host Re_Sta_Host32_10 eq 8037 access-list ITC_NW_acl extended permit tcp host Marlex host Re_Sta_Host33_10 eq 8038 access-list ITC_NW_acl extended permit tcp host Marlex host Re_Sta_Host34_10 eq 8039 access-list ITC_NW_acl extended permit tcp host Marlex host Re_Sta_Host35_10 eq 8040 access-list ITC_NW_acl extended permit tcp host Marlex host Re_Sta_Host36_10 eq 8041 access-list ITC_NW_acl extended permit tcp host Marlex host Re_Sta_Host37_10 eq 8042 access-list ITC_NW_acl extended permit tcp host Marlex host Re_Sta_Host39_10 eq 8044 access-list ITC_NW_acl extended permit tcp host Marlex host Re_Sta_Host40_10 eq 8043 access-list ITC_NW_acl extended permit tcp host Marlex host CT_CA_Console eq 799 access-list ITC_NW_acl extended permit tcp host Marlex host CT_CA_Console eq 800 access-list ITC_NW_acl extended permit udp host Marlex host CT_CA_Console eq 4104 access-list ITC_NW_acl extended permit tcp host Marlex host CT_CA_Console eq 4105 access-list ITC_NW_acl extended permit tcp host Marlex host CT_CA_Console eq 4721 access-list ITC_NW_acl extended permit tcp host Marlex host CT_CA_Console eq 4725 access-list ITC_NW_acl extended permit udp host Marlex host CT_CA_Console eq 4725 access-list ITC_NW_acl extended permit tcp host Marlex host CT_CA_Console eq 8198 access-list ITC_NW_acl extended permit tcp host Marlex host CT_CA_Console eq 8222 access-list ITC_NW_acl extended permit tcp host Marlex host CT_CA_Console eq 4724 access-list ITC_NW_acl extended permit tcp host Marlex host CT_CA_Console eq 445 access-list ITC_NW_acl extended permit tcp host Marlex host CT_CA_Console eq netbios-ssn access-list ITC_NW_acl extended permit udp host Marlex host CT_CA_Console range netbios-ns 139 access-list ITC_NW_acl extended deny ip any any log access-list TMP_RS_acl remark FTP SERVICE TO MANWE. access-list TMP_RS_acl extended permit tcp object-group TMP_RS_Anti_Spoofing host ManWe range ftp-data ftp access-list TMP_RS_acl remark SCRS 1657 access-list TMP_RS_acl extended permit tcp host Resi_Proche_Server host 10.156.2.30 eq telnet access-list TMP_RS_acl extended permit tcp host Resi_Proche_Server host 10.156.2.30 eq 449 access-list TMP_RS_acl extended permit tcp host Resi_Proche_Server host 10.156.2.30 eq 1433 access-list TMP_RS_acl extended permit tcp host Resi_Proche_Server host 10.156.2.30 eq 4545 access-list TMP_RS_acl extended permit tcp host Resi_Proche_Server host 10.156.2.30 range 8470 8476 access-list TMP_RS_acl remark Remark --For Omniback to Residential Zone--- access-list TMP_RS_acl extended permit tcp object-group TMP_RS_Anti_Spoofing object-group Omniback_Svrs object-group OmniBackup access-list TMP_RS_acl remark Remark --For Omniback to Residential Zone--- access-list TMP_RS_acl extended permit tcp object-group TMP_RS_Anti_Spoofing object-group Luthien_Galadriel object-group OmniBackup access-list TMP_RS_acl remark Remark --For Symantec Management DAT update ---SCRS 923 --- access-list TMP_RS_acl extended permit tcp object-group TMP_RS_Anti_Spoofing host Monitor-PC eq 38292 access-list TMP_RS_acl extended permit udp object-group TMP_RS_Anti_Spoofing host Monitor-PC object-group NAV_CLIENT_DAT access-list TMP_RS_acl remark remark For TrendMicro Ports and Services access-list TMP_RS_acl extended permit tcp object-group TMP_RS_Anti_Spoofing host Trendmicro eq www access-list TMP_RS_acl remark remark Z---START--Acl for traffic flow outward of FWSM vlan 14--Z access-list TMP_RS_acl remark remark For Porsche access to Residential access-list TMP_RS_acl extended permit tcp host Resi_Proche_Server host Resi_Host2-23 eq 1433 access-list TMP_RS_acl remark remark For SBU to Residential(VLAN 208) access-list TMP_RS_acl extended permit tcp host Resi_Proche_Server host Resi_AS400Server eq telnet access-list TMP_RS_acl extended permit tcp host Resi_Proche_Server host Resi_AS400Server eq 449 access-list TMP_RS_acl extended permit tcp host Resi_Proche_Server host Resi_AS400Server eq 1433 access-list TMP_RS_acl extended permit tcp host Resi_Proche_Server host Resi_AS400Server eq 4545 access-list TMP_RS_acl extended permit tcp host Resi_Proche_Server host Resi_AS400Server range 8470 8476 access-list TMP_RS_acl extended permit udp host Resi_Proche_Server host CRLNT02 eq domain access-list TMP_RS_acl extended permit udp host Resi_Proche_Server host CRLNT09 eq domain access-list TMP_RS_acl extended permit tcp host Resi_Proche_Server host CRLNT02 object-group AD_TCP_Services access-list TMP_RS_acl extended permit udp host Resi_Proche_Server host CRLNT02 object-group AD_UDP_Services access-list TMP_RS_acl extended permit tcp host Resi_Proche_Server host CRLNT02 range 7000 7200 access-list TMP_RS_acl extended permit tcp host Resi_Proche_Server host CRLNT09 object-group AD_TCP_Services access-list TMP_RS_acl extended permit udp host Resi_Proche_Server host CRLNT09 object-group AD_UDP_Services access-list TMP_RS_acl extended permit tcp host Resi_Proche_Server host CRLNT09 range 7000 7200 access-list TMP_RS_acl extended permit tcp host Resi_Proche_Server host CRLNT02 eq domain access-list TMP_RS_acl extended permit tcp host Resi_Proche_Server host CRLNT09 eq domain access-list TMP_RS_acl extended permit tcp host Resi_Proche_Server host CRLNT02 eq 1026 access-list TMP_RS_acl extended permit tcp host Resi_Proche_Server host CRLNT09 eq 1026 access-list TMP_RS_acl extended permit tcp host Resi_Proche_Server host Flamingo_SMTPRelay eq smtp access-list TMP_RS_acl extended permit tcp host Resi_Jaguar_Server host Flamingo_SMTPRelay eq smtp access-list TMP_RS_acl extended permit tcp host Resi_Proche_Server host 10.156.2.15 eq netbios-ssn access-list TMP_RS_acl extended permit udp host Resi_Proche_Server host 10.156.2.15 range netbios-ns 139 access-list TMP_RS_acl extended permit tcp host Resi_Proche_Server host Crl_ftpclient eq netbios-ssn access-list TMP_RS_acl extended permit tcp host Resi_Proche_Server host 10.156.3.81 eq netbios-ssn access-list TMP_RS_acl extended permit udp host Resi_Jaguar_Server host 10.156.2.228 eq 1048 access-list TMP_RS_acl extended permit tcp object-group TMP_RS_Anti_Spoofing object-group HP_Mon_Hosts eq 135 access-list TMP_RS_acl extended permit tcp object-group TMP_RS_Anti_Spoofing object-group HP_Mon_Hosts range 381 383 access-list TMP_RS_acl extended permit tcp object-group TMP_RS_Anti_Spoofing object-group HP_Mon_Hosts range 10000 10200 access-list TMP_RS_acl extended permit tcp object-group TMP_RS_Anti_Spoofing object-group HP_Mon_Hosts range 14000 14010 access-list TMP_RS_acl extended permit udp object-group TMP_RS_Anti_Spoofing object-group HP_Mon_Hosts range snmp snmptrap access-list TMP_RS_acl extended permit udp object-group TMP_RS_Anti_Spoofing host HPMon3 range snmp snmptrap access-list TMP_RS_acl extended permit icmp object-group TMP_RS_Anti_Spoofing host HP_Pri_OVO_MgtSvr access-list TMP_RS_acl extended permit icmp object-group TMP_RS_Anti_Spoofing host HP_Sec_OVO_MgtSvr access-list TMP_RS_acl extended permit icmp object-group TMP_RS_Anti_Spoofing host HPMon3 access-list TMP_RS_acl extended deny ip any any log access-list TMP_CG_acl remark For troubleshooting purpose access-list TMP_CG_acl extended permit tcp object-group RP_VIP_Internet_Access any object-group Internet_Services access-list TMP_CG_acl extended permit icmp TMP_CG_subnet 255.255.255.192 host HPMon3 echo-reply access-list TMP_CG_acl extended permit tcp TMP_CG_subnet 255.255.255.192 object-group Omniback_Svrs object-group OmniBackup access-list TMP_CG_acl extended permit tcp host Evanzon host 10.150.128.196 object-group NetbiosTcpIP access-list TMP_CG_acl extended permit udp host Evanzon host 10.150.128.196 object-group NetbiosTcpIP access-list TMP_CG_acl extended permit udp host Evanzan host 10.150.128.196 object-group NetbiosTcpIP access-list TMP_CG_acl extended permit tcp host Evanzan host 10.150.128.196 object-group NetbiosTcpIP access-list TMP_CG_acl extended permit tcp host Evanzan host 10.150.128.196 eq citrix-ica access-list TMP_CG_acl extended permit tcp host Evanzan host 10.150.128.196 eq 1433 access-list TMP_CG_acl extended permit tcp host Evanzon host 10.150.128.196 eq 1433 access-list TMP_CG_acl extended permit tcp host Evanzon host 10.150.128.196 eq netbios-ssn access-list TMP_CG_acl extended permit tcp host Neucleus1 host 10.150.121.39 object-group Servicedesk_client access-list TMP_CG_acl extended permit tcp host Neucleus1 host 10.150.123.14 object-group Servicedesk_client access-list TMP_CG_acl remark SCRS 2167 access-list TMP_CG_acl extended permit tcp host HPMS2 host Frixgrizz eq 135 access-list TMP_CG_acl remark SCRS 2167 access-list TMP_CG_acl extended permit tcp host HPMS2 host Frixgrizz eq netbios-ssn access-list TMP_CG_acl remark SCRS 2167 access-list TMP_CG_acl extended permit tcp host HPMS2 host Frixgrizz eq 445 access-list TMP_CG_acl extended permit tcp host HPMS2 host 10.156.202.33 range 989 990 access-list TMP_CG_acl extended permit tcp host HPMS2 host 10.156.202.33 range 3000 3099 access-list TMP_CG_acl remark SCRS 2167 access-list TMP_CG_acl extended permit tcp host HPMS2 host CCL_Bishop object-group SAP_Client_Services access-list TMP_CG_acl extended permit tcp host Bigatom host Phoenix object-group Omniback_Ports access-list TMP_CG_acl extended permit udp object-group Galadriel_Orome_Grp host CLG_CN_DNS eq domain access-list TMP_CG_acl extended permit icmp host Rodian DCB_CP_Subnet 255.255.255.0 echo-reply access-list TMP_CG_acl extended permit icmp host Rodian 10.154.1.0 255.255.255.0 access-list TMP_CG_acl extended permit icmp host Arien Resi_BU_Net 255.255.0.0 echo-reply access-list TMP_CG_acl extended permit icmp host Monitor-PC object-group CCL_Retail_Nets_Mgp access-list TMP_CG_acl extended permit icmp host Monitor-PC object-group TRS_DC_IN_Anti_Spoofing access-list TMP_CG_acl extended permit tcp host Chripa host Exindar_MonitorUnit eq https access-list TMP_CG_acl extended permit icmp host Rodian host Ackbar access-list TMP_CG_acl extended permit tcp host 10.16.12.36 host CRLNT10 eq www access-list TMP_CG_acl extended permit tcp object-group LDAP_Servers host Ackbar eq ldap access-list TMP_CG_acl extended permit udp object-group LDAP_Servers host Ackbar eq 427 access-list TMP_CG_acl extended permit tcp object-group LDAP_Servers host Ackbar eq 524 access-list TMP_CG_acl extended permit tcp object-group LDAP_Servers host Ackbar eq 8000 access-list TMP_CG_acl extended permit tcp object-group LDAP_Servers host Ackbar eq 8090 access-list TMP_CG_acl extended permit tcp host Sagoro host CRLNT02 eq 135 access-list TMP_CG_acl extended permit tcp host Sagoro host CRLNT09 eq 135 access-list TMP_CG_acl extended permit tcp host Sagoro host CRLNT02 range 7000 7200 access-list TMP_CG_acl extended permit tcp host Sagoro host CRLNT09 range 7000 7200 access-list TMP_CG_acl extended permit udp host Sagoro host CRLNT02 eq 88 access-list TMP_CG_acl extended permit udp host Sagoro host CRLNT09 eq 88 access-list TMP_CG_acl extended permit tcp host Sagoro host CRLNT02 eq ldap access-list TMP_CG_acl extended permit tcp host Sagoro host CRLNT09 eq ldap access-list TMP_CG_acl extended permit udp host Sagoro host CRLNT02 eq 389 access-list TMP_CG_acl extended permit udp host Sagoro host CRLNT09 eq 389 access-list TMP_CG_acl extended permit udp host Snitkin host CRLNT02 eq 389 access-list TMP_CG_acl extended permit udp host Snitkin host CRLNT09 eq 389 access-list TMP_CG_acl extended permit udp host Lobot host CRLNT02 eq 389 access-list TMP_CG_acl extended permit udp host Lobot host CRLNT09 eq 389 access-list TMP_CG_acl extended permit icmp host Rodian host Calisto access-list TMP_CG_acl extended permit tcp host Rodian host Dazzler object-group AD_TCP_Services access-list TMP_CG_acl extended permit udp host Rodian host Dazzler object-group AD_UDP_Services access-list TMP_CG_acl extended permit tcp host Evanzon host 10.150.120.61 eq 9100 access-list TMP_CG_acl extended permit tcp host Evanzon host Dazzler eq 1433 access-list TMP_CG_acl remark SCRS 1510 access-list TMP_CG_acl extended permit icmp host Rodian host CRLNT02 access-list TMP_CG_acl extended permit icmp host Rodian host CRLNT09 access-list TMP_CG_acl remark SCRS 1510 access-list TMP_CG_acl extended permit tcp host Rodian host CRLNT02 range 7000 7200 access-list TMP_CG_acl extended permit tcp host Rodian host CRLNT09 range 7000 7200 access-list TMP_CG_acl extended permit tcp object-group Internal_DNS host CRLNT02 eq domain access-list TMP_CG_acl extended permit udp object-group Internal_DNS host CRLNT02 eq domain access-list TMP_CG_acl extended permit tcp object-group Internal_DNS host CRLNT09 eq domain access-list TMP_CG_acl extended permit udp object-group Internal_DNS host CRLNT09 eq domain access-list TMP_CG_acl extended permit icmp host host10_61_12_51 any access-list TMP_CG_acl extended permit tcp host Trendmicro host RP_Exinda_Opt eq https access-list TMP_CG_acl remark PRTG testing access-list TMP_CG_acl extended permit udp host Monitor-PC host Fortigate eq snmp access-list TMP_CG_acl extended permit ip host Monitor-PC host Phoenix access-list TMP_CG_acl extended permit icmp host Monitor-PC any access-list TMP_CG_acl extended permit tcp host Evanzan host Cable eq www access-list TMP_CG_acl extended permit tcp host Evanzan host Maverick eq www access-list TMP_CG_acl extended permit tcp host Evanzan host CA_Staging_CT eq www access-list TMP_CG_acl extended permit tcp host Monitor-PC host Postman201-smts eq smtp access-list TMP_CG_acl extended permit udp host Evanzan object-group Corp_Servers_VL134 object-group NetbiosTcpIP access-list TMP_CG_acl extended permit tcp host Evanzan object-group Corp_Servers_VL134 object-group NetbiosTcpIP access-list TMP_CG_acl extended permit udp host Evanzon object-group Corp_Servers_VL134 object-group NetbiosTcpIP access-list TMP_CG_acl extended permit tcp host Evanzon object-group Corp_Servers_VL134 object-group NetbiosTcpIP access-list TMP_CG_acl remark Backup to DMZ servers. access-list TMP_CG_acl extended permit tcp object-group Luthien_Galadriel DCB_RHL_Subnet 255.255.255.0 object-group Omniback_Ports access-list TMP_CG_acl remark Backup to DMZ servers. access-list TMP_CG_acl extended permit tcp object-group Luthien_Galadriel DMZ 255.255.255.192 object-group Omniback_Ports access-list TMP_CG_acl extended permit tcp object-group Luthien_Galadriel TMP_AS_Subnet 255.255.255.240 object-group Omniback_Ports access-list TMP_CG_acl extended permit tcp object-group Luthien_Galadriel TMP_A2_Subnet 255.255.255.240 object-group Omniback_Ports access-list TMP_CG_acl extended permit tcp object-group Luthien_Galadriel TMP_CM_Subnet 255.255.255.240 object-group Omniback_Ports access-list TMP_CG_acl extended permit tcp object-group Luthien_Galadriel TMP_RS_Subnet 255.255.255.240 object-group Omniback_Ports access-list TMP_CG_acl extended permit tcp object-group Luthien_Galadriel STA_AS_Subnet 255.255.255.192 object-group Omniback_Ports access-list TMP_CG_acl extended permit tcp object-group Luthien_Galadriel CCL_AS_Subnet 255.255.255.192 object-group Omniback_Ports access-list TMP_CG_acl extended permit tcp object-group Luthien_Galadriel TMP_SZ1_Subnet 255.255.255.192 object-group Omniback_Ports access-list TMP_CG_acl extended permit tcp object-group Luthien_Galadriel TMP_SZ2 255.255.255.240 object-group Omniback_Ports access-list TMP_CG_acl extended permit tcp object-group Luthien_Galadriel TMP_SZ_Subnet 255.255.255.240 object-group Omniback_Ports access-list TMP_CG_acl extended permit tcp object-group Luthien_Galadriel DCB_AS_Subnet 255.255.255.0 object-group Omniback_Ports access-list TMP_CG_acl extended permit tcp object-group Luthien_Galadriel DCB_CM_Subnet 255.255.255.0 object-group Omniback_Ports access-list TMP_CG_acl extended permit tcp object-group Luthien_Galadriel DCB_CP_Subnet 255.255.255.0 object-group Omniback_Ports access-list TMP_CG_acl extended permit tcp object-group Luthien_Galadriel object-group DCB_RHL_Anti_Spoofing object-group Omniback_P orts access-list TMP_CG_acl remark remark ---Omniback to Titania access-list TMP_CG_acl extended permit tcp object-group Luthien_Galadriel host Ascott-BPE-Srv object-group Omniback_Ports access-list TMP_CG_acl extended permit tcp object-group Luthien_Galadriel ITC_NW_subnet 255.255.255.0 object-group Omniback_Ports access-list TMP_CG_acl extended permit tcp object-group Luthien_Galadriel WOR_DC_Subnet 255.255.255.0 object-group Omniback_Ports access-list TMP_CG_acl extended permit tcp object-group Luthien_Galadriel Security_Ctrl_Zone 255.255.255.0 object-group Omniback_Por ts access-list TMP_CG_acl extended permit tcp object-group Luthien_Galadriel object-group CSR_CL_Anti_Spoofing object-group Omniback_Po rts access-list TMP_CG_acl extended permit tcp object-group Luthien_Galadriel CSR_CG_Subnet 255.255.255.0 object-group Omniback_Ports access-list TMP_CG_acl extended permit tcp object-group Luthien_Galadriel object-group EMS_Servers object-group Omniback_Ports access-list TMP_CG_acl remark Backup to Raffles DC servers. access-list TMP_CG_acl extended permit tcp object-group Luthien_Galadriel 10.157.176.0 255.255.255.0 object-group Omniback_Ports access-list TMP_CG_acl remark Backup to ILO segment. access-list TMP_CG_acl extended permit tcp object-group Luthien_Galadriel host 172.200.1.1 object-group Omniback_Ports access-list TMP_CG_acl remark access-list TMP_CG_acl extended permit tcp host Bigatom object-group SGTitanX object-group Omniback_Ports access-list TMP_CG_acl extended permit tcp host Orome host Iarwain eq lotusnotes access-list TMP_CG_acl extended permit tcp object-group Galadriel_Orome_Grp object-group Resi_DCs eq domain access-list TMP_CG_acl extended permit udp object-group Galadriel_Orome_Grp object-group Resi_DCs eq domain access-list TMP_CG_acl extended permit tcp host Orome host Cable eq lotusnotes access-list TMP_CG_acl extended permit tcp host Rodian object-group Resi_DCs object-group Resi_AD_Trust_TCP access-list TMP_CG_acl extended permit udp host Rodian object-group Resi_DCs object-group Resi_AD_Trust_UDP access-list TMP_CG_acl extended permit tcp host Rodian object-group Resi_DCs range 7000 7200 access-list TMP_CG_acl extended permit tcp host Luthien host Gasgano eq ssh access-list TMP_CG_acl extended permit tcp host Luthien host Gasgano eq ftp access-list TMP_CG_acl extended permit tcp host 10.61.12.34 host Gambit range 9000 9009 access-list TMP_CG_acl extended permit tcp host 10.61.12.34 host Phoenix eq ldap access-list TMP_CG_acl extended permit tcp host 10.61.12.34 host Phoenix eq 524 access-list TMP_CG_acl extended permit ip host Holocam host Iceman access-list TMP_CG_acl remark For AD Trust between Rodian and Calisto --SCRS 998-- access-list TMP_CG_acl extended permit tcp host Rodian host Calisto object-group AD_Trust_TCP access-list TMP_CG_acl extended permit udp host Rodian host Calisto object-group AD_Trust_UDP access-list TMP_CG_acl extended permit tcp host Evanzon host Caliban eq 1433 access-list TMP_CG_acl extended permit tcp host Evanzon host Caliban range 5000 5009 access-list TMP_CG_acl extended permit tcp host Evanzon host CCL_Bishop range 9000 9009 access-list TMP_CG_acl extended permit tcp host Evanzon host Gambit range 9000 9009 access-list TMP_CG_acl extended permit tcp object-group Intranet_Citrix_Svrs object-group CCL_DC_Citrix_Svrs eq www access-list TMP_CG_acl extended permit tcp object-group Intranet_Citrix_Svrs object-group CCL_DC_Citrix_Svrs eq citrix-ica access-list TMP_CG_acl extended permit tcp object-group Intranet_Citrix_Svrs object-group CCL_DC_Citrix_Svrs eq 2512 access-list TMP_CG_acl extended permit tcp object-group Intranet_Citrix_Svrs host CCL_Rogue eq www access-list TMP_CG_acl extended permit tcp object-group Intranet_Citrix_Svrs host CCL_Rogue eq citrix-ica access-list TMP_CG_acl extended permit tcp object-group Intranet_Citrix_Svrs host CCL_Rogue eq 2512 access-list TMP_CG_acl extended permit tcp host 10.61.12.34 host Havok eq www access-list TMP_CG_acl extended permit tcp host 10.61.12.34 host Havok eq citrix-ica access-list TMP_CG_acl extended permit tcp host 10.61.12.34 host Iceman eq www access-list TMP_CG_acl extended permit tcp host 10.61.12.34 host Iceman eq citrix-ica access-list TMP_CG_acl extended permit tcp host Evanzon host Iceman eq www access-list TMP_CG_acl extended permit tcp host Rodian host Iceman eq citrix-ica access-list TMP_CG_acl extended permit tcp host Rodian host Havok eq www access-list TMP_CG_acl extended permit tcp host Rodian host Iceman eq www access-list TMP_CG_acl extended permit tcp host Rodian host Phoenix eq ldap access-list TMP_CG_acl extended permit udp host Rodian host Phoenix eq 389 access-list TMP_CG_acl extended permit icmp host Galadriel host Havok echo access-list TMP_CG_acl extended permit icmp host Arien host Phoenix echo access-list TMP_CG_acl extended permit tcp host host10_61_12_44 any eq www access-list TMP_CG_acl extended permit tcp host host10_61_12_44 any eq https access-list TMP_CG_acl extended permit udp host Arien host 10.61.12.203 access-list TMP_CG_acl extended permit tcp host Arien host 10.61.12.203 eq 524 access-list TMP_CG_acl extended permit udp host Arien host 10.61.12.203 eq 524 access-list TMP_CG_acl extended permit ip host Arien host Phoenix access-list TMP_CG_acl extended permit tcp host Arien host Phoenix eq 524 access-list TMP_CG_acl remark Remark ---Arien NCP access to Phoenix--- access-list TMP_CG_acl extended permit udp host Arien host Phoenix eq ntp access-list TMP_CG_acl extended permit udp host Arien host Phoenix eq 524 access-list TMP_CG_acl extended permit tcp host Orome host Phoenix eq 524 access-list TMP_CG_acl extended permit udp host Orome host Phoenix eq 524 access-list TMP_CG_acl extended permit udp host Orome host Phoenix eq ntp access-list TMP_CG_acl extended permit ip host Galadriel host Havok access-list TMP_CG_acl remark Remark ---Omniback to Commercial Servers--- access-list TMP_CG_acl extended permit ip host Luthien host Havok access-list TMP_CG_acl extended permit tcp host Luthien host CLG001 eq smtp access-list TMP_CG_acl extended permit tcp host Neucleus1 host Warrick object-group USPSD_Web access-list TMP_CG_acl extended permit tcp host Neucleus1 host Warrick eq 8081 access-list TMP_CG_acl extended permit tcp host Neucleus1 host Warrick eq 8080 access-list TMP_CG_acl remark access-list TMP_CG_acl extended permit tcp host Chripa host Falleen eq 137 access-list TMP_CG_acl extended permit udp host Chripa host Falleen eq netbios-ns access-list TMP_CG_acl extended permit udp host Chripa host Falleen eq netbios-dgm access-list TMP_CG_acl extended permit tcp host Chripa host Falleen eq netbios-ssn access-list TMP_CG_acl extended permit tcp host Chripa host Falleen eq 445 access-list TMP_CG_acl extended permit tcp host Chripa 10.200.0.0 255.254.0.0 eq lotusnotes access-list TMP_CG_acl remark SCRS 820 access-list TMP_CG_acl extended permit tcp host Chripa host Flamingo_SMTPRelay eq smtp access-list TMP_CG_acl remark SCRS 820 access-list TMP_CG_acl extended permit tcp host Chripa host Phoenix eq 524 access-list TMP_CG_acl remark remark For Z--SCRS 746-- Citrix servers to access Aumida access-list TMP_CG_acl extended permit tcp host Chripa host Aumida eq www access-list TMP_CG_acl extended permit tcp host Chripa host Aumida eq https access-list TMP_CG_acl extended permit tcp host Chripa host RP_Exinda_Opt eq https access-list TMP_CG_acl extended permit tcp host Chripa host Optimizer_DC eq https access-list TMP_CG_acl extended permit tcp host Corde host Aumida eq www access-list TMP_CG_acl extended permit tcp host Corde host Aumida eq https access-list TMP_CG_acl extended permit tcp host Evanzan host Aumida eq www access-list TMP_CG_acl extended permit tcp host Evanzan host Aumida eq https access-list TMP_CG_acl extended permit tcp host Evanzan host CCL_Bishop eq 1433 access-list TMP_CG_acl extended permit udp host Evanzan host CCL_Bishop eq 1433 access-list TMP_CG_acl extended permit tcp host Evanzan host Phoenix eq ldap access-list TMP_CG_acl remark For Ominiback testing purpose. access-list TMP_CG_acl extended permit tcp object-group Luthien_Galadriel host DC_105 object-group Omniback_Ports access-list TMP_CG_acl extended permit tcp host Evanzan host Phoenix eq 524 access-list TMP_CG_acl remark access-list TMP_CG_acl extended permit tcp host Evanzon host Phoenix eq ldap access-list TMP_CG_acl extended permit tcp host Evanzon host CCL_Bishop eq 1433 access-list TMP_CG_acl extended permit tcp host Evanzon host Aumida eq www access-list TMP_CG_acl extended permit tcp host Evanzon host Aumida eq https access-list TMP_CG_acl remark remark For Blocking RIL Network access ( Next 1line) access-list TMP_CG_acl remark remark For SBU to Residential(VLAN 208) access-list TMP_CG_acl extended permit tcp host Monitor-PC host Resi_Jaguar_Server eq 4899 access-list TMP_CG_acl extended permit tcp host Monitor-PC host Resi_Proche_Server eq 4899 access-list TMP_CG_acl extended permit udp host Brocade_Switch object-group HP_Mon_Hosts range snmp snmptrap access-list TMP_CG_acl remark remark ---------- Amuda Http access to IMS Database Sever Z----SCRS 639------------ access-list TMP_CG_acl extended permit tcp host Neucleus1 host IMS_Database_Srv eq 1433 access-list TMP_CG_acl extended permit tcp host Snitkin TMP_CM_Subnet 255.255.255.240 eq 445 access-list TMP_CG_acl remark remark Chripa Ports and Services access-list TMP_CG_acl extended permit tcp host Corde host CLNS01 eq 524 access-list TMP_CG_acl extended permit tcp host Chripa host CLNS01 eq 524 access-list TMP_CG_acl extended permit tcp host Corde host Phoenix eq 524 access-list TMP_CG_acl extended permit tcp host Corde host Havok eq 2512 access-list TMP_CG_acl extended permit tcp host Chripa TMP_CM_Subnet 255.255.255.240 eq 2512 access-list TMP_CG_acl extended permit tcp host Corde 10.200.0.0 255.255.0.0 eq lotusnotes access-list TMP_CG_acl remark remark For Yavin Ports and services access-list TMP_CG_acl extended permit tcp host Yavin any eq www access-list TMP_CG_acl extended permit tcp host Yavin any eq ftp access-list TMP_CG_acl extended permit tcp host Arien host CLNS01 eq 524 access-list TMP_CG_acl extended permit tcp host Arien host BACKUPCLNS eq 524 access-list TMP_CG_acl extended permit tcp host Arien host Jubilee eq 524 access-list TMP_CG_acl extended permit udp host Arien Comm_BU_Net 255.255.0.0 eq netbios-ns access-list TMP_CG_acl extended permit udp host Arien Resi_BU_Net 255.255.0.0 eq 427 access-list TMP_CG_acl extended permit udp host Arien TMP_CM_Subnet 255.255.255.240 eq 524 access-list TMP_CG_acl extended permit udp host Arien host CLNS01 eq 524 access-list TMP_CG_acl extended permit udp host Arien host Jubilee eq 524 access-list TMP_CG_acl extended permit udp host Arien Comm_BU_Net 255.255.0.0 eq 427 access-list TMP_CG_acl remark Internal DNS sync with Public DNS. access-list TMP_CG_acl extended permit tcp object-group Internal_DNS object-group Public_DNS eq domain access-list TMP_CG_acl extended permit udp object-group Internal_DNS object-group Public_DNS eq domain access-list TMP_CG_acl extended permit tcp host Galadriel host Durin eq domain access-list TMP_CG_acl extended permit tcp host Orome host Magneto eq 445 access-list TMP_CG_acl extended permit tcp host Orome host CLNS01 eq 524 access-list TMP_CG_acl extended permit tcp host Orome host BACKUPCLNS eq 524 access-list TMP_CG_acl extended permit tcp host Orome host Jubilee eq 524 access-list TMP_CG_acl extended permit tcp host Orome 10.200.0.0 255.255.0.0 eq lotusnotes access-list TMP_CG_acl extended permit udp host Orome host CLNS01 eq 524 access-list TMP_CG_acl extended permit tcp host Orome Comm_BU_Net 255.255.0.0 eq 524 access-list TMP_CG_acl remark remark For Evanzan Ports and Services access-list TMP_CG_acl extended permit tcp host Evanzan host Iceman eq www access-list TMP_CG_acl extended permit tcp host Evanzan host CLNS01 eq 524 access-list TMP_CG_acl extended permit tcp host Evanzan host Havok eq citrix-ica access-list TMP_CG_acl extended permit udp host Evanzan host Havok eq 1604 access-list TMP_CG_acl extended permit tcp host Evanzan host Havok eq 2512 access-list TMP_CG_acl extended permit udp host Evanzan host Phoenix eq 427 access-list TMP_CG_acl extended permit tcp host Evanzan host CCL_Rogue eq www access-list TMP_CG_acl remark Remark-------Evanzan authenticate to CLNT07--------- access-list TMP_CG_acl extended permit tcp host Evanzan host CLNT07 object-group AD_TCP_Services access-list TMP_CG_acl extended permit udp host Evanzan host CLNT07 object-group AD_UDP_Services access-list TMP_CG_acl extended permit tcp host Evanzan host CLNT07 object-group NREMS access-list TMP_CG_acl extended permit tcp host Evanzon host CCL_Rogue eq 2512 access-list TMP_CG_acl extended permit tcp host Evanzon Corp_BU_Net 255.255.248.0 eq 524 access-list TMP_CG_acl extended permit tcp host Evanzon 10.200.0.0 255.255.0.0 eq lotusnotes access-list TMP_CG_acl extended permit tcp host Evanzon TMP_CM_Subnet 255.255.255.240 eq 2512 access-list TMP_CG_acl extended permit udp host Evanzon host Phoenix eq 427 access-list TMP_CG_acl extended permit tcp host Evanzon host Phoenix eq netbios-ssn access-list TMP_CG_acl extended permit tcp host Evanzon host Phoenix eq 445 access-list TMP_CG_acl extended permit tcp host Evanzon host Phoenix eq 524 access-list TMP_CG_acl extended permit udp host Evanzon host Phoenix eq netbios-ns access-list TMP_CG_acl remark Remark-------Evanzon authenticate to CLNT07--------- access-list TMP_CG_acl extended permit tcp host Evanzon host CLNT07 object-group AD_TCP_Services access-list TMP_CG_acl extended permit udp host Evanzon host CLNT07 object-group AD_UDP_Services access-list TMP_CG_acl extended permit tcp host Evanzon host CLNT07 object-group NREMS access-list TMP_CG_acl remark remark For TrendMicro Ports and Services access-list TMP_CG_acl extended permit tcp host Trendmicro any eq www access-list TMP_CG_acl extended permit tcp host Trendmicro any eq https access-list TMP_CG_acl extended permit udp host Trendmicro host varda eq domain access-list TMP_CG_acl extended permit udp host Trendmicro host Durin eq domain access-list TMP_CG_acl extended permit tcp host Trendmicro any eq 8080 access-list TMP_CG_acl extended permit udp host Trendmicro any eq domain access-list TMP_CG_acl extended permit tcp host Trendmicro any range ftp-data ftp access-list TMP_CG_acl extended permit udp host 10.61.12.37 host 10.150.253.12 eq syslog access-list TMP_CG_acl remark remark For Holocam Ports and Services access-list TMP_CG_acl extended permit tcp host Holocam host CCL_Rogue eq citrix-ica access-list TMP_CG_acl extended permit tcp host Holocam TMP_CM_Subnet 255.255.255.240 eq citrix-ica access-list TMP_CG_acl remark remark For Rodian Ports and Services access-list TMP_CG_acl extended permit tcp host Rodian TMP_CM_Subnet 255.255.255.240 eq netbios-ssn access-list TMP_CG_acl extended permit tcp host Rodian TMP_CM_Subnet 255.255.255.240 eq 524 access-list TMP_CG_acl extended permit tcp host Rodian host CLNS01 eq 524 access-list TMP_CG_acl remark remark For to Monitor-PC Ctrl Zone PCs PCAnywhere access access-list TMP_CG_acl extended permit tcp host Monitor-PC any eq www access-list TMP_CG_acl extended permit tcp host Monitor-PC any eq 8080 access-list TMP_CG_acl extended permit tcp host 10.61.12.47 TMP_CM_Subnet 255.255.255.240 eq 524 access-list TMP_CG_acl remark remark For Sicrus ports and services access-list TMP_CG_acl extended permit tcp host Sicrus_Server host Flamingo_SMTPRelay eq smtp access-list TMP_CG_acl remark remark For CLNT07--SCRS 545-- Drive Mapping from Evanzon to access-list TMP_CG_acl remark remark For CLNT07 to authenticate with Rodian access-list TMP_CG_acl extended permit tcp host Galadriel host GALA eq 257 access-list TMP_CG_acl extended permit tcp host Galadriel host GALA eq 18184 access-list TMP_CG_acl extended permit udp host Galadriel host GALA eq 18184 access-list TMP_CG_acl extended permit tcp host Galadriel host GALA eq 18186 access-list TMP_CG_acl extended permit tcp host Galadriel host GALA range 18190 18192 access-list TMP_CG_acl extended permit tcp host Galadriel host GALA range 18210 18211 access-list TMP_CG_acl remark remark For Server farm Raffles SBU to access Raffles (Next 3 lines) access-list TMP_CG_acl extended permit tcp host Monitor-PC host host10_150_200_98 eq pcanywhere-data access-list TMP_CG_acl extended permit udp host Monitor-PC host host10_150_200_98 eq pcanywhere-status access-list TMP_CG_acl remark remark For China Intranet( Corp & CCL to access Next 8 lines) access-list TMP_CG_acl extended permit tcp TMP_CG_subnet 255.255.255.192 host host10_156_134_139 eq www access-list TMP_CG_acl extended permit tcp TMP_CG_subnet 255.255.255.192 host host10_156_134_139 eq 808 access-list TMP_CG_acl extended permit tcp TMP_CG_subnet 255.255.255.192 host host10_156_134_139 eq 9081 access-list TMP_CG_acl extended permit tcp Corp_BU_Net 255.255.248.0 host host10_156_134_139 eq www access-list TMP_CG_acl extended permit tcp Corp_BU_Net 255.255.248.0 host host10_156_134_139 eq 9081 access-list TMP_CG_acl extended permit tcp Corp_BU_Net 255.255.248.0 host host10_156_134_139 eq 808 access-list TMP_CG_acl extended permit tcp host Luthien host SGCalypso3 access-list TMP_CG_acl extended permit tcp host Luthien host Sinc1ctx1 access-list TMP_CG_acl extended permit tcp host Galadriel host SGCalypso3 access-list TMP_CG_acl extended permit tcp host Galadriel host Sinc1ctx1 access-list TMP_CG_acl extended permit ip host Galadriel host Aragorn access-list TMP_CG_acl extended permit ip host Galadriel host Elendil access-list TMP_CG_acl extended permit tcp host Neucleus1 host Warrick eq 2300 access-list TMP_CG_acl extended permit tcp host Neucleus1 host Warrick range 2100 2105 access-list TMP_CG_acl extended permit tcp host Evanzan host Flamingo_SMTPRelay eq smtp access-list TMP_CG_acl extended permit tcp host Evanzan host Postman201-smts eq smtp access-list TMP_CG_acl extended permit tcp host Evanzon host Flamingo_SMTPRelay eq smtp access-list TMP_CG_acl extended permit tcp host Evanzon host Postman201-smts eq smtp access-list TMP_CG_acl extended deny ip any any log access-list DCB_CP_acl remark FTP SERVICE TO MANWE. access-list DCB_CP_acl extended permit tcp object-group DCB_CP_Anti_Spoofing host ManWe range ftp-data ftp access-list DCB_CP_acl remark To access public internet via proxy. access-list DCB_CP_acl extended permit tcp object-group DCB_CP_Anti_Spoofing host Trendmicro eq www access-list DCB_CP_acl remark remark ------------ HP Monitoring Ports/Services------------------------- access-list DCB_CP_acl extended permit tcp object-group DCB_CP_Anti_Spoofing object-group HP_Mon_Hosts eq 135 access-list DCB_CP_acl extended permit tcp object-group DCB_CP_Anti_Spoofing object-group HP_Mon_Hosts range 381 383 access-list DCB_CP_acl extended permit tcp object-group DCB_CP_Anti_Spoofing object-group HP_Mon_Hosts range 10000 10200 access-list DCB_CP_acl extended permit tcp object-group DCB_CP_Anti_Spoofing object-group HP_Mon_Hosts range 14000 14010 access-list DCB_CP_acl extended permit udp object-group DCB_CP_Anti_Spoofing object-group HP_Mon_Hosts range snmp snmptrap access-list DCB_CP_acl extended permit udp object-group DCB_CP_Anti_Spoofing host HPMon3 range snmp snmptrap access-list DCB_CP_acl extended permit icmp object-group DCB_CP_Anti_Spoofing host HP_Pri_OVO_MgtSvr access-list DCB_CP_acl extended permit icmp object-group DCB_CP_Anti_Spoofing host HP_Sec_OVO_MgtSvr access-list DCB_CP_acl extended permit icmp object-group DCB_CP_Anti_Spoofing host HPMon3 access-list DCB_CP_acl remark remark Z---START--Acl for traffic flow outward of FWSM vlan 134 to vlan10--Z access-list DCB_CP_acl remark remark ---------------- DNS Access Orome and Galadriel-------------- access-list DCB_CP_acl extended permit udp object-group DCB_CP_Anti_Spoofing object-group Internal_DNS eq domain access-list DCB_CP_acl extended permit tcp object-group DCB_CP_Anti_Spoofing host Rodian object-group AD_TCP_Services access-list DCB_CP_acl extended permit udp object-group DCB_CP_Anti_Spoofing host Rodian object-group AD_UDP_Services access-list DCB_CP_acl extended permit tcp object-group DCB_CP_Anti_Spoofing host Rodian range 7000 7200 access-list DCB_CP_acl extended permit tcp object-group DCB_CP_Anti_Spoofing host Ackbar object-group AD_TCP_Services access-list DCB_CP_acl extended permit udp object-group DCB_CP_Anti_Spoofing host Ackbar object-group AD_UDP_Services access-list DCB_CP_acl extended permit tcp object-group DCB_CP_Anti_Spoofing host Ackbar range 7000 7200 access-list DCB_CP_acl extended permit icmp object-group DCB_CP_Anti_Spoofing host Rodian access-list DCB_CP_acl remark Remark --For Symantec Management DAT update ---SCRS 923 --- access-list DCB_CP_acl extended permit tcp object-group DCB_CP_Anti_Spoofing host Monitor-PC eq 38292 access-list DCB_CP_acl remark Remark --For Symantec Management DAT update ---SCRS 923 --- access-list DCB_CP_acl extended permit udp object-group DCB_CP_Anti_Spoofing host Monitor-PC object-group NAV_CLIENT_DAT access-list DCB_CP_acl remark access-list DCB_CP_acl extended permit tcp object-group DCB_CP_Anti_Spoofing object-group Omniback_Svrs object-group Omniback_Ports access-list DCB_CP_acl remark access-list DCB_CP_acl extended permit tcp object-group DCB_CP_Anti_Spoofing object-group Luthien_Galadriel object-group Omniback_Po rts access-list DCB_CP_acl extended permit icmp object-group DCB_CP_Anti_Spoofing host Ackbar access-list CSR_CL_acl extended permit icmp host SarDBVirt host 10.156.202.220 echo-reply access-list CSR_CL_acl extended permit tcp host Sarlac1 host Frixgrizz object-group SAP_Client_Services access-list CSR_CL_acl extended permit tcp host Sarlac2 host Frixgrizz object-group SAP_Client_Services access-list CSR_CL_acl extended permit tcp object-group SAP_PhySvr_Group host Sidaster object-group SAP_Apps_Port access-list CSR_CL_acl extended permit icmp object-group CSR_CL_Anti_Spoofing object-group DC_Control_Hosts echo-reply access-list CSR_CL_acl extended permit tcp object-group SarApps_Svrs object-group SAP_Clients eq lpd access-list CSR_CL_acl extended permit tcp object-group SarApps_Svrs object-group SAP_Clients range 3200 3203 access-list CSR_CL_acl remark SCRS 1898 access-list CSR_CL_acl remark SCRS 1898 access-list CSR_CL_acl extended permit tcp object-group SarApps_Svrs host Dengar object-group SAP_NFS_Services access-list CSR_CL_acl remark SCRS 1898 access-list CSR_CL_acl extended permit tcp object-group SarApps_Svrs host Dengar object-group SAP_Apps_Ports access-list CSR_CL_acl remark SCRS 1898 access-list CSR_CL_acl extended permit tcp object-group SarApps_Svrs host Tessek object-group SAP_Apps_Ports access-list CSR_CL_acl remark FTP SERVICE TO MANWE. access-list CSR_CL_acl extended permit tcp object-group CSR_CL_Anti_Spoofing host ManWe range ftp-data ftp access-list CSR_CL_acl extended permit tcp object-group CSR_CL_Anti_Spoofing object-group HP_Mon_Hosts eq 135 access-list CSR_CL_acl extended permit tcp object-group CSR_CL_Anti_Spoofing object-group HP_Mon_Hosts range 381 383 access-list CSR_CL_acl extended permit tcp object-group CSR_CL_Anti_Spoofing object-group HP_Mon_Hosts range 10000 10200 access-list CSR_CL_acl extended permit tcp object-group CSR_CL_Anti_Spoofing object-group HP_Mon_Hosts range 14000 14010 access-list CSR_CL_acl extended permit udp object-group CSR_CL_Anti_Spoofing object-group HP_Mon_Hosts range snmp snmptrap access-list CSR_CL_acl extended permit udp object-group CSR_CL_Anti_Spoofing host HPMon3 range snmp snmptrap access-list CSR_CL_acl extended permit icmp object-group CSR_CL_Anti_Spoofing host HP_Pri_OVO_MgtSvr access-list CSR_CL_acl extended permit icmp object-group CSR_CL_Anti_Spoofing host HP_Sec_OVO_MgtSvr access-list CSR_CL_acl extended permit icmp object-group CSR_CL_Anti_Spoofing host HPMon3 access-list CSR_CL_acl extended permit tcp object-group CSR_CL_Anti_Spoofing object-group Omniback_Svrs object-group Omniback_Ports access-list CSR_CL_acl extended permit tcp object-group CSR_CL_Anti_Spoofing object-group Luthien_Galadriel object-group Omniback_Po rts access-list CSR_CL_acl remark For Symantec Management DAT update --SCRS 923-- access-list CSR_CL_acl extended permit tcp object-group CSR_CL_Anti_Spoofing host Monitor-PC eq 38292 access-list CSR_CL_acl extended permit udp object-group CSR_CL_Anti_Spoofing host Monitor-PC object-group NAV_CLIENT_DAT access-list CSR_CL_acl extended permit tcp object-group CSR_CL_Anti_Spoofing object-group Internal_DNS eq domain access-list CSR_CL_acl extended permit udp object-group CSR_CL_Anti_Spoofing object-group Internal_DNS eq domain access-list CSR_CL_acl remark remark Z---START--Acl for traffic flow outward of FWSM vlan 210 to vlan 10--Z access-list CSR_CL_acl extended permit tcp object-group CSR_CL_Anti_Spoofing host Rodian object-group AD_TCP_Services access-list CSR_CL_acl remark remark Z---START--Acl for traffic flow outward of FWSM vlan 210 to vlan 10--Z access-list CSR_CL_acl extended permit udp object-group CSR_CL_Anti_Spoofing host Rodian object-group AD_UDP_Services access-list CSR_CL_acl remark remark Z---START--Acl for traffic flow outward of FWSM vlan 210 to vlan 10--Z access-list CSR_CL_acl extended permit tcp object-group CSR_CL_Anti_Spoofing host Rodian range 7000 7200 access-list CSR_CL_acl remark remark Z---START--Acl for traffic flow outward of FWSM vlan 210 to vlan 10--Z access-list CSR_CL_acl extended permit tcp object-group CSR_CL_Anti_Spoofing host Ackbar object-group AD_TCP_Services access-list CSR_CL_acl remark remark Z---START--Acl for traffic flow outward of FWSM vlan 210 to vlan 10--Z access-list CSR_CL_acl extended permit udp object-group CSR_CL_Anti_Spoofing host Ackbar object-group AD_UDP_Services access-list CSR_CL_acl remark remark Z---START--Acl for traffic flow outward of FWSM vlan 210 to vlan 10--Z access-list CSR_CL_acl extended permit tcp object-group CSR_CL_Anti_Spoofing host Ackbar range 7000 7200 access-list CSR_CL_acl remark remark Z---START--Acl for traffic flow outward of FWSM vlan 210 to vlan 10--Z access-list CSR_CL_acl remark remark Z---START--Acl for traffic flow outward of FWSM vlan 210 to vlan 10--Z access-list CSR_CL_acl remark remark HP Monitoring Ports/Services------------------- access-list CSR_CL_acl remark NAI Dat update. access-list CSR_CL_acl extended permit tcp object-group CSR_CL_Anti_Spoofing host Monitor-PC eq ftp access-list CSR_CL_acl remark remark Z---START--Acl for traffic flow outward of FWSM vlan 210 to vlan 10--Z access-list CSR_CL_acl extended permit tcp 10.150.210.100 255.255.255.252 host Arien eq 427 access-list CSR_CL_acl extended permit tcp 10.150.210.100 255.255.255.252 host Arien eq 524 access-list CSR_CL_acl extended permit tcp object-group CSR_CL_Anti_Spoofing host Trendmicro eq www access-list CSR_CL_acl remark remark HP Monitoring Ports/Services------------------- access-list CSR_CL_acl remark remark For Vlan 210 CL Shared zone access ( access-list CSR_CL_acl extended permit tcp 10.150.210.100 255.255.255.252 Acklay 255.255.255.254 eq sqlnet access-list CSR_CL_acl extended permit tcp 10.150.210.100 255.255.255.252 Acklay 255.255.255.254 eq 1522 access-list CSR_CL_acl extended permit tcp 10.150.210.100 255.255.255.252 Acklay 255.255.255.254 eq 1523 access-list CSR_CL_acl extended deny ip any any log access-list CSR_CG_acl remark SCRS will be raised later access-list CSR_CG_acl extended permit tcp host WibroAX host Flamingo_SMTPRelay eq smtp access-list CSR_CG_acl extended permit tcp host WibroAX host Trendmicro object-group HTTP_HTTPS access-list CSR_CG_acl remark SCRS will be raised later access-list CSR_CG_acl extended permit tcp host 10.150.211.130 host Flamingo_SMTPRelay eq smtp access-list CSR_CG_acl extended permit tcp host 10.150.211.130 host Trendmicro object-group HTTP_HTTPS access-list CSR_CG_acl extended permit tcp host Saelt1 host 10.150.200.73 eq 2163 access-list CSR_CG_acl extended permit tcp host Saelt2 host 10.150.200.73 eq 2163 access-list CSR_CG_acl extended permit tcp host Saelt2 host 10.150.200.73 eq 2162 access-list CSR_CG_acl extended permit tcp host Saelt1 host 10.150.200.73 eq 2162 access-list CSR_CG_acl extended permit udp object-group CSR_CG_Anti_Spoofing object-group Internal_DNS eq domain access-list CSR_CG_acl extended permit tcp host Warrick host 10.150.121.39 object-group Servicedesk_client access-list CSR_CG_acl extended permit tcp host Warrick host 10.150.123.14 object-group Servicedesk_client access-list CSR_CG_acl extended permit tcp object-group SAELT1_SAELT2 host Flamingo_SMTPRelay eq smtp access-list CSR_CG_acl extended permit icmp host Ackbar DCB_CP_Subnet 255.255.255.0 echo-reply access-list CSR_CG_acl extended permit icmp host Ackbar host Calisto access-list CSR_CG_acl extended permit tcp host Ackbar host Calisto object-group AD_Trust_TCP access-list CSR_CG_acl extended permit udp host Ackbar host Calisto object-group AD_Trust_UDP access-list CSR_CG_acl extended permit icmp host Ackbar host Rodian access-list CSR_CG_acl extended permit ip host Ackbar host Rodian access-list CSR_CG_acl extended permit tcp host Ackbar host CLNS01 eq ldap access-list CSR_CG_acl extended permit tcp host Ackbar host Rodian range 3268 3269 access-list CSR_CG_acl extended permit udp host Ackbar host CLNS01 eq 427 access-list CSR_CG_acl extended permit tcp host Ackbar host CLNS01 eq 524 access-list CSR_CG_acl extended permit tcp host Ackbar host CLNS01 eq 8000 access-list CSR_CG_acl extended permit tcp host Ackbar host CLNS01 eq 8090 access-list CSR_CG_acl extended permit tcp host Ackbar host BACKUPCLNS eq ldap access-list CSR_CG_acl extended permit udp host Ackbar host BACKUPCLNS eq 427 access-list CSR_CG_acl extended permit tcp host Ackbar host BACKUPCLNS eq 524 access-list CSR_CG_acl extended permit tcp host Ackbar host BACKUPCLNS eq 8000 access-list CSR_CG_acl extended permit tcp host Ackbar host BACKUPCLNS eq 8090 access-list CSR_CG_acl extended permit tcp host Ackbar host Arien eq ldap access-list CSR_CG_acl extended permit udp host Ackbar host Arien eq 427 access-list CSR_CG_acl extended permit tcp host Ackbar host Arien eq 524 access-list CSR_CG_acl extended permit tcp host Ackbar host Arien eq 8000 access-list CSR_CG_acl extended permit tcp host Ackbar host Arien eq 8090 access-list CSR_CG_acl extended permit tcp host Ackbar host Orome eq ldap access-list CSR_CG_acl extended permit udp host Ackbar host Orome eq 427 access-list CSR_CG_acl extended permit tcp host Ackbar host Orome eq 524 access-list CSR_CG_acl extended permit tcp host Ackbar host Orome eq 8000 access-list CSR_CG_acl extended permit tcp host Ackbar host Orome eq 8090 access-list CSR_CG_acl extended permit tcp host Ackbar host Phoenix eq ldap access-list CSR_CG_acl extended permit udp host Ackbar host Phoenix eq 427 access-list CSR_CG_acl extended permit tcp host Ackbar host Phoenix eq 524 access-list CSR_CG_acl extended permit tcp host Ackbar host Phoenix eq 8000 access-list CSR_CG_acl extended permit tcp host Ackbar host Phoenix eq 8090 access-list CSR_CG_acl extended permit tcp object-group CSR_CG_Anti_Spoofing host Rodian object-group AD_TCP_Services access-list CSR_CG_acl extended permit udp object-group CSR_CG_Anti_Spoofing host Rodian object-group AD_UDP_Services access-list CSR_CG_acl extended permit tcp object-group CSR_CG_Anti_Spoofing host Rodian range 7000 7200 access-list CSR_CG_acl extended permit tcp host Ackbar object-group Resi_DCs object-group Resi_AD_Trust_TCP access-list CSR_CG_acl extended permit udp host Ackbar object-group Resi_DCs object-group Resi_AD_Trust_UDP access-list CSR_CG_acl extended permit tcp host Ackbar object-group Resi_DCs range 7000 7200 access-list CSR_CG_acl extended permit icmp host Ackbar object-group Resi_DCs access-list CSR_CG_acl remark Request by Susie Chia access-list CSR_CG_acl extended permit tcp host IMS_Database_Srv host ArchivalTest eq 1433 access-list CSR_CG_acl extended permit tcp host Dashade host Gasgano eq ftp access-list CSR_CG_acl extended permit tcp CSR_CG_Subnet 255.255.255.0 host Trendmicro eq www access-list CSR_CG_acl extended permit tcp object-group CSR_CG_Anti_Spoofing object-group HP_Mon_Hosts eq 135 access-list CSR_CG_acl extended permit tcp object-group CSR_CG_Anti_Spoofing object-group HP_Mon_Hosts range 381 383 access-list CSR_CG_acl extended permit tcp object-group CSR_CG_Anti_Spoofing object-group HP_Mon_Hosts range 10000 10200 access-list CSR_CG_acl extended permit tcp object-group CSR_CG_Anti_Spoofing object-group HP_Mon_Hosts range 14000 14010 access-list CSR_CG_acl extended permit udp object-group CSR_CG_Anti_Spoofing object-group HP_Mon_Hosts range snmp snmptrap access-list CSR_CG_acl extended permit udp object-group CSR_CG_Anti_Spoofing host HPMon3 range snmp snmptrap access-list CSR_CG_acl extended permit icmp object-group CSR_CG_Anti_Spoofing host HP_Pri_OVO_MgtSvr access-list CSR_CG_acl extended permit icmp object-group CSR_CG_Anti_Spoofing host HP_Sec_OVO_MgtSvr access-list CSR_CG_acl extended permit icmp object-group CSR_CG_Anti_Spoofing host HPMon3 access-list CSR_CG_acl extended permit tcp object-group CSR_CG_Anti_Spoofing object-group Omniback_Svrs object-group Omniback_Ports access-list CSR_CG_acl extended permit tcp object-group CSR_CG_Anti_Spoofing object-group Luthien_Galadriel object-group Omniback_Po rts access-list CSR_CG_acl extended permit udp host Warrick host Galadriel eq domain access-list CSR_CG_acl extended permit udp host Warrick host Orome eq domain access-list CSR_CG_acl extended permit tcp host Warrick host Rodian object-group AD_TCP_Services access-list CSR_CG_acl extended permit udp host Warrick host Rodian object-group AD_UDP_Services access-list CSR_CG_acl extended permit tcp host Warrick host Neucleus1 eq 2300 access-list CSR_CG_acl extended permit tcp host Warrick host Neucleus1 range 2100 2105 access-list CSR_CG_acl extended permit tcp host Anakin object-group EmailXtenders object-group EmailXtender access-list CSR_CG_acl remark For Symantec Management DAT update --SCRS 923-- access-list CSR_CG_acl extended permit tcp CSR_CG_Subnet 255.255.255.0 host Monitor-PC eq 38292 access-list CSR_CG_acl extended permit udp CSR_CG_Subnet 255.255.255.0 host Monitor-PC object-group NAV_CLIENT_DAT access-list CSR_CG_acl extended permit tcp host Warrick host Neucleus1 object-group USPSD_Web access-list CSR_CG_acl extended permit tcp host Warrick host Postman201-smts eq smtp access-list CSR_CG_acl extended permit tcp host Warrick object-group USPSD_clients object-group USPSD access-list CSR_CG_acl extended permit tcp host Warrick host Neucleus1 eq 8081 access-list CSR_CG_acl extended permit tcp host Warrick host Neucleus1 eq 8080 access-list CSR_CG_acl extended permit udp object-group CLG_SHARED_Servers object-group Internal_DNS eq domain access-list CSR_CG_acl extended permit tcp object-group CLG_SHARED_Servers host Rodian object-group AD_TCP_Services access-list CSR_CG_acl extended permit udp object-group CLG_SHARED_Servers host Rodian object-group AD_UDP_Services access-list CSR_CG_acl remark remark Z---START--Acl for traffic flow outward of FWSM vlan 211--Z access-list CSR_CG_acl remark remark For SkyWorld to access STMSPostman201 --- SCRS --- access-list CSR_CG_acl extended permit tcp host Skyworld host Postman201-smts eq smtp access-list CSR_CG_acl remark remark For Omniback to Dashade and Sergio---------------------- access-list CSR_CG_acl remark remark For Melasia1 to access Dashade access-list CSR_CG_acl extended permit udp host Dashade host GALA eq syslog access-list CSR_CG_acl remark remark ---------- 479------------------------------------- Skyworld to Lotus --- SCRS access-list CSR_CG_acl extended permit tcp host Skyworld host 10.200.3.1 eq lotusnotes access-list CSR_CG_acl remark remark Z-----For Omniback to Skyword--SCRS 589----------------------------- access-list CSR_CG_acl remark remark Omniback to Warrick--Rename from Melasia2--------------- access-list CSR_CG_acl remark remark ----- Warrick-to Acess DNS & Rodian----- access-list CSR_CG_acl remark remark ----- Warrick-to Acess DNS & Rodian----- access-list CSR_CG_acl remark remark ---------- Help desk ports Access------------------- access-list CSR_CG_acl remark Skyworld to CLG01/02 -- SCRS 1092 -- access-list CSR_CG_acl extended permit tcp host Skyworld host CLG001 eq lotusnotes access-list CSR_CG_acl extended permit tcp host Skyworld host CLG101 eq lotusnotes access-list CSR_CG_acl extended deny ip any any access-list WOR_DC_access_in remark TROUBLE Shooting PDM access-list WOR_DC_access_in extended permit ip host 10.150.201.103 object-group ILO_DC_Anti_Spoofing access-list WOR_DC_access_in remark TROUBLE Shooting PDM access-list WOR_DC_access_in extended permit ip host 10.150.201.104 object-group ILO_DC_Anti_Spoofing access-list WOR_DC_access_in extended permit tcp object-group WOR_DC_Anti_Spoofing object-group RHL_Citrix_Servers eq citrix-ica access-list WOR_DC_access_in extended permit tcp object-group WOR_DC_Anti_Spoofing object-group Elixir_Cosmo eq www access-list WOR_DC_access_in remark FTP SERVICE TO MANWE. access-list WOR_DC_access_in extended permit tcp object-group WOR_DC_Anti_Spoofing host ManWe range ftp-data ftp access-list WOR_DC_access_in extended permit tcp host DC_105 host 10.150.200.6 eq ssh access-list WOR_DC_access_in extended permit tcp host DC_105 host Trendmicro eq ssh access-list WOR_DC_access_in extended permit tcp host DC_105 host Whiphid eq ssh access-list WOR_DC_access_in extended permit tcp host DC_105 host Durin eq ssh access-list WOR_DC_access_in extended permit tcp host DC_105 host varda eq telnet access-list WOR_DC_access_in extended permit tcp host DC_105 host Luthien eq telnet access-list WOR_DC_access_in extended permit tcp host DC_105 host 10.150.205.6 eq telnet access-list WOR_DC_access_in extended permit tcp host DC_105 host 203.125.137.126 eq 8003 access-list WOR_DC_access_in extended permit tcp WOR_DC_Subnet 255.255.255.0 host 10.150.200.6 eq telnet access-list WOR_DC_access_in extended permit tcp host DC_105 object-group Luthien_Galadriel object-group Omniback_Ports access-list WOR_DC_access_in extended permit tcp host DC_105 TMP_CG_subnet 255.255.255.0 eq pcanywhere-data access-list WOR_DC_access_in extended permit udp host DC_105 TMP_CG_subnet 255.255.255.0 eq pcanywhere-status access-list WOR_DC_access_in remark Temp for troubleshooting access-list WOR_DC_access_in extended permit ip host 10.150.201.102 any access-list WOR_DC_access_in extended permit tcp host DC_105 10.150.0.0 255.255.0.0 eq pcanywhere-data access-list WOR_DC_access_in extended permit udp host DC_105 10.150.0.0 255.255.0.0 eq pcanywhere-status access-list WOR_DC_access_in extended permit tcp WOR_DC_Subnet 255.255.255.0 host Neucleus1 eq https access-list WOR_DC_access_in extended permit tcp object-group DC_Working_ZONE 10.200.0.0 255.254.0.0 eq lotusnotes access-list WOR_DC_access_in extended permit esp object-group DC_Working_ZONE object-group HP_VPN_Group access-list WOR_DC_access_in extended permit ah object-group DC_Working_ZONE object-group HP_VPN_Group access-list WOR_DC_access_in extended permit udp object-group DC_Working_ZONE object-group HP_VPN_Group eq isakmp access-list WOR_DC_access_in extended permit udp object-group DC_Working_ZONE object-group Internal_DNS eq domain access-list WOR_DC_access_in extended permit udp object-group DC_Working_ZONE host Arien eq 524 access-list WOR_DC_access_in extended permit tcp object-group DC_Working_ZONE host Arien eq 524 access-list WOR_DC_access_in extended permit tcp object-group DC_Working_ZONE object-group Internal_DNS eq domain access-list WOR_DC_access_in remark Request by Susie Chia access-list WOR_DC_access_in extended permit tcp WOR_DC_Subnet 255.255.255.0 host ArchivalTest range 1200 1215 access-list WOR_DC_access_in extended permit tcp object-group DC_Working_ZONE any object-group Internet_Services access-list WOR_DC_access_in extended deny ip any any log access-list ENM_DC_acl extended deny ip any host Raffles_FW1 access-list ENM_DC_acl extended deny ip any host Raffles_FW2 access-list ENM_DC_acl extended permit tcp host 192.170.75.101 object-group DC_Control_Hosts eq pcanywhere-data log access-list ENM_DC_acl extended permit udp host 192.170.75.101 object-group DC_Control_Hosts eq pcanywhere-status log access-list ENM_DC_acl extended permit tcp object-group HP_Mon_Hosts object-group CL_Network eq 135 access-list ENM_DC_acl extended permit tcp host HP_MWA_Mgt_Svr object-group CL_Network range 381 383 access-list ENM_DC_acl extended permit tcp host HP_CODA_Mgt_Svr object-group CL_Network range 381 383 access-list ENM_DC_acl extended permit tcp host HP_Pri_OVO_MgtSvr object-group CL_Network range 10000 10200 access-list ENM_DC_acl extended permit tcp host HP_Sec_OVO_MgtSvr object-group CL_Network range 10000 10200 access-list ENM_DC_acl extended permit tcp host HP_MWA_Mgt_Svr object-group CL_Network range 14000 14010 access-list ENM_DC_acl extended permit tcp host HP_CODA_Mgt_Svr object-group CL_Network range 14000 14010 access-list ENM_DC_acl extended permit udp host HP_Pri_OVO_MgtSvr object-group CL_Network range snmp snmptrap access-list ENM_DC_acl extended permit udp host HP_Sec_OVO_MgtSvr object-group CL_Network range snmp snmptrap access-list ENM_DC_acl extended permit udp host HPMon3 object-group CL_Network range snmp snmptrap access-list ENM_DC_acl extended permit icmp host HP_Pri_OVO_MgtSvr object-group CL_Network access-list ENM_DC_acl extended permit icmp host HP_Sec_OVO_MgtSvr object-group CL_Network access-list ENM_DC_acl extended permit icmp host HPMon3 object-group CL_Network access-list ENM_DC_acl extended deny ip any any log access-list TMP_SZ_acl remark FTP SERVICE TO MANWE. access-list TMP_SZ_acl extended permit tcp object-group TMP_SZ_Anti_Spoofing host ManWe range ftp-data ftp access-list TMP_SZ_acl remark To access public internet via proxy. access-list TMP_SZ_acl extended permit tcp object-group TMP_SZ_Anti_Spoofing host Trendmicro eq www access-list TMP_SZ_acl extended permit tcp object-group TMP_SZ_Anti_Spoofing object-group Omniback_Svrs object-group Omniback_Ports access-list TMP_SZ_acl extended permit tcp object-group TMP_SZ_Anti_Spoofing object-group Luthien_Galadriel object-group Omniback_Po rts access-list TMP_SZ_acl remark Remark --For Symantec Management DAT update ---SCRS 923 --- access-list TMP_SZ_acl extended permit tcp object-group TMP_SZ_Anti_Spoofing host Monitor-PC eq 38292 access-list TMP_SZ_acl extended permit udp object-group TMP_SZ_Anti_Spoofing host Monitor-PC object-group NAV_CLIENT_DAT access-list TMP_SZ_acl extended permit udp object-group TMP_SZ_Anti_Spoofing object-group Internal_DNS eq domain access-list TMP_SZ_acl extended permit tcp object-group TMP_SZ_Anti_Spoofing host Rodian object-group AD_TCP_Services access-list TMP_SZ_acl extended permit udp object-group TMP_SZ_Anti_Spoofing host Rodian object-group AD_UDP_Services access-list TMP_SZ_acl extended permit tcp object-group TMP_SZ_Anti_Spoofing host Rodian range 7000 7200 access-list TMP_SZ_acl extended permit tcp object-group TMP_SZ_Anti_Spoofing host Ackbar object-group AD_TCP_Services access-list TMP_SZ_acl extended permit udp object-group TMP_SZ_Anti_Spoofing host Ackbar object-group AD_UDP_Services access-list TMP_SZ_acl extended permit tcp object-group TMP_SZ_Anti_Spoofing host Ackbar range 7000 7200 access-list TMP_SZ_acl extended permit tcp object-group TMP_SZ_Anti_Spoofing host host_172_24_20_12 eq www access-list TMP_SZ_acl extended permit tcp host Iarwain host Trendmicro eq www access-list TMP_SZ_acl extended permit tcp host Iarwain host Orome eq lotusnotes access-list TMP_SZ_acl extended permit tcp host Iarwain host Orome eq www access-list TMP_SZ_acl extended permit tcp object-group TMP_SZ_Anti_Spoofing object-group HP_Mon_Hosts eq 135 access-list TMP_SZ_acl extended permit tcp object-group TMP_SZ_Anti_Spoofing object-group HP_Mon_Hosts range 381 383 access-list TMP_SZ_acl extended permit tcp object-group TMP_SZ_Anti_Spoofing object-group HP_Mon_Hosts range 10000 10200 access-list TMP_SZ_acl extended permit tcp object-group TMP_SZ_Anti_Spoofing object-group HP_Mon_Hosts range 14000 14010 access-list TMP_SZ_acl extended permit udp object-group TMP_SZ_Anti_Spoofing object-group HP_Mon_Hosts range snmp snmptrap access-list TMP_SZ_acl extended permit udp object-group TMP_SZ_Anti_Spoofing host HPMon3 range snmp snmptrap access-list TMP_SZ_acl extended permit icmp object-group TMP_SZ_Anti_Spoofing host HP_Pri_OVO_MgtSvr access-list TMP_SZ_acl extended permit icmp object-group TMP_SZ_Anti_Spoofing host HP_Sec_OVO_MgtSvr access-list TMP_SZ_acl extended permit icmp object-group TMP_SZ_Anti_Spoofing host HPMon3 access-list TMP_SZ_acl extended deny ip any any log access-list TMP_SZ1_acl remark As requested by Joshua & SCRS will be raised later upon completion. access-list TMP_SZ1_acl extended permit tcp host Dengar host HPMS2 object-group SAP_Client_Services access-list TMP_SZ1_acl extended permit tcp host Dengar host Sidaster object-group SAP_Apps_Port access-list TMP_SZ1_acl extended permit tcp host Tessek host Sidaster object-group SAP_Apps_Port access-list TMP_SZ1_acl extended permit tcp host Dengar object-group SAP_Clients eq lpd access-list TMP_SZ1_acl extended permit tcp host Dengar object-group SAP_Clients range 3200 3203 access-list TMP_SZ1_acl remark SCRS 1898 access-list TMP_SZ1_acl extended permit tcp host Dengar object-group SAP_Clients range 3300 3303 access-list TMP_SZ1_acl remark SCRS 1898 access-list TMP_SZ1_acl remark SCRS 1898 access-list TMP_SZ1_acl extended permit tcp host Dengar object-group SarApps_Svrs object-group SAP_NFS_Services access-list TMP_SZ1_acl remark SCRS 1898 access-list TMP_SZ1_acl extended permit tcp host Dengar object-group SarApps_Svrs object-group SAP_Apps_Ports access-list TMP_SZ1_acl remark SCRS 1898 access-list TMP_SZ1_acl extended permit tcp host Tessek object-group SarApps_Svrs object-group SAP_Apps_Ports access-list TMP_SZ1_acl remark FTP SERVICE TO MANWE. access-list TMP_SZ1_acl extended permit tcp object-group TMP_SZ1_Anti_Spoofing host ManWe range ftp-data ftp access-list TMP_SZ1_acl extended permit tcp host Tessek object-group CLL_CCL_CRL_BUs eq 3200 access-list TMP_SZ1_acl remark To access public internet via proxy. access-list TMP_SZ1_acl extended permit tcp object-group TMP_SZ1_Anti_Spoofing host Trendmicro eq www access-list TMP_SZ1_acl extended permit tcp object-group TMP_SZ1_Anti_Spoofing object-group Omniback_Svrs object-group OmniBackup access-list TMP_SZ1_acl extended permit tcp object-group TMP_SZ1_Anti_Spoofing object-group Luthien_Galadriel object-group OmniBacku p access-list TMP_SZ1_acl remark Remark --For Symantec Management DAT update ---SCRS 923 --- access-list TMP_SZ1_acl extended permit tcp object-group TMP_SZ1_Anti_Spoofing host Monitor-PC eq 38292 access-list TMP_SZ1_acl extended permit udp object-group TMP_SZ1_Anti_Spoofing host Monitor-PC object-group NAV_CLIENT_DAT access-list TMP_SZ1_acl extended permit tcp Acklay 255.255.255.254 host Dianoga eq sqlnet access-list TMP_SZ1_acl extended permit tcp object-group TMP_SZ1_Anti_Spoofing object-group Internal_DNS eq domain access-list TMP_SZ1_acl extended permit udp object-group TMP_SZ1_Anti_Spoofing object-group Internal_DNS eq domain access-list TMP_SZ1_acl extended permit tcp object-group TMP_SZ1_Anti_Spoofing host Rodian object-group AD_TCP_Services access-list TMP_SZ1_acl extended permit udp object-group TMP_SZ1_Anti_Spoofing host Rodian object-group AD_UDP_Services access-list TMP_SZ1_acl extended permit tcp object-group TMP_SZ1_Anti_Spoofing host Rodian range 7000 7200 access-list TMP_SZ1_acl extended permit tcp object-group TMP_SZ1_Anti_Spoofing host Ackbar object-group AD_TCP_Services access-list TMP_SZ1_acl extended permit udp object-group TMP_SZ1_Anti_Spoofing host Ackbar object-group AD_UDP_Services access-list TMP_SZ1_acl extended permit tcp object-group TMP_SZ1_Anti_Spoofing host Ackbar range 7000 7200 access-list TMP_SZ1_acl extended permit tcp object-group TMP_SZ1_Anti_Spoofing object-group HP_Mon_Hosts eq 135 access-list TMP_SZ1_acl extended permit tcp object-group TMP_SZ1_Anti_Spoofing object-group HP_Mon_Hosts range 381 383 access-list TMP_SZ1_acl extended permit tcp object-group TMP_SZ1_Anti_Spoofing object-group HP_Mon_Hosts range 10000 10200 access-list TMP_SZ1_acl extended permit tcp object-group TMP_SZ1_Anti_Spoofing object-group HP_Mon_Hosts range 14000 14010 access-list TMP_SZ1_acl extended permit udp object-group TMP_SZ1_Anti_Spoofing object-group HP_Mon_Hosts range snmp snmptrap access-list TMP_SZ1_acl extended permit udp object-group TMP_SZ1_Anti_Spoofing host HPMon3 range snmp snmptrap access-list TMP_SZ1_acl extended permit icmp object-group TMP_SZ1_Anti_Spoofing host HP_Pri_OVO_MgtSvr access-list TMP_SZ1_acl extended permit icmp object-group TMP_SZ1_Anti_Spoofing host HP_Sec_OVO_MgtSvr access-list TMP_SZ1_acl extended permit icmp object-group TMP_SZ1_Anti_Spoofing host HPMon3 access-list TMP_SZ1_acl extended permit tcp host Acklay host Dianoga eq sqlnet access-list TMP_SZ1_acl extended permit tcp Acklay 255.255.255.254 10.150.210.100 255.255.255.252 eq sqlnet access-list TMP_SZ1_acl extended permit tcp Acklay 255.255.255.254 10.150.210.100 255.255.255.252 eq 1522 access-list TMP_SZ1_acl extended permit tcp Acklay 255.255.255.254 10.150.210.100 255.255.255.252 eq 1523 access-list TMP_SZ1_acl extended deny ip any any log access-list STA_AS_acl extended permit tcp host SGSun 10.153.2.0 255.255.255.0 object-group HTTP_HTTPS access-list STA_AS_acl extended permit tcp host SGSun object-group SQLVenus_Group eq 1433 access-list STA_AS_acl extended permit tcp object-group STA_AS_Anti_Spoofing object-group SGDeimosX object-group AD_Replication access-list STA_AS_acl extended permit udp object-group STA_AS_Anti_Spoofing object-group SGDeimosX object-group AD_Replication access-list STA_AS_acl extended permit tcp object-group STA_AS_Anti_Spoofing object-group SGDeimosX eq 50000 access-list STA_AS_acl extended permit tcp host SGSun object-group FlamingoSMTPRelaySvr eq smtp access-list STA_AS_acl remark SCRS 2302 access-list STA_AS_acl extended permit tcp object-group SGTitanX host 10.153.120.12 object-group NetbiosTcpIP access-list STA_AS_acl remark SCRS 2127 access-list STA_AS_acl extended permit udp object-group SGTitanX object-group Ascott_Phillipine object-group NetbiosTcpIP access-list STA_AS_acl remark FTP SERVICE TO MANWE. access-list STA_AS_acl extended permit tcp object-group STA_AS_Anti_Spoofing host ManWe range ftp-data ftp access-list STA_AS_acl remark SCRS 1828 access-list STA_AS_acl extended permit tcp object-group SGTitanX host 10.153.46.12 object-group NetbiosTcpIP access-list STA_AS_acl remark SCRS 1557 access-list STA_AS_acl extended permit ip object-group SGTitanX host 10.153.2.28 access-list STA_AS_acl remark SCRS 1557 access-list STA_AS_acl extended permit udp object-group SGTitanX host 10.153.2.12 object-group NetbiosTcpIP access-list STA_AS_acl remark SCRS 1557 access-list STA_AS_acl extended permit tcp object-group SGTitanX object-group CHN_Oracle_Printing object-group NetbiosTcpIP access-list STA_AS_acl remark SCRS 1557 access-list STA_AS_acl extended permit udp object-group SGTitanX object-group CHN_Oracle_Printing object-group NetbiosTcpIP access-list STA_AS_acl remark access-list STA_AS_acl extended permit tcp object-group SGTitanX host Bigatom object-group Omniback_Ports access-list STA_AS_acl remark To access public internet via proxy. access-list STA_AS_acl extended permit tcp STA_AS_Subnet 255.255.255.192 host Trendmicro eq www access-list STA_AS_acl extended permit tcp object-group SGTitanX object-group AS_Oversea_Printservers object-group NetbiosTcpIP access-list STA_AS_acl extended permit udp object-group SGTitanX object-group AS_Oversea_Printservers object-group NetbiosTcpIP access-list STA_AS_acl extended permit tcp STA_AS_Subnet 255.255.255.192 object-group Omniback_Svrs object-group OmniBackup access-list STA_AS_acl extended permit tcp STA_AS_Subnet 255.255.255.192 object-group Luthien_Galadriel object-group OmniBackup access-list STA_AS_acl remark Remark ---For Symantec Management DAT update ---SCRS 923--- access-list STA_AS_acl extended permit tcp STA_AS_Subnet 255.255.255.192 host SGDeimos2 eq 38292 access-list STA_AS_acl extended permit udp STA_AS_Subnet 255.255.255.192 host SGDeimos2 object-group NAV_CLIENT_DAT access-list STA_AS_acl extended permit tcp object-group SGTitanX host AscottExchange3 eq smtp access-list STA_AS_acl extended permit tcp object-group SGTitanX host AscottExchange3 eq https access-list STA_AS_acl extended permit tcp object-group SGTitanX host AscottExchange3 eq 993 access-list STA_AS_acl extended permit udp object-group SGTitanX host AscottExchange3 eq 993 access-list STA_AS_acl extended permit tcp object-group SGTitanX host Flamingo_SMTPRelay eq smtp access-list STA_AS_acl extended permit tcp object-group SGTitanX host SMTP_Relay_Server eq smtp access-list STA_AS_acl extended permit tcp object-group SGTitanX host SGpluto1 eq 135 access-list STA_AS_acl extended permit tcp object-group SGTitanX host SGpluto1 range 137 netbios-ssn access-list STA_AS_acl extended permit udp object-group SGTitanX host SGpluto1 range netbios-ns 139 access-list STA_AS_acl extended permit tcp object-group SGTitanX host SGpluto1 eq 445 access-list STA_AS_acl extended permit tcp object-group SGTitanX host 10.153.2.28 eq 135 access-list STA_AS_acl extended permit tcp object-group SGTitanX host 10.153.2.28 range 137 netbios-ssn access-list STA_AS_acl extended permit udp object-group SGTitanX host 10.153.2.28 range netbios-ns 139 access-list STA_AS_acl extended permit tcp object-group SGTitanX host 10.153.2.28 eq 445 access-list STA_AS_acl extended permit tcp object-group SGTitanX host SGpluto1 eq lpd access-list STA_AS_acl extended permit tcp object-group SGTitanX host 10.153.2.28 eq lpd access-list STA_AS_acl extended permit tcp SGTitan1 255.255.255.254 object-group SGDeimosX eq domain access-list STA_AS_acl extended permit udp SGTitan1 255.255.255.254 object-group SGDeimosX eq domain access-list STA_AS_acl extended permit tcp object-group SGTitanX object-group SGDeimosX object-group AD_TCP_Services access-list STA_AS_acl extended permit udp object-group SGTitanX object-group SGDeimosX object-group AD_UDP_Services access-list STA_AS_acl extended permit tcp object-group SGTitanX object-group SGDeimosX eq 1026 access-list STA_AS_acl extended permit tcp object-group SGTitanX object-group SGOrionX eq 135 access-list STA_AS_acl extended permit tcp object-group SGTitanX object-group SGOrionX range 137 netbios-ssn access-list STA_AS_acl extended permit udp object-group SGTitanX object-group SGOrionX range netbios-ns 139 access-list STA_AS_acl extended permit tcp object-group SGTitanX object-group SGOrionX eq 445 access-list STA_AS_acl extended permit tcp SGTitan1 255.255.255.254 object-group SGOrionX range 8000 8002 access-list STA_AS_acl extended permit tcp object-group SGTitanX object-group SGOrionX object-group Internet_Services access-list STA_AS_acl extended permit tcp object-group SGTitanX object-group SGOrionX range 9000 9002 access-list STA_AS_acl extended permit tcp object-group SGTitanX object-group SGOrionX eq sqlnet access-list STA_AS_acl extended permit tcp object-group SGTitanX object-group SGOrionX range 1522 1523 access-list STA_AS_acl extended permit tcp object-group STA_AS_Anti_Spoofing object-group HP_Mon_Hosts eq 135 access-list STA_AS_acl extended permit tcp object-group STA_AS_Anti_Spoofing object-group HP_Mon_Hosts range 381 383 access-list STA_AS_acl extended permit tcp object-group STA_AS_Anti_Spoofing object-group HP_Mon_Hosts range 10000 10200 access-list STA_AS_acl extended permit tcp object-group STA_AS_Anti_Spoofing object-group HP_Mon_Hosts range 14000 14010 access-list STA_AS_acl extended permit udp object-group STA_AS_Anti_Spoofing object-group HP_Mon_Hosts range snmp snmptrap access-list STA_AS_acl extended permit udp object-group STA_AS_Anti_Spoofing host HPMon3 range snmp snmptrap access-list STA_AS_acl extended permit icmp object-group STA_AS_Anti_Spoofing host HP_Pri_OVO_MgtSvr access-list STA_AS_acl extended permit icmp object-group STA_AS_Anti_Spoofing host HP_Sec_OVO_MgtSvr access-list STA_AS_acl extended permit icmp object-group STA_AS_Anti_Spoofing host HPMon3 access-list STA_AS_acl extended deny ip any any log access-list CCL_AS_acl remark Joshua will follow up with SCRS. access-list CCL_AS_acl extended permit tcp host CCL_Bishop host HPMS2 eq ftp access-list CCL_AS_acl remark Joshua will follow up with SCRS. access-list CCL_AS_acl extended permit tcp host CCL_Bishop host HPMS2 eq 990 access-list CCL_AS_acl remark Joshua will follow up with SCRS. access-list CCL_AS_acl extended permit tcp host CCL_Bishop host HPMS2 range 3000 3099 access-list CCL_AS_acl extended permit ip host Cosmo_ host Rodian access-list CCL_AS_acl extended permit tcp host Cosmo_ host Flamingo_SMTPRelay eq smtp access-list CCL_AS_acl remark FTP SERVICE TO MANWE. access-list CCL_AS_acl extended permit tcp object-group CCL_AS_Anti_Spoofing host ManWe range ftp-data ftp access-list CCL_AS_acl remark To access public internet via proxy. access-list CCL_AS_acl extended permit tcp object-group CCL_AS_Anti_Spoofing host Trendmicro eq www access-list CCL_AS_acl remark access-list CCL_AS_acl remark remark Access to Postman201--------------------------------- access-list CCL_AS_acl remark Remark ---For Omniback to Commercial Staging Zone--- access-list CCL_AS_acl extended permit tcp object-group CCL_AS_Anti_Spoofing object-group Omniback_Svrs object-group OmniBackup access-list CCL_AS_acl remark Remark ---For Omniback to Commercial Staging Zone--- access-list CCL_AS_acl extended permit tcp object-group CCL_AS_Anti_Spoofing object-group Luthien_Galadriel object-group OmniBackup access-list CCL_AS_acl remark For Symantec Management DAT update ---SCRS 923--- access-list CCL_AS_acl extended permit tcp object-group CCL_AS_Anti_Spoofing host Monitor-PC eq 38292 access-list CCL_AS_acl extended permit udp object-group CCL_AS_Anti_Spoofing host Monitor-PC object-group NAV_CLIENT_DAT access-list CCL_AS_acl extended permit tcp object-group CCL_AS_Anti_Spoofing host Phoenix eq ldap access-list CCL_AS_acl remark Remark -- Access to internal DNS-- access-list CCL_AS_acl extended permit udp object-group CCL_AS_Anti_Spoofing object-group Internal_DNS eq domain access-list CCL_AS_acl remark Remark -- Bishop access to AD - Rodian-- access-list CCL_AS_acl extended permit tcp object-group CCL_AS_Anti_Spoofing host Rodian object-group AD_TCP_Services access-list CCL_AS_acl extended permit udp object-group CCL_AS_Anti_Spoofing host Rodian object-group AD_UDP_Services access-list CCL_AS_acl extended permit tcp object-group CCL_AS_Anti_Spoofing host Rodian range 7000 7200 access-list CCL_AS_acl remark Remark -- CCL VLAN access to AD - Ackbar-- access-list CCL_AS_acl extended permit tcp object-group CCL_AS_Anti_Spoofing host Ackbar object-group AD_TCP_Services access-list CCL_AS_acl remark access-list CCL_AS_acl extended permit udp object-group CCL_AS_Anti_Spoofing host Ackbar object-group AD_UDP_Services access-list CCL_AS_acl remark access-list CCL_AS_acl extended permit tcp object-group CCL_AS_Anti_Spoofing host Ackbar range 7000 7200 access-list CCL_AS_acl remark remark Access to Postman201--------------------------------- access-list CCL_AS_acl extended permit tcp host CCL_Bishop host Postman201-smts eq smtp access-list CCL_AS_acl extended permit tcp object-group CCL_AS_Anti_Spoofing object-group HP_Mon_Hosts eq 135 access-list CCL_AS_acl extended permit tcp object-group CCL_AS_Anti_Spoofing object-group HP_Mon_Hosts range 381 383 access-list CCL_AS_acl extended permit tcp object-group CCL_AS_Anti_Spoofing object-group HP_Mon_Hosts range 10000 10200 access-list CCL_AS_acl extended permit tcp object-group CCL_AS_Anti_Spoofing host HPMon3 range 10000 10200 access-list CCL_AS_acl extended permit tcp object-group CCL_AS_Anti_Spoofing object-group HP_Mon_Hosts range 14000 14010 access-list CCL_AS_acl extended permit udp object-group CCL_AS_Anti_Spoofing object-group HP_Mon_Hosts range snmp snmptrap access-list CCL_AS_acl extended permit udp object-group CCL_AS_Anti_Spoofing host HPMon3 range snmp snmptrap access-list CCL_AS_acl extended permit icmp object-group CCL_AS_Anti_Spoofing host HP_Pri_OVO_MgtSvr access-list CCL_AS_acl extended permit icmp object-group CCL_AS_Anti_Spoofing host HP_Sec_OVO_MgtSvr access-list CCL_AS_acl extended permit icmp object-group CCL_AS_Anti_Spoofing host HPMon3 access-list CCL_AS_acl extended permit icmp object-group CCL_AS_Anti_Spoofing host HP_Pri_OVO_MgtSvr echo-reply access-list CCL_AS_acl extended permit icmp object-group CCL_AS_Anti_Spoofing host HP_Sec_OVO_MgtSvr echo-reply access-list CCL_AS_acl extended permit icmp object-group CCL_AS_Anti_Spoofing host HPMon3 echo-reply access-list CCL_AS_acl extended deny ip any any log access-list TMP_CM_acl extended permit tcp host Gambit host HPMS2 eq https access-list TMP_CM_acl remark SCRS 2291 access-list TMP_CM_acl extended permit tcp host Gambit host HPMS2 object-group SAP_Client_Services access-list TMP_CM_acl extended permit tcp host Gambit host Frixgrizz object-group SAP_Client_Services access-list TMP_CM_acl extended permit icmp host Phoenix 10.154.34.0 255.255.255.0 echo-reply access-list TMP_CM_acl remark FTP SERVICE TO MANWE. access-list TMP_CM_acl extended permit tcp object-group TMP_CM_Anti_Spoofing host ManWe range ftp-data ftp access-list TMP_CM_acl extended permit tcp host Phoenix host Trance eq 9005 access-list TMP_CM_acl extended permit tcp host Phoenix host Ackbar eq ldap access-list TMP_CM_acl extended permit udp host Phoenix host Ackbar eq 427 access-list TMP_CM_acl extended permit tcp host Phoenix host Ackbar eq 524 access-list TMP_CM_acl extended permit tcp host Phoenix host Ackbar eq 8000 access-list TMP_CM_acl extended permit tcp host Phoenix host Ackbar eq 8090 access-list TMP_CM_acl remark To access public internet via proxy. access-list TMP_CM_acl extended permit tcp TMP_CM_Subnet 255.255.255.240 host Trendmicro eq www access-list TMP_CM_acl extended permit tcp host Iceman host Holocam object-group HTTP_HTTPS access-list TMP_CM_acl extended permit tcp host Iceman host Holocam object-group Citrix_Svcs access-list TMP_CM_acl extended permit tcp host Iceman host Rodian object-group AD_TCP_Services access-list TMP_CM_acl extended permit udp host Iceman host Rodian object-group AD_UDP_Services access-list TMP_CM_acl extended permit tcp host Iceman host Rodian object-group HTTP_HTTPS access-list TMP_CM_acl extended permit tcp host Iceman host Orome object-group Novell_TCP_UDP_Svcs access-list TMP_CM_acl extended permit tcp host Iceman host Arien object-group Novell_TCP_UDP_Svcs access-list TMP_CM_acl extended permit tcp host Iceman host Yavin object-group HTTP_HTTPS access-list TMP_CM_acl extended permit tcp host Iceman host Yavin object-group Citrix_Svcs access-list TMP_CM_acl remark Remark ---Omniback to Commercial Servers--- access-list TMP_CM_acl extended permit tcp TMP_CM_Subnet 255.255.255.240 object-group Omniback_Svrs object-group OmniBackup access-list TMP_CM_acl remark Remark ---Omniback to Commercial Servers--- access-list TMP_CM_acl extended permit tcp TMP_CM_Subnet 255.255.255.240 object-group Luthien_Galadriel object-group OmniBackup access-list TMP_CM_acl extended permit tcp host Cyclops 10.200.0.0 255.254.0.0 eq lotusnotes access-list TMP_CM_acl remark Remark ----CCL Citrix Farm to access AMOS,IRIS Applications---SCRS 941--- access-list TMP_CM_acl extended permit tcp object-group CCL_DC_Citrix_Svrs host CCL_Bishop eq www access-list TMP_CM_acl extended permit tcp object-group CCL_DC_Citrix_Svrs host CCL_Bishop eq citrix-ica access-list TMP_CM_acl extended permit tcp object-group CCL_DC_Citrix_Svrs object-group Intranet_Citrix_Svrs eq www access-list TMP_CM_acl extended permit tcp object-group CCL_DC_Citrix_Svrs object-group Intranet_Citrix_Svrs eq citrix-ica access-list TMP_CM_acl extended permit tcp object-group CCL_DC_Citrix_Svrs object-group Intranet_Citrix_Svrs eq 2512 access-list TMP_CM_acl extended permit tcp object-group CCL_DC_Citrix_Svrs host CCL_Rogue eq www access-list TMP_CM_acl extended permit tcp object-group CCL_DC_Citrix_Svrs host CCL_Rogue eq citrix-ica access-list TMP_CM_acl extended permit tcp object-group CCL_DC_Citrix_Svrs host CCL_Rogue eq 2512 access-list TMP_CM_acl extended permit tcp host Iceman host Arien eq 524 access-list TMP_CM_acl extended permit tcp host Iceman host Dazzler eq 1433 access-list TMP_CM_acl extended permit tcp host Iceman host Orome eq 524 access-list TMP_CM_acl extended permit tcp host Iceman host Evanzan eq www access-list TMP_CM_acl extended permit tcp host Iceman host Evanzon eq www access-list TMP_CM_acl extended permit tcp host Iceman host Rodian eq www access-list TMP_CM_acl extended permit tcp host Iceman host Rodian eq https access-list TMP_CM_acl extended permit tcp host Havok host Arien eq ldap access-list TMP_CM_acl extended permit tcp host Havok host Arien eq 524 access-list TMP_CM_acl extended permit tcp host Havok host Rodian eq www access-list TMP_CM_acl remark Remark --Iceman to access Bishop via port 1433 access-list TMP_CM_acl extended permit tcp host Iceman host CCL_Bishop eq 1433 access-list TMP_CM_acl remark Remark --AMOS, IRIS applications access-list TMP_CM_acl extended permit tcp host Iceman host CCL_Bishop range 9000 9009 access-list TMP_CM_acl extended permit tcp host 10.61.12.203 host Arien eq 524 access-list TMP_CM_acl extended permit udp host 10.61.12.203 host Arien eq ntp access-list TMP_CM_acl extended permit udp host 10.61.12.203 host Arien eq 524 access-list TMP_CM_acl extended permit ip host 10.61.12.203 host Arien access-list TMP_CM_acl remark Remark --For NAV Client to update DAT from NAV Server --SCRS 923-- access-list TMP_CM_acl extended permit tcp TMP_CM_Subnet 255.255.255.240 host Monitor-PC eq 38292 access-list TMP_CM_acl extended permit udp TMP_CM_Subnet 255.255.255.240 host Monitor-PC object-group NAV_CLIENT_DAT access-list TMP_CM_acl remark Remark ---Commercial servers DNS access --- access-list TMP_CM_acl extended permit udp TMP_CM_Subnet 255.255.255.240 object-group Internal_DNS eq domain access-list TMP_CM_acl remark Remark ---Commercial servers AD access to Rodian --- access-list TMP_CM_acl extended permit tcp TMP_CM_Subnet 255.255.255.240 host Rodian object-group AD_TCP_Services access-list TMP_CM_acl extended permit udp TMP_CM_Subnet 255.255.255.240 host Rodian object-group AD_UDP_Services access-list TMP_CM_acl extended permit tcp TMP_CM_Subnet 255.255.255.240 host Rodian range 7000 7200 access-list TMP_CM_acl remark Remark ---Commercial servers AD access to Ackbar --- access-list TMP_CM_acl extended permit tcp TMP_CM_Subnet 255.255.255.240 host Ackbar object-group AD_TCP_Services access-list TMP_CM_acl remark access-list TMP_CM_acl extended permit udp TMP_CM_Subnet 255.255.255.240 host Ackbar object-group AD_UDP_Services access-list TMP_CM_acl remark access-list TMP_CM_acl extended permit tcp TMP_CM_Subnet 255.255.255.240 host Ackbar range 7000 7200 access-list TMP_CM_acl extended permit tcp host Phoenix host Rodian eq ldap access-list TMP_CM_acl extended permit tcp host Phoenix Comm_BU_Net 255.255.0.0 eq lpd access-list TMP_CM_acl extended permit icmp host Phoenix host Orome access-list TMP_CM_acl extended permit icmp host Phoenix host Arien access-list TMP_CM_acl remark Remark ---Phonenix NCP access to Arien --- access-list TMP_CM_acl extended permit tcp host Phoenix host Arien eq 524 access-list TMP_CM_acl extended permit udp host Phoenix host Arien eq ntp access-list TMP_CM_acl extended permit udp host Phoenix host Arien eq 524 access-list TMP_CM_acl remark Remark ---Orome NCP access to Arien --- access-list TMP_CM_acl extended permit tcp host Phoenix host Orome eq 524 access-list TMP_CM_acl remark Remark ---Orome NCP access to Arien --- access-list TMP_CM_acl extended permit udp host Phoenix host Orome eq ntp access-list TMP_CM_acl remark Remark ---Orome NCP access to Arien --- access-list TMP_CM_acl extended permit udp host Phoenix host Orome eq 524 access-list TMP_CM_acl extended permit udp host Phoenix object-group SBU_Novell_Servers eq ntp access-list TMP_CM_acl remark Remark ---Phoenix NCP access to SBU Novell Servers --- access-list TMP_CM_acl extended permit tcp host Phoenix object-group SBU_Novell_Servers eq 524 access-list TMP_CM_acl remark Remark ---Phoenix NCP access to SBU Novell Servers --- access-list TMP_CM_acl extended permit udp host Phoenix object-group SBU_Novell_Servers eq 524 access-list TMP_CM_acl remark remark For Citrix servers to access Aumida --SCRS 746-- access-list TMP_CM_acl extended permit tcp host Havok host Aumida eq www access-list TMP_CM_acl extended permit tcp host Havok host Aumida eq https access-list TMP_CM_acl extended permit tcp host Iceman host Aumida eq www access-list TMP_CM_acl extended permit tcp host Iceman host Aumida eq https access-list TMP_CM_acl remark access-list TMP_CM_acl extended permit tcp host Gambit host Magneto object-group NetbiosTcpIP access-list TMP_CM_acl extended permit tcp object-group TMP_CM_Anti_Spoofing object-group HP_Mon_Hosts eq 135 access-list TMP_CM_acl extended permit tcp object-group TMP_CM_Anti_Spoofing object-group HP_Mon_Hosts range 381 383 access-list TMP_CM_acl extended permit tcp object-group TMP_CM_Anti_Spoofing object-group HP_Mon_Hosts range 10000 10200 access-list TMP_CM_acl extended permit tcp object-group TMP_CM_Anti_Spoofing object-group HP_Mon_Hosts range 14000 14010 access-list TMP_CM_acl extended permit udp object-group TMP_CM_Anti_Spoofing object-group HP_Mon_Hosts range snmp snmptrap access-list TMP_CM_acl extended permit udp object-group TMP_CM_Anti_Spoofing host HPMon3 range snmp snmptrap access-list TMP_CM_acl extended permit icmp object-group TMP_CM_Anti_Spoofing host HP_Pri_OVO_MgtSvr access-list TMP_CM_acl extended permit icmp object-group TMP_CM_Anti_Spoofing host HP_Sec_OVO_MgtSvr access-list TMP_CM_acl extended permit icmp object-group TMP_CM_Anti_Spoofing host HPMon3 access-list TMP_CM_acl extended permit tcp host Havok host Postman201-smts eq smtp access-list TMP_CM_acl extended permit tcp host Iceman host Postman201-smts eq smtp access-list TMP_CM_acl extended permit tcp host Havok host Flamingo_SMTPRelay eq smtp access-list TMP_CM_acl extended permit tcp host Iceman host Flamingo_SMTPRelay eq smtp access-list TMP_CM_acl remark access-list TMP_CM_acl extended deny ip any any log access-list DCB_CM_access_in remark SCRS 2377 access-list DCB_CM_access_in extended permit tcp host Colossus host Flamingo_SMTPRelay eq smtp access-list DCB_CM_access_in extended permit tcp host Colossus host 10.61.12.95 eq https access-list DCB_CM_access_in extended permit tcp host Colossus host 10.61.12.95 object-group SAP_Client_Services access-list DCB_CM_access_in remark SCRS 2144 access-list DCB_CM_access_in extended permit tcp host Corsair object-group CCL_Retail_Nets_Mgp eq 8080 access-list DCB_CM_access_in remark SCRS 2144 access-list DCB_CM_access_in extended permit tcp host Trance object-group CCL_Retail_Nets_Mgp eq 8080 access-list DCB_CM_access_in remark SCRS 2144 access-list DCB_CM_access_in extended permit tcp host Corsair object-group CCL_Retail_Nets eq 8080 access-list DCB_CM_access_in remark SCRS 2144 access-list DCB_CM_access_in extended permit tcp host Trance object-group CCL_Retail_Nets eq 8080 access-list DCB_CM_access_in remark SCRS 2237 access-list DCB_CM_access_in extended permit tcp host Colossus host Frixgrizz object-group SAP_Client_Services access-list DCB_CM_access_in extended permit tcp host Colossus host 10.154.65.66 object-group Netbios_TCP access-list DCB_CM_access_in extended permit udp host Colossus host 10.154.65.66 object-group Netbios_UDP access-list DCB_CM_access_in extended permit tcp host Corsair host Caliban eq 1433 access-list DCB_CM_access_in extended permit tcp host Elixir host Rodian object-group HTTP_HTTPS access-list DCB_CM_access_in extended permit tcp host Cosmo host Rodian object-group HTTP_HTTPS access-list DCB_CM_access_in extended permit tcp host Cosmo host CCL_Bishop eq 1433 access-list DCB_CM_access_in extended permit tcp object-group Elixir_Cosmo host Flamingo_SMTPRelay eq smtp access-list DCB_CM_access_in extended permit tcp host Elixir host Caliban eq 1433 access-list DCB_CM_access_in extended permit tcp host Corsair host Phoenix eq ldap access-list DCB_CM_access_in remark AIMOS autheutication. access-list DCB_CM_access_in remark AIMOS autheutication. access-list DCB_CM_access_in remark AIMOS autheutication. access-list DCB_CM_access_in remark AIMOS autheutication. access-list DCB_CM_access_in extended permit tcp host Corsair host Gambit eq 9000 access-list DCB_CM_access_in remark AIMOS autheutication. access-list DCB_CM_access_in extended permit tcp host Corsair host Gambit eq ldap access-list DCB_CM_access_in remark AIMOS autheutication. access-list DCB_CM_access_in extended permit tcp host Corsair host Gambit eq 9004 access-list DCB_CM_access_in remark AIMOS autheutication. access-list DCB_CM_access_in extended permit tcp host Corsair host Phoenix eq 9004 access-list DCB_CM_access_in remark AIMOS autheutication. access-list DCB_CM_access_in extended permit tcp host Corsair host Phoenix eq 9000 access-list DCB_CM_access_in remark AIMOS autheutication. access-list DCB_CM_access_in extended permit tcp host Trance host Phoenix eq 9004 access-list DCB_CM_access_in remark AIMOS autheutication. access-list DCB_CM_access_in extended permit tcp host Trance host Phoenix eq 9000 access-list DCB_CM_access_in remark AIMOS autheutication. access-list DCB_CM_access_in extended permit tcp host Trance host Phoenix eq ldap access-list DCB_CM_access_in remark FTP SERVICE TO MANWE. access-list DCB_CM_access_in extended permit tcp object-group DCB_CM_Anti_Spoofing host ManWe range ftp-data ftp access-list DCB_CM_access_in extended permit tcp object-group DCB_CM_Anti_Spoofing host Rodian object-group AD_TCP_Services access-list DCB_CM_access_in extended permit udp object-group DCB_CM_Anti_Spoofing host Rodian object-group AD_UDP_Services access-list DCB_CM_access_in extended permit tcp object-group DCB_CM_Anti_Spoofing host Rodian range 7000 7200 access-list DCB_CM_access_in extended permit tcp object-group DCB_CM_Anti_Spoofing host Ackbar object-group AD_TCP_Services access-list DCB_CM_access_in extended permit udp object-group DCB_CM_Anti_Spoofing host Ackbar object-group AD_UDP_Services access-list DCB_CM_access_in extended permit tcp object-group DCB_CM_Anti_Spoofing host Ackbar range 7000 7200 access-list DCB_CM_access_in extended permit udp object-group DCB_CM_Anti_Spoofing object-group Internal_DNS eq domain access-list DCB_CM_access_in remark Omniback by Luthien & Galadriel access-list DCB_CM_access_in extended permit tcp object-group DCB_CM_Anti_Spoofing object-group Omniback_Svrs object-group Omniback_ Ports access-list DCB_CM_access_in remark Omniback by Luthien & Galadriel access-list DCB_CM_access_in extended permit tcp object-group DCB_CM_Anti_Spoofing object-group Luthien_Galadriel object-group Omnib ack_Ports access-list DCB_CM_access_in extended permit tcp object-group DCB_CM_Anti_Spoofing host Trendmicro eq www access-list DCB_CM_access_in remark HP Monitoring Ports/Services access-list DCB_CM_access_in extended permit tcp object-group DCB_CM_Anti_Spoofing object-group HP_Mon_Hosts eq 135 access-list DCB_CM_access_in extended permit tcp object-group DCB_CM_Anti_Spoofing host HP_MWA_Mgt_Svr range 381 383 access-list DCB_CM_access_in remark access-list DCB_CM_access_in extended permit tcp object-group DCB_CM_Anti_Spoofing host HP_CODA_Mgt_Svr range 381 383 access-list DCB_CM_access_in remark access-list DCB_CM_access_in extended permit tcp object-group DCB_CM_Anti_Spoofing host HP_Pri_OVO_MgtSvr range 10000 10200 access-list DCB_CM_access_in remark access-list DCB_CM_access_in extended permit tcp object-group DCB_CM_Anti_Spoofing host HP_Sec_OVO_MgtSvr range 10000 10200 access-list DCB_CM_access_in remark access-list DCB_CM_access_in extended permit tcp object-group DCB_CM_Anti_Spoofing object-group HP_Mon_Hosts range 14000 14010 access-list DCB_CM_access_in remark access-list DCB_CM_access_in extended permit udp object-group DCB_CM_Anti_Spoofing host HP_Pri_OVO_MgtSvr range snmp snmptrap access-list DCB_CM_access_in remark access-list DCB_CM_access_in extended permit udp object-group DCB_CM_Anti_Spoofing host HP_Sec_OVO_MgtSvr range snmp snmptrap access-list DCB_CM_access_in remark access-list DCB_CM_access_in extended permit udp object-group DCB_CM_Anti_Spoofing host HPMon3 range snmp snmptrap access-list DCB_CM_access_in remark access-list DCB_CM_access_in extended permit icmp object-group DCB_CM_Anti_Spoofing host HP_Pri_OVO_MgtSvr access-list DCB_CM_access_in remark access-list DCB_CM_access_in extended permit icmp object-group DCB_CM_Anti_Spoofing host HP_Sec_OVO_MgtSvr access-list DCB_CM_access_in remark access-list DCB_CM_access_in extended permit icmp object-group DCB_CM_Anti_Spoofing host HPMon3 access-list DCB_CM_access_in remark access-list DCB_CM_access_in remark access-list DCB_CM_access_in remark access-list DCB_CM_access_in extended deny ip any any log access-list DCB_AS_acl extended permit tcp object-group SGmars1-2 10.153.2.0 255.255.255.0 object-group HTTP_HTTPS access-list DCB_AS_acl extended permit tcp host SGMars1 object-group FlamingoSMTPRelaySvr eq smtp access-list DCB_AS_acl extended permit tcp host SGMars2 object-group FlamingoSMTPRelaySvr eq smtp access-list DCB_AS_acl extended permit tcp host 10.150.131.129 host Trendmicro object-group HTTP_HTTPS access-list DCB_AS_acl extended permit tcp object-group DCB_AS_Anti_Spoofing object-group SGDeimosX eq 50000 access-list DCB_AS_acl extended permit udp object-group DCB_AS_Anti_Spoofing object-group SGDeimosX object-group AD_Replication access-list DCB_AS_acl extended permit tcp object-group DCB_AS_Anti_Spoofing object-group SGDeimosX object-group AD_Replication access-list DCB_AS_acl extended permit icmp object-group DCB_AS_Anti_Spoofing host HPMon3 echo-reply access-list DCB_AS_acl extended permit udp object-group SGCalypso3-8 host 10.153.120.12 object-group NetbiosTcpIP access-list DCB_AS_acl extended permit tcp object-group SGCalypso3-8 Ascott_BU_Net 255.255.0.0 object-group Netbios_TCP access-list DCB_AS_acl extended permit udp object-group SGCalypso3-8 Ascott_BU_Net 255.255.0.0 object-group Netbios_UDP access-list DCB_AS_acl remark SCRS 2302 access-list DCB_AS_acl remark SCRS 2302 access-list DCB_AS_acl extended permit tcp object-group SGCalypso3-8 Ascott_Dubai 255.255.255.0 object-group NetbiosTcpIP access-list DCB_AS_acl extended permit udp object-group SGCalypso3-8 AS_Paris_Net 255.255.255.0 object-group Netbios_UDP access-list DCB_AS_acl extended permit tcp object-group SGCalypso3-8 AS_Paris_Net 255.255.255.0 object-group Netbios_TCP access-list DCB_AS_acl remark SCRS 2127 access-list DCB_AS_acl extended permit tcp object-group SGCalypso3-8 object-group Ascott_Phillipine object-group NetbiosTcpIP access-list DCB_AS_acl remark SCRS 2302 access-list DCB_AS_acl extended permit tcp object-group SGOrionX host 10.153.120.12 object-group NetbiosTcpIP access-list DCB_AS_acl remark SCRS 2127 access-list DCB_AS_acl extended permit tcp object-group SGOrionX object-group Ascott_Phillipine object-group NetbiosTcpIP access-list DCB_AS_acl remark FTP SERVICE TO MANWE. access-list DCB_AS_acl extended permit tcp object-group DCB_AS_Anti_Spoofing host ManWe range ftp-data ftp access-list DCB_AS_acl extended permit tcp object-group SGCalypso3-8 10.153.46.0 255.255.255.0 object-group NetbiosTcpIP access-list DCB_AS_acl remark SCRS 1828 access-list DCB_AS_acl extended permit tcp object-group SGCalypso3-8 host 10.153.46.12 object-group NetbiosTcpIP access-list DCB_AS_acl remark SCRS 1828 access-list DCB_AS_acl remark SCRS 1557 access-list DCB_AS_acl extended permit udp object-group SGOrionX object-group CHN_Oracle_Printing object-group NetbiosTcpIP access-list DCB_AS_acl remark SCRS 1557 access-list DCB_AS_acl extended permit tcp object-group SGOrionX object-group CHN_Oracle_Printing object-group NetbiosTcpIP access-list DCB_AS_acl remark SCRS 1828 access-list DCB_AS_acl extended permit tcp object-group SGOrionX host 10.153.46.12 object-group NetbiosTcpIP access-list DCB_AS_acl remark For GPO propagation from SGDeimosX. access-list DCB_AS_acl extended permit icmp object-group SGCalypso3-8 object-group SGDeimosX access-list DCB_AS_acl remark SCRS 1294 access-list DCB_AS_acl extended permit tcp host 10.150.131.109 host Ariel eq 1433 access-list DCB_AS_acl remark SCRS 1294 access-list DCB_AS_acl extended permit icmp host 10.150.131.109 host HPMon3 echo-reply access-list DCB_AS_acl remark To access public internet via proxy. access-list DCB_AS_acl extended permit tcp DCB_AS_Subnet 255.255.255.0 host Trendmicro eq www access-list DCB_AS_acl remark SCRS 1285 access-list DCB_AS_acl extended permit tcp object-group SGCalypso5-8 object-group Ascott_Thailand object-group NetbiosTcpIP access-list DCB_AS_acl remark SCRS 1285 access-list DCB_AS_acl extended permit tcp object-group SGCalypso5-8 object-group Ascott_Thailand object-group Citrix_Svcs access-list DCB_AS_acl extended permit udp object-group SGOrionX object-group AS_Oversea_Printservers object-group NetbiosTcpIP access-list DCB_AS_acl extended permit tcp object-group SGOrionX object-group AS_Oversea_Printservers object-group NetbiosTcpIP access-list DCB_AS_acl remark SCRS 1048 access-list DCB_AS_acl extended permit tcp object-group SGCalypso3-8 host Ariel eq 1433 access-list DCB_AS_acl extended permit tcp SGCalypso6 255.255.255.252 Ascott_BU_Net 255.255.0.0 eq 137 access-list DCB_AS_acl extended permit tcp SGCalypso6 255.255.255.252 Ascott_BU_Net 255.255.0.0 eq netbios-ssn access-list DCB_AS_acl extended permit tcp SGCalypso6 255.255.255.252 Ascott_BU_Net 255.255.0.0 eq 445 access-list DCB_AS_acl extended permit tcp SGCalypso8 255.255.255.254 Ascott_BU_Net 255.255.0.0 eq 137 access-list DCB_AS_acl extended permit tcp SGCalypso8 255.255.255.254 Ascott_BU_Net 255.255.0.0 eq netbios-ssn access-list DCB_AS_acl extended permit tcp SGCalypso8 255.255.255.254 Ascott_BU_Net 255.255.0.0 eq 445 access-list DCB_AS_acl extended permit udp SGCalypso8 255.255.255.254 Ascott_BU_Net 255.255.0.0 range netbios-ns netbios-dgm access-list DCB_AS_acl extended permit tcp SGCalypso8 255.255.255.254 Ascott_BU_Net 255.255.0.0 eq citrix-ica access-list DCB_AS_acl extended permit udp SGCalypso8 255.255.255.254 Ascott_BU_Net 255.255.0.0 eq 1604 access-list DCB_AS_acl extended permit tcp SGCalypso8 255.255.255.254 Ascott_BU_Net 255.255.0.0 eq 2513 access-list DCB_AS_acl extended permit tcp SGCalypso6 255.255.255.252 Ascott_BU_Net 255.255.0.0 eq citrix-ica access-list DCB_AS_acl extended permit udp SGCalypso6 255.255.255.252 Ascott_BU_Net 255.255.0.0 eq 1604 access-list DCB_AS_acl extended permit tcp SGCalypso6 255.255.255.252 Ascott_BU_Net 255.255.0.0 eq 2513 access-list DCB_AS_acl remark remark Z--Bandwidth -- 919-- priotization for China and Thailand access-list DCB_AS_acl extended permit tcp SGCalypso8 255.255.255.254 10.153.35.0 255.255.255.0 eq citrix-ica access-list DCB_AS_acl extended permit tcp SGCalypso8 255.255.255.254 10.153.36.0 255.255.252.0 eq citrix-ica access-list DCB_AS_acl extended permit tcp SGCalypso8 255.255.255.254 10.153.40.0 255.255.255.0 eq citrix-ica access-list DCB_AS_acl extended permit tcp SGCalypso8 255.255.255.254 10.153.71.0 255.255.255.0 eq citrix-ica access-list DCB_AS_acl extended permit tcp SGCalypso8 255.255.255.254 10.153.72.0 255.255.254.0 eq citrix-ica access-list DCB_AS_acl extended permit tcp SGCalypso8 255.255.255.254 10.153.74.0 255.255.255.0 eq citrix-ica access-list DCB_AS_acl extended permit udp SGCalypso8 255.255.255.254 10.153.35.0 255.255.255.0 eq 1604 access-list DCB_AS_acl extended permit udp SGCalypso8 255.255.255.254 10.153.36.0 255.255.252.0 eq 1604 access-list DCB_AS_acl extended permit udp SGCalypso8 255.255.255.254 10.153.40.0 255.255.255.0 eq 1604 access-list DCB_AS_acl extended permit udp SGCalypso8 255.255.255.254 10.153.71.0 255.255.255.0 eq 1604 access-list DCB_AS_acl extended permit udp SGCalypso8 255.255.255.254 10.153.72.0 255.255.254.0 eq 1604 access-list DCB_AS_acl extended permit udp SGCalypso8 255.255.255.254 10.153.74.0 255.255.255.0 eq 1604 access-list DCB_AS_acl extended permit tcp SGCalypso6 255.255.255.252 10.153.35.0 255.255.255.0 eq citrix-ica access-list DCB_AS_acl extended permit tcp SGCalypso6 255.255.255.252 10.153.36.0 255.255.252.0 eq citrix-ica access-list DCB_AS_acl extended permit tcp SGCalypso6 255.255.255.252 10.153.40.0 255.255.255.0 eq citrix-ica access-list DCB_AS_acl extended permit tcp SGCalypso6 255.255.255.252 10.153.71.0 255.255.255.0 eq citrix-ica access-list DCB_AS_acl extended permit tcp SGCalypso6 255.255.255.252 10.153.72.0 255.255.254.0 eq citrix-ica access-list DCB_AS_acl extended permit tcp SGCalypso6 255.255.255.252 10.153.74.0 255.255.255.0 eq citrix-ica access-list DCB_AS_acl extended permit udp SGCalypso6 255.255.255.252 10.153.35.0 255.255.255.0 eq 1604 access-list DCB_AS_acl extended permit udp SGCalypso6 255.255.255.252 10.153.36.0 255.255.252.0 eq 1604 access-list DCB_AS_acl extended permit udp SGCalypso6 255.255.255.252 10.153.40.0 255.255.255.0 eq 1604 access-list DCB_AS_acl extended permit udp SGCalypso6 255.255.255.252 10.153.71.0 255.255.255.0 eq 1604 access-list DCB_AS_acl extended permit udp SGCalypso6 255.255.255.252 10.153.72.0 255.255.254.0 eq 1604 access-list DCB_AS_acl extended permit udp SGCalypso6 255.255.255.252 10.153.74.0 255.255.255.0 eq 1604 access-list DCB_AS_acl remark remark Z--------For Symantec Management DAT update------------------- access-list DCB_AS_acl extended permit tcp DCB_AS_Subnet 255.255.255.0 host SGDeimos2 eq 38292 access-list DCB_AS_acl extended permit udp DCB_AS_Subnet 255.255.255.0 host SGDeimos2 eq 38293 access-list DCB_AS_acl extended permit udp DCB_AS_Subnet 255.255.255.0 host SGDeimos2 eq 38037 access-list DCB_AS_acl extended permit udp DCB_AS_Subnet 255.255.255.0 host SGDeimos2 eq 2967 access-list DCB_AS_acl remark remark Z--------For to SQLvirtual SGCalyso5 & 6 SQL access access-list DCB_AS_acl extended permit tcp host SGCalypso6 host Ascott_SQL_VIP range 1433 1434 access-list DCB_AS_acl extended permit tcp host SGCalypso5 host Ascott_SQL_VIP range 1433 1434 access-list DCB_AS_acl extended permit tcp SGCalypso8 255.255.255.254 host SGCalyso1 eq 135 access-list DCB_AS_acl extended permit tcp SGCalypso8 255.255.255.254 host SGCalyso1 eq 445 access-list DCB_AS_acl extended permit tcp SGCalypso8 255.255.255.254 host SGCalyso1 range 137 netbios-ssn access-list DCB_AS_acl extended permit udp SGCalypso8 255.255.255.254 host SGCalyso1 range netbios-ns 139 access-list DCB_AS_acl extended permit tcp SGCalypso6 255.255.255.252 host SGCalyso1 eq 135 access-list DCB_AS_acl extended permit tcp SGCalypso6 255.255.255.252 host SGCalyso1 eq 445 access-list DCB_AS_acl extended permit tcp SGCalypso6 255.255.255.252 host SGCalyso1 range 137 netbios-ssn access-list DCB_AS_acl extended permit udp SGCalypso6 255.255.255.252 host SGCalyso1 range netbios-ns 139 access-list DCB_AS_acl extended permit tcp SGCalypso8 255.255.255.254 host SGCalyso2 eq 135 access-list DCB_AS_acl extended permit tcp SGCalypso8 255.255.255.254 host SGCalyso2 eq 445 access-list DCB_AS_acl extended permit tcp SGCalypso8 255.255.255.254 host SGCalyso2 range 137 netbios-ssn access-list DCB_AS_acl extended permit udp SGCalypso8 255.255.255.254 host SGCalyso2 range netbios-ns 139 access-list DCB_AS_acl extended permit tcp SGCalypso6 255.255.255.252 host SGCalyso2 eq 135 access-list DCB_AS_acl extended permit tcp SGCalypso6 255.255.255.252 host SGCalyso2 eq 445 access-list DCB_AS_acl extended permit tcp SGCalypso6 255.255.255.252 host SGCalyso2 range 137 netbios-ssn access-list DCB_AS_acl extended permit udp SGCalypso6 255.255.255.252 host SGCalyso2 range netbios-ns 139 access-list DCB_AS_acl extended permit tcp DCB_AS_Subnet 255.255.255.0 host SGCalyso1 eq citrix-ica access-list DCB_AS_acl extended permit udp DCB_AS_Subnet 255.255.255.0 host SGCalyso1 eq 1604 access-list DCB_AS_acl extended permit tcp DCB_AS_Subnet 255.255.255.0 host SGCalyso1 eq 2513 access-list DCB_AS_acl extended permit tcp DCB_AS_Subnet 255.255.255.0 host SGCalyso1 eq 2512 access-list DCB_AS_acl extended permit tcp DCB_AS_Subnet 255.255.255.0 host SGCalyso2 eq citrix-ica access-list DCB_AS_acl extended permit udp DCB_AS_Subnet 255.255.255.0 host SGCalyso2 eq 1604 access-list DCB_AS_acl extended permit tcp DCB_AS_Subnet 255.255.255.0 host SGCalyso2 eq 2513 access-list DCB_AS_acl extended permit tcp DCB_AS_Subnet 255.255.255.0 host SGCalyso2 eq 2512 access-list DCB_AS_acl extended permit tcp DCB_AS_Subnet 255.255.255.0 object-group Omniback_Svrs object-group Omniback_Ports access-list DCB_AS_acl extended permit tcp DCB_AS_Subnet 255.255.255.0 object-group Luthien_Galadriel object-group Omniback_Ports access-list DCB_AS_acl extended permit tcp object-group DCB_AS_Anti_Spoofing host HP_Pri_OVO_MgtSvr eq 135 access-list DCB_AS_acl extended permit tcp object-group DCB_AS_Anti_Spoofing host HP_Sec_OVO_MgtSvr eq 135 access-list DCB_AS_acl extended permit tcp object-group DCB_AS_Anti_Spoofing host HP_MWA_Mgt_Svr eq 135 access-list DCB_AS_acl extended permit tcp object-group DCB_AS_Anti_Spoofing host HP_CODA_Mgt_Svr eq 135 access-list DCB_AS_acl extended permit tcp object-group DCB_AS_Anti_Spoofing host HP_MWA_Mgt_Svr range 381 383 access-list DCB_AS_acl extended permit tcp object-group DCB_AS_Anti_Spoofing host HP_CODA_Mgt_Svr range 381 383 access-list DCB_AS_acl extended permit tcp object-group DCB_AS_Anti_Spoofing host HP_Pri_OVO_MgtSvr range 10000 10200 access-list DCB_AS_acl extended permit tcp object-group DCB_AS_Anti_Spoofing host HP_Sec_OVO_MgtSvr range 10000 10200 access-list DCB_AS_acl extended permit tcp object-group DCB_AS_Anti_Spoofing host HP_Pri_OVO_MgtSvr range 14000 14200 access-list DCB_AS_acl extended permit tcp object-group DCB_AS_Anti_Spoofing host HP_Sec_OVO_MgtSvr range 14000 14200 access-list DCB_AS_acl extended permit tcp object-group DCB_AS_Anti_Spoofing host HP_MWA_Mgt_Svr range 14000 14200 access-list DCB_AS_acl extended permit tcp object-group DCB_AS_Anti_Spoofing host HP_CODA_Mgt_Svr range 14000 14200 access-list DCB_AS_acl extended permit udp object-group DCB_AS_Anti_Spoofing host HP_Pri_OVO_MgtSvr range snmp snmptrap access-list DCB_AS_acl extended permit udp object-group DCB_AS_Anti_Spoofing host HP_Sec_OVO_MgtSvr range snmp snmptrap access-list DCB_AS_acl extended permit udp object-group DCB_AS_Anti_Spoofing host HP_MWA_Mgt_Svr range snmp snmptrap access-list DCB_AS_acl extended permit udp object-group DCB_AS_Anti_Spoofing host HP_CODA_Mgt_Svr range snmp snmptrap access-list DCB_AS_acl remark remark Z--------For SQL vitual-------------------------- SQl access from SGcalyso3-8 to access-list DCB_AS_acl extended permit tcp SGCalypso8 255.255.255.254 host Ascott_SQL_VIP range 1433 1434 access-list DCB_AS_acl extended permit tcp SGCalypso6 255.255.255.252 host Ascott_SQL_VIP range 1433 1434 access-list DCB_AS_acl remark remark Z--------For SGDeimos1---------------------------- "SGcalyoso5 6 7" VLan 131 -- to access-list DCB_AS_acl extended permit tcp DCB_AS_Subnet 255.255.255.0 host SGDeimos1 eq 445 access-list DCB_AS_acl extended permit udp DCB_AS_Subnet 255.255.255.0 host SGDeimos1 eq 445 access-list DCB_AS_acl extended permit tcp DCB_AS_Subnet 255.255.255.0 host SGDeimos1 eq ldap access-list DCB_AS_acl extended permit udp DCB_AS_Subnet 255.255.255.0 host SGDeimos1 eq 389 access-list DCB_AS_acl extended permit tcp DCB_AS_Subnet 255.255.255.0 host SGDeimos1 eq 1025 access-list DCB_AS_acl extended permit tcp DCB_AS_Subnet 255.255.255.0 host SGDeimos1 eq 1026 access-list DCB_AS_acl extended permit tcp DCB_AS_Subnet 255.255.255.0 host SGDeimos1 eq 135 access-list DCB_AS_acl extended permit udp DCB_AS_Subnet 255.255.255.0 host SGDeimos1 eq 135 access-list DCB_AS_acl extended permit tcp DCB_AS_Subnet 255.255.255.0 host SGDeimos1 eq 88 access-list DCB_AS_acl extended permit udp DCB_AS_Subnet 255.255.255.0 host SGDeimos1 eq 88 access-list DCB_AS_acl extended permit udp DCB_AS_Subnet 255.255.255.0 host SGDeimos1 eq domain access-list DCB_AS_acl extended permit tcp DCB_AS_Subnet 255.255.255.0 host SGDeimos1 eq domain access-list DCB_AS_acl extended permit tcp DCB_AS_Subnet 255.255.255.0 host SGDeimos1 range 137 netbios-ssn access-list DCB_AS_acl extended permit udp DCB_AS_Subnet 255.255.255.0 host SGDeimos1 range netbios-ns 139 access-list DCB_AS_acl remark remark Z--------For SGDeimos2---------------------------- "SGcalyoso5 6 7" VLan 131 -- to access-list DCB_AS_acl extended permit tcp DCB_AS_Subnet 255.255.255.0 host SGDeimos2 eq 445 access-list DCB_AS_acl extended permit udp DCB_AS_Subnet 255.255.255.0 host SGDeimos2 eq 445 access-list DCB_AS_acl extended permit tcp DCB_AS_Subnet 255.255.255.0 host SGDeimos2 eq ldap access-list DCB_AS_acl extended permit udp DCB_AS_Subnet 255.255.255.0 host SGDeimos2 eq 389 access-list DCB_AS_acl extended permit tcp DCB_AS_Subnet 255.255.255.0 host SGDeimos2 eq 1025 access-list DCB_AS_acl extended permit tcp DCB_AS_Subnet 255.255.255.0 host SGDeimos2 eq 1026 access-list DCB_AS_acl extended permit tcp DCB_AS_Subnet 255.255.255.0 host SGDeimos2 eq 135 access-list DCB_AS_acl extended permit udp DCB_AS_Subnet 255.255.255.0 host SGDeimos2 eq 135 access-list DCB_AS_acl extended permit tcp DCB_AS_Subnet 255.255.255.0 host SGDeimos2 eq 88 access-list DCB_AS_acl extended permit udp DCB_AS_Subnet 255.255.255.0 host SGDeimos2 eq 88 access-list DCB_AS_acl extended permit udp DCB_AS_Subnet 255.255.255.0 host SGDeimos2 eq domain access-list DCB_AS_acl extended permit tcp DCB_AS_Subnet 255.255.255.0 host SGDeimos2 eq domain access-list DCB_AS_acl extended permit tcp DCB_AS_Subnet 255.255.255.0 host SGDeimos2 range 137 netbios-ssn access-list DCB_AS_acl extended permit udp DCB_AS_Subnet 255.255.255.0 host SGDeimos2 range netbios-ns 139 access-list DCB_AS_acl remark remark Z----JVen SGorion1&2 to mail.the-ascott.com- SCRS 458------------- access-list DCB_AS_acl extended permit tcp SGOrion1 255.255.255.254 host AscottExchange3 eq smtp access-list DCB_AS_acl extended permit tcp SGOrion1 255.255.255.254 host AscottExchange3 eq https access-list DCB_AS_acl extended permit udp SGOrion1 255.255.255.254 host AscottExchange3 eq 443 access-list DCB_AS_acl extended permit tcp SGOrion1 255.255.255.254 host AscottExchange3 eq 993 access-list DCB_AS_acl extended permit udp SGOrion1 255.255.255.254 host AscottExchange3 eq 993 access-list DCB_AS_acl remark remark Z--------------SMTP mail-- SCRS 322 --------------------- access-list DCB_AS_acl extended permit tcp host SGOrion1 host Flamingo_SMTPRelay eq smtp access-list DCB_AS_acl extended permit tcp host SGOrion2 host Flamingo_SMTPRelay eq smtp access-list DCB_AS_acl extended permit tcp host SGOrion1 host SMTP_Relay_Server eq smtp access-list DCB_AS_acl extended permit tcp host SGOrion2 host SMTP_Relay_Server eq smtp access-list DCB_AS_acl remark remark Z-------- 2 and Drive mapping to SGPluto1 and -------------- access-list DCB_AS_acl extended permit tcp SGOrion1 255.255.255.254 host SGpluto1 eq 135 access-list DCB_AS_acl extended permit tcp SGOrion1 255.255.255.254 host SGpluto1 eq 445 access-list DCB_AS_acl extended permit tcp SGOrion1 255.255.255.254 host SGpluto1 range 137 netbios-ssn access-list DCB_AS_acl extended permit udp SGOrion1 255.255.255.254 host SGpluto1 range netbios-ns 139 access-list DCB_AS_acl extended permit tcp SGOrion1 255.255.255.254 host 10.153.2.28 eq 135 access-list DCB_AS_acl extended permit tcp SGOrion1 255.255.255.254 host 10.153.2.28 eq 445 access-list DCB_AS_acl extended permit tcp SGOrion1 255.255.255.254 host 10.153.2.28 range 137 netbios-ssn access-list DCB_AS_acl extended permit udp SGOrion1 255.255.255.254 host 10.153.2.28 range netbios-ns 139 access-list DCB_AS_acl extended permit tcp SGOrion1 255.255.255.254 SGTitan1 255.255.255.254 eq 135 access-list DCB_AS_acl extended permit tcp SGOrion1 255.255.255.254 SGTitan1 255.255.255.254 eq 445 access-list DCB_AS_acl extended permit tcp SGOrion1 255.255.255.254 SGTitan1 255.255.255.254 range 137 netbios-ssn access-list DCB_AS_acl extended permit udp SGOrion1 255.255.255.254 SGTitan1 255.255.255.254 range netbios-ns 139 access-list DCB_AS_acl extended permit tcp SGOrion1 255.255.255.254 SGTitan1 255.255.255.254 eq sqlnet access-list DCB_AS_acl extended permit tcp SGOrion1 255.255.255.254 SGTitan1 255.255.255.254 eq 1522 access-list DCB_AS_acl extended permit tcp SGOrion1 255.255.255.254 SGTitan1 255.255.255.254 eq 1523 access-list DCB_AS_acl remark remark Z----------- Adding printer ORACLE --------- access-list DCB_AS_acl extended permit tcp SGOrion1 255.255.255.254 host SGpluto1 eq lpd access-list DCB_AS_acl extended permit udp SGOrion1 255.255.255.254 host SGpluto1 eq 515 access-list DCB_AS_acl extended permit tcp SGOrion1 255.255.255.254 host 10.153.2.28 eq lpd access-list DCB_AS_acl extended permit udp SGOrion1 255.255.255.254 host 10.153.2.28 eq 515 access-list DCB_AS_acl extended deny ip any any log access-list TMP_AS_acl extended permit tcp host Acapulco host Muftakia object-group Omniback_Ports access-list TMP_AS_acl remark access-list TMP_AS_acl extended permit tcp host Prospero object-group Ascott_SQL_ALL eq 1433 access-list TMP_AS_acl remark FTP SERVICE TO MANWE. access-list TMP_AS_acl extended permit tcp object-group TMP_AS_Anti_Spoofing host ManWe range ftp-data ftp access-list TMP_AS_acl extended permit icmp host Acapulco object-group SGDeimosX access-list TMP_AS_acl remark To access public internet via proxy. access-list TMP_AS_acl extended permit tcp TMP_AS_Subnet 255.255.255.240 host Trendmicro eq www access-list TMP_AS_acl extended permit ip host Ariel host 10.61.12.170 access-list TMP_AS_acl extended permit ip host Ariel host Ascott_SQL_VIP access-list TMP_AS_acl extended permit udp host Prospero object-group SGDeimosX eq domain access-list TMP_AS_acl extended permit udp TMP_AS_Subnet 255.255.255.240 object-group SGDeimosX object-group AD_Replication access-list TMP_AS_acl extended permit tcp TMP_AS_Subnet 255.255.255.240 object-group SGDeimosX object-group AD_Replication access-list TMP_AS_acl extended permit tcp TMP_AS_Subnet 255.255.255.240 object-group Omniback_Svrs object-group OmniBackup access-list TMP_AS_acl extended permit tcp TMP_AS_Subnet 255.255.255.240 object-group Luthien_Galadriel object-group OmniBackup access-list TMP_AS_acl extended permit tcp host Ariel host DPRStephano1 eq 1433 access-list TMP_AS_acl extended permit tcp host Ariel host Ascott_CHN_SQLSvr eq 1433 access-list TMP_AS_acl extended permit tcp host Ariel object-group Ascott_SQL_ALL range 1433 1434 access-list TMP_AS_acl remark remark Z Symantec Management DAT update------------------- access-list TMP_AS_acl extended permit tcp TMP_AS_Subnet 255.255.255.240 host SGDeimos2 eq 38292 access-list TMP_AS_acl extended permit udp TMP_AS_Subnet 255.255.255.240 host SGDeimos2 object-group NAV_CLIENT_DAT access-list TMP_AS_acl remark remark For interface program testing of Oracle and HIS ZSCRS 905-- access-list TMP_AS_acl extended permit tcp host Prospero host SGTitan1 eq sqlnet access-list TMP_AS_acl extended permit tcp host Ariel host SGTitan1 eq sqlnet access-list TMP_AS_acl remark remark Z services access From Ariel SCRS-548---------- access-list TMP_AS_acl extended permit tcp host Ariel host SGTitan1 eq 1522 access-list TMP_AS_acl extended permit tcp host Ariel host SGOrion1 eq sqlnet access-list TMP_AS_acl extended permit tcp host Ariel host Flamingo_SMTPRelay eq smtp access-list TMP_AS_acl remark remark Z services access From Prospero SCRS-512---------- access-list TMP_AS_acl extended permit tcp host Prospero host SGTitan1 eq 1522 access-list TMP_AS_acl extended permit tcp host Prospero host SGOrion1 eq sqlnet access-list TMP_AS_acl remark remark For Z 444 SGStephno1/2 file transfer from HIS ---- access-list TMP_AS_acl extended permit tcp host 10.61.12.153 object-group SGStephnoX range 137 netbios-ssn access-list TMP_AS_acl extended permit tcp host 10.61.12.153 object-group SGStephnoX eq 445 access-list TMP_AS_acl extended permit tcp object-group TMP_AS_Anti_Spoofing object-group HP_Mon_Hosts eq 135 access-list TMP_AS_acl extended permit tcp object-group TMP_AS_Anti_Spoofing object-group HP_Mon_Hosts range 381 383 access-list TMP_AS_acl extended permit tcp object-group TMP_AS_Anti_Spoofing object-group HP_Mon_Hosts range 10000 10200 access-list TMP_AS_acl extended permit tcp object-group TMP_AS_Anti_Spoofing object-group HP_Mon_Hosts range 14000 14010 access-list TMP_AS_acl extended permit udp object-group TMP_AS_Anti_Spoofing object-group HP_Mon_Hosts range snmp snmptrap access-list TMP_AS_acl extended permit udp object-group TMP_AS_Anti_Spoofing host HPMon3 range snmp snmptrap access-list TMP_AS_acl extended permit icmp object-group TMP_AS_Anti_Spoofing host HP_Pri_OVO_MgtSvr access-list TMP_AS_acl extended permit icmp object-group TMP_AS_Anti_Spoofing host HP_Sec_OVO_MgtSvr access-list TMP_AS_acl extended permit icmp object-group TMP_AS_Anti_Spoofing host HPMon3 access-list TMP_AS_acl extended deny ip any any log access-list TMP_A2_acl extended permit tcp object-group SGDeimosX AScott_TT 255.255.255.0 object-group AD_Replication access-list TMP_A2_acl extended permit tcp object-group SGDeimosX AScott_TT 255.255.255.0 eq 50000 access-list TMP_A2_acl extended permit udp object-group SGDeimosX AScott_TT 255.255.255.0 object-group AD_Replication access-list TMP_A2_acl extended permit tcp object-group SGDeimosX object-group DCB_AS_Anti_Spoofing object-group AD_Replication access-list TMP_A2_acl extended permit tcp object-group SGDeimosX object-group DCB_AS_Anti_Spoofing eq 50000 access-list TMP_A2_acl extended permit tcp object-group SGDeimosX object-group STA_AS_Anti_Spoofing object-group AD_Replication access-list TMP_A2_acl extended permit tcp object-group SGDeimosX object-group STA_AS_Anti_Spoofing eq 50000 access-list TMP_A2_acl extended permit udp object-group SGDeimosX object-group STA_AS_Anti_Spoofing object-group AD_Replication access-list TMP_A2_acl extended permit udp object-group SGDeimosX object-group DCB_AS_Anti_Spoofing object-group AD_Replication access-list TMP_A2_acl remark SCRS 2302 access-list TMP_A2_acl extended permit tcp object-group SGCalypsoX host 10.153.120.12 object-group NetbiosTcpIP access-list TMP_A2_acl remark SCRS 2302 access-list TMP_A2_acl extended permit tcp object-group SGCalypsoX Ascott_Dubai 255.255.255.0 object-group NetbiosTcpIP access-list TMP_A2_acl remark SCRS 2302 access-list TMP_A2_acl extended permit icmp object-group SGDeimosX Ascott_Dubai 255.255.255.0 access-list TMP_A2_acl remark SCRS 2302 access-list TMP_A2_acl extended permit tcp object-group SGDeimosX Ascott_Dubai 255.255.255.0 object-group AD_TCP_Services access-list TMP_A2_acl remark SCRS 2302 access-list TMP_A2_acl extended permit udp object-group SGDeimosX Ascott_Dubai 255.255.255.0 object-group AD_Trust_UDP access-list TMP_A2_acl remark SCRS 2302 access-list TMP_A2_acl extended permit tcp object-group SGDeimosX Ascott_Dubai 255.255.255.0 eq 50000 access-list TMP_A2_acl extended permit icmp object-group SGDeimosX host AS_Paris_Net access-list TMP_A2_acl extended permit udp object-group SGCalypsoX host AS_Paris_Net object-group Netbios_UDP access-list TMP_A2_acl extended permit tcp object-group SGCalypsoX host AS_Paris_Net object-group Netbios_TCP access-list TMP_A2_acl extended permit tcp object-group SGCalypsoX object-group Ascott_Phillipine object-group NetbiosTcpIP access-list TMP_A2_acl remark SCRS 2127 access-list TMP_A2_acl remark SCRS 2127 access-list TMP_A2_acl extended permit tcp object-group SGDeimosX Ascott_PH_SMM 255.255.255.0 eq 50000 access-list TMP_A2_acl remark SCRS 2127 access-list TMP_A2_acl extended permit tcp object-group SGDeimosX object-group Ascott_Phillipine object-group AD_TCP_Services access-list TMP_A2_acl remark SCRS 2127 access-list TMP_A2_acl extended permit udp object-group SGDeimosX object-group Ascott_Phillipine object-group AD_UDP_Services access-list TMP_A2_acl remark FTP SERVICE TO MANWE. access-list TMP_A2_acl extended permit tcp object-group TMP_A2_Anti_Spoofing host ManWe range ftp-data ftp access-list TMP_A2_acl remark SCRS 1828 access-list TMP_A2_acl extended permit tcp object-group SGCalypsoX host 10.153.46.12 object-group NetbiosTcpIP access-list TMP_A2_acl remark SCRS 1828 access-list TMP_A2_acl extended permit tcp object-group SGDeimosX 10.153.46.0 255.255.255.0 object-group AD_TCP_Services access-list TMP_A2_acl remark SCRS 1828 access-list TMP_A2_acl extended permit udp object-group SGDeimosX 10.153.46.0 255.255.255.0 object-group AD_UDP_Services access-list TMP_A2_acl remark SCRS 1828 access-list TMP_A2_acl extended permit tcp object-group SGCalypsoX 10.153.46.0 255.255.255.0 object-group NetbiosTcpIP access-list TMP_A2_acl extended permit tcp object-group SGStephnoX object-group SGOrionX eq sqlnet access-list TMP_A2_acl extended permit icmp object-group SGDeimosX host Acapulco echo-reply access-list TMP_A2_acl remark For GPO propagation from SGDeimosX. access-list TMP_A2_acl extended permit icmp object-group SGDeimosX object-group SGCalypso3-8 access-list TMP_A2_acl extended permit icmp object-group SGDeimosX Ascott_BU_Net 255.255.0.0 access-list TMP_A2_acl remark To access public internet via proxy. access-list TMP_A2_acl extended permit tcp TMP_A2_Subnet 255.255.255.240 host Trendmicro eq www access-list TMP_A2_acl extended permit tcp object-group SGDeimosX object-group New_AS_CN_Nets object-group AD_Replication access-list TMP_A2_acl extended permit udp object-group SGDeimosX object-group New_AS_CN_Nets object-group AD_Replication access-list TMP_A2_acl extended permit udp object-group SGDeimosX object-group Ascott_SG_Properties object-group AD_Replication access-list TMP_A2_acl extended permit tcp object-group SGDeimosX object-group Ascott_SG_Properties object-group AD_Replication access-list TMP_A2_acl extended permit tcp object-group SGDeimosX object-group AS_Oversea_Deimos eq 5900 access-list TMP_A2_acl extended permit icmp object-group SGDeimosX object-group AS_Oversea_Deimos access-list TMP_A2_acl extended permit tcp object-group SGDeimosX object-group AS_Oversea_Deimos object-group AS_AD_Fix_Port access-list TMP_A2_acl extended permit udp object-group SGDeimosX object-group AS_Oversea_Deimos object-group AD_Replication access-list TMP_A2_acl extended permit tcp object-group SGDeimosX object-group AS_Oversea_Deimos object-group AD_Replication access-list TMP_A2_acl remark SCRS 1285 access-list TMP_A2_acl extended permit tcp object-group SGCalypsoX object-group Ascott_Thailand object-group NetbiosTcpIP access-list TMP_A2_acl remark SCRS 1285 access-list TMP_A2_acl extended permit tcp object-group SGCalypsoX object-group Ascott_Thailand object-group Citrix_Svcs access-list TMP_A2_acl extended permit tcp object-group SGCalypsoX object-group AS_Oversea_Nets object-group NetbiosTcpIP access-list TMP_A2_acl extended permit udp object-group SGCalypsoX object-group AS_Oversea_Nets object-group NetbiosTcpIP access-list TMP_A2_acl extended permit udp object-group SGCalypsoX Ascott_BU_Net 255.255.0.0 object-group NetbiosTcpIP access-list TMP_A2_acl extended permit tcp object-group SGCalypsoX Ascott_BU_Net 255.255.0.0 object-group NetbiosTcpIP access-list TMP_A2_acl remark SCRS 1048 access-list TMP_A2_acl extended permit tcp object-group SGCalypsoX host Ariel eq 1433 access-list TMP_A2_acl extended permit tcp host SGStephno1 host DPRStephano1 range 1433 1434 access-list TMP_A2_acl extended permit tcp host 10.61.12.170 host DPRStephano1 range 1433 1434 access-list TMP_A2_acl extended permit tcp host Ascott_SQL_VIP host DPRStephano1 range 1433 1434 access-list TMP_A2_acl extended permit tcp object-group SGDeimosX host Trendmicro eq www access-list TMP_A2_acl extended permit tcp TMP_A2_Subnet 255.255.255.240 object-group Omniback_Svrs object-group OmniBackup access-list TMP_A2_acl extended permit tcp TMP_A2_Subnet 255.255.255.240 object-group Luthien_Galadriel object-group OmniBackup access-list TMP_A2_acl extended permit tcp object-group Ascott_SQL_ALL host Ariel range 1433 1434 access-list TMP_A2_acl extended permit tcp object-group Ascott_SQL_ALL host 10.153.1.91 range 1433 1434 access-list TMP_A2_acl remark SCRS 1289 access-list TMP_A2_acl extended permit tcp host SGCalyso1 host DPRStephano1 eq 1433 access-list TMP_A2_acl extended permit tcp host SGCalyso1 any eq www access-list TMP_A2_acl extended permit tcp host SGCalyso2 any eq www access-list TMP_A2_acl extended permit tcp host SGCalyso1 Ascott_BU_Net 255.255.0.0 eq 137 access-list TMP_A2_acl extended permit tcp host SGCalyso1 Ascott_BU_Net 255.255.0.0 eq 445 access-list TMP_A2_acl extended permit tcp host SGCalyso1 Ascott_BU_Net 255.255.0.0 eq netbios-ssn access-list TMP_A2_acl extended permit udp host SGCalyso1 Ascott_BU_Net 255.255.0.0 range netbios-ns 139 access-list TMP_A2_acl extended permit tcp host SGCalyso2 Ascott_BU_Net 255.255.0.0 eq 137 access-list TMP_A2_acl extended permit tcp host SGCalyso2 Ascott_BU_Net 255.255.0.0 eq 445 access-list TMP_A2_acl extended permit tcp host SGCalyso2 Ascott_BU_Net 255.255.0.0 eq netbios-ssn access-list TMP_A2_acl extended permit udp host SGCalyso2 Ascott_BU_Net 255.255.0.0 range netbios-ns 139 access-list TMP_A2_acl extended permit tcp host SGCalyso1 Ascott_BU_Net 255.255.0.0 eq citrix-ica access-list TMP_A2_acl extended permit tcp host SGCalyso2 Ascott_BU_Net 255.255.0.0 eq citrix-ica access-list TMP_A2_acl extended permit udp host SGCalyso1 Ascott_BU_Net 255.255.0.0 eq 1604 access-list TMP_A2_acl extended permit udp host SGCalyso2 Ascott_BU_Net 255.255.0.0 eq 1604 access-list TMP_A2_acl extended permit tcp host SGCalyso1 Ascott_BU_Net 255.255.0.0 eq 2513 access-list TMP_A2_acl extended permit tcp host SGCalyso2 Ascott_BU_Net 255.255.0.0 eq 2513 access-list TMP_A2_acl remark remark z z 919-- priotization for China and Thailand access-list TMP_A2_acl extended permit tcp host SGCalyso1 10.153.35.0 255.255.255.0 eq citrix-ica access-list TMP_A2_acl extended permit tcp host SGCalyso1 10.153.36.0 255.255.252.0 eq citrix-ica access-list TMP_A2_acl extended permit tcp host SGCalyso1 10.153.40.0 255.255.255.0 eq citrix-ica access-list TMP_A2_acl extended permit tcp host SGCalyso1 10.153.71.0 255.255.255.0 eq citrix-ica access-list TMP_A2_acl extended permit tcp host SGCalyso1 10.153.72.0 255.255.254.0 eq citrix-ica access-list TMP_A2_acl extended permit tcp host SGCalyso1 10.153.74.0 255.255.255.0 eq citrix-ica access-list TMP_A2_acl extended permit udp host SGCalyso1 10.153.35.0 255.255.255.0 eq 1604 access-list TMP_A2_acl extended permit udp host SGCalyso1 10.153.36.0 255.255.252.0 eq 1604 access-list TMP_A2_acl extended permit udp host SGCalyso1 10.153.40.0 255.255.255.0 eq 1604 access-list TMP_A2_acl extended permit udp host SGCalyso1 10.153.71.0 255.255.255.0 eq 1604 access-list TMP_A2_acl extended permit udp host SGCalyso1 10.153.72.0 255.255.254.0 eq 1604 access-list TMP_A2_acl extended permit udp host SGCalyso1 10.153.74.0 255.255.255.0 eq 1604 access-list TMP_A2_acl extended permit tcp host SGCalyso2 10.153.35.0 255.255.255.0 eq citrix-ica access-list TMP_A2_acl extended permit tcp host SGCalyso2 10.153.36.0 255.255.252.0 eq citrix-ica access-list TMP_A2_acl extended permit tcp host SGCalyso2 10.153.40.0 255.255.255.0 eq citrix-ica access-list TMP_A2_acl extended permit tcp host SGCalyso2 10.153.71.0 255.255.255.0 eq citrix-ica access-list TMP_A2_acl extended permit tcp host SGCalyso2 10.153.72.0 255.255.254.0 eq citrix-ica access-list TMP_A2_acl extended permit tcp host SGCalyso2 10.153.74.0 255.255.255.0 eq citrix-ica access-list TMP_A2_acl extended permit udp host SGCalyso2 10.153.35.0 255.255.255.0 eq 1604 access-list TMP_A2_acl extended permit udp host SGCalyso2 10.153.36.0 255.255.252.0 eq 1604 access-list TMP_A2_acl extended permit udp host SGCalyso2 10.153.40.0 255.255.255.0 eq 1604 access-list TMP_A2_acl extended permit udp host SGCalyso2 10.153.71.0 255.255.255.0 eq 1604 access-list TMP_A2_acl extended permit udp host SGCalyso2 10.153.72.0 255.255.254.0 eq 1604 access-list TMP_A2_acl extended permit udp host SGCalyso2 10.153.74.0 255.255.255.0 eq 1604 access-list TMP_A2_acl extended permit tcp host SGCalyso1 SGCalypso8 255.255.255.254 eq 135 access-list TMP_A2_acl extended permit tcp host SGCalyso1 SGCalypso8 255.255.255.254 eq 445 access-list TMP_A2_acl extended permit tcp host SGCalyso1 SGCalypso8 255.255.255.254 range 137 netbios-ssn access-list TMP_A2_acl extended permit udp host SGCalyso1 SGCalypso8 255.255.255.254 range netbios-ns 139 access-list TMP_A2_acl extended permit tcp host SGCalyso1 SGCalypso6 255.255.255.252 eq 135 access-list TMP_A2_acl extended permit tcp host SGCalyso1 SGCalypso6 255.255.255.252 eq 445 access-list TMP_A2_acl extended permit tcp host SGCalyso1 SGCalypso6 255.255.255.252 range 137 netbios-ssn access-list TMP_A2_acl extended permit udp host SGCalyso1 SGCalypso6 255.255.255.252 range netbios-ns 139 access-list TMP_A2_acl extended permit tcp host SGCalyso2 SGCalypso8 255.255.255.254 eq 135 access-list TMP_A2_acl extended permit tcp host SGCalyso2 SGCalypso8 255.255.255.254 eq 445 access-list TMP_A2_acl extended permit tcp host SGCalyso2 SGCalypso8 255.255.255.254 range 137 netbios-ssn access-list TMP_A2_acl extended permit udp host SGCalyso2 SGCalypso8 255.255.255.254 range netbios-ns 139 access-list TMP_A2_acl extended permit tcp host SGCalyso2 SGCalypso6 255.255.255.252 eq 135 access-list TMP_A2_acl extended permit tcp host SGCalyso2 SGCalypso6 255.255.255.252 eq 445 access-list TMP_A2_acl extended permit tcp host SGCalyso2 SGCalypso6 255.255.255.252 range 137 netbios-ssn access-list TMP_A2_acl extended permit udp host SGCalyso2 SGCalypso6 255.255.255.252 range netbios-ns 139 access-list TMP_A2_acl extended permit tcp host SGCalyso1 DCB_AS_Subnet 255.255.255.0 eq citrix-ica access-list TMP_A2_acl extended permit udp host SGCalyso1 DCB_AS_Subnet 255.255.255.0 eq 1604 access-list TMP_A2_acl extended permit tcp host SGCalyso1 DCB_AS_Subnet 255.255.255.0 eq 2513 access-list TMP_A2_acl extended permit tcp host SGCalyso1 DCB_AS_Subnet 255.255.255.0 eq 2512 access-list TMP_A2_acl extended permit tcp host SGCalyso2 DCB_AS_Subnet 255.255.255.0 eq citrix-ica access-list TMP_A2_acl extended permit udp host SGCalyso2 DCB_AS_Subnet 255.255.255.0 eq 1604 access-list TMP_A2_acl extended permit tcp host SGCalyso2 DCB_AS_Subnet 255.255.255.0 eq 2513 access-list TMP_A2_acl extended permit tcp host SGCalyso2 DCB_AS_Subnet 255.255.255.0 eq 2512 access-list TMP_A2_acl extended permit udp host SGDeimos1 object-group Internal_DNS eq domain access-list TMP_A2_acl extended permit udp host SGDeimos2 object-group Internal_DNS eq domain access-list TMP_A2_acl remark remark For SGDeimos1 PCAnyWhere access to CNDeimos1 access-list TMP_A2_acl extended permit tcp host SGDeimos1 host Ascott_CHN_DC2 eq pcanywhere-data access-list TMP_A2_acl extended permit udp host SGDeimos1 host Ascott_CHN_DC2 eq pcanywhere-status access-list TMP_A2_acl extended permit tcp host SGDeimos1 host host10_153_100_225 eq 445 access-list TMP_A2_acl extended permit tcp host SGDeimos1 host host10_153_100_225 eq netbios-ssn access-list TMP_A2_acl extended permit tcp host SGDeimos2 host host10_153_100_225 eq 445 access-list TMP_A2_acl extended permit udp host SGDeimos1 SGTitan1 255.255.255.254 eq ntp access-list TMP_A2_acl remark remark z Acess-- Updated 40814 0:33 z China access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.35.0 255.255.255.0 eq 135 access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.36.0 255.255.252.0 eq 135 access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.40.0 255.255.255.0 eq 135 access-list TMP_A2_acl extended permit udp host SGDeimos1 10.153.35.0 255.255.255.0 eq 135 access-list TMP_A2_acl extended permit udp host SGDeimos1 10.153.36.0 255.255.252.0 eq 135 access-list TMP_A2_acl extended permit udp host SGDeimos1 10.153.40.0 255.255.255.0 eq 135 access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.35.0 255.255.255.0 range 137 netbios-ssn access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.36.0 255.255.252.0 range 137 netbios-ssn access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.40.0 255.255.255.0 range 137 netbios-ssn access-list TMP_A2_acl extended permit udp host SGDeimos1 10.153.35.0 255.255.255.0 range netbios-ns 139 access-list TMP_A2_acl extended permit udp host SGDeimos1 10.153.36.0 255.255.252.0 range netbios-ns 139 access-list TMP_A2_acl extended permit udp host SGDeimos1 10.153.40.0 255.255.255.0 range netbios-ns 139 access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.35.0 255.255.255.0 eq 445 access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.36.0 255.255.252.0 eq 445 access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.40.0 255.255.255.0 eq 445 access-list TMP_A2_acl extended permit udp host SGDeimos1 10.153.35.0 255.255.255.0 eq 445 access-list TMP_A2_acl extended permit udp host SGDeimos1 10.153.36.0 255.255.252.0 eq 445 access-list TMP_A2_acl extended permit udp host SGDeimos1 10.153.40.0 255.255.255.0 eq 445 access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.35.0 255.255.255.0 eq ldap access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.36.0 255.255.252.0 eq ldap access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.40.0 255.255.255.0 eq ldap access-list TMP_A2_acl extended permit udp host SGDeimos1 10.153.35.0 255.255.255.0 eq 389 access-list TMP_A2_acl extended permit udp host SGDeimos1 10.153.36.0 255.255.252.0 eq 389 access-list TMP_A2_acl extended permit udp host SGDeimos1 10.153.40.0 255.255.255.0 eq 389 access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.35.0 255.255.255.0 eq ldaps access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.36.0 255.255.252.0 eq ldaps access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.40.0 255.255.255.0 eq ldaps access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.35.0 255.255.255.0 range 3268 3269 access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.36.0 255.255.252.0 range 3268 3269 access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.40.0 255.255.255.0 range 3268 3269 access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.35.0 255.255.255.0 eq 88 access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.36.0 255.255.252.0 eq 88 access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.40.0 255.255.255.0 eq 88 access-list TMP_A2_acl extended permit udp host SGDeimos1 10.153.35.0 255.255.255.0 eq 88 access-list TMP_A2_acl extended permit udp host SGDeimos1 10.153.36.0 255.255.252.0 eq 88 access-list TMP_A2_acl extended permit udp host SGDeimos1 10.153.40.0 255.255.255.0 eq 88 access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.35.0 255.255.255.0 eq domain access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.36.0 255.255.252.0 eq domain access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.40.0 255.255.255.0 eq domain access-list TMP_A2_acl extended permit udp host SGDeimos1 10.153.35.0 255.255.255.0 eq domain access-list TMP_A2_acl extended permit udp host SGDeimos1 10.153.36.0 255.255.252.0 eq domain access-list TMP_A2_acl extended permit udp host SGDeimos1 10.153.40.0 255.255.255.0 eq domain access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.35.0 255.255.255.0 eq 1512 access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.36.0 255.255.252.0 eq 1512 access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.40.0 255.255.255.0 eq 1512 access-list TMP_A2_acl extended permit udp host SGDeimos1 10.153.35.0 255.255.255.0 eq 1512 access-list TMP_A2_acl extended permit udp host SGDeimos1 10.153.36.0 255.255.252.0 eq 1512 access-list TMP_A2_acl extended permit udp host SGDeimos1 10.153.40.0 255.255.255.0 eq 1512 access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.35.0 255.255.255.0 eq 42 access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.36.0 255.255.252.0 eq 42 access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.40.0 255.255.255.0 eq 42 access-list TMP_A2_acl extended permit udp host SGDeimos1 10.153.35.0 255.255.255.0 eq nameserver access-list TMP_A2_acl extended permit udp host SGDeimos1 10.153.36.0 255.255.252.0 eq nameserver access-list TMP_A2_acl extended permit udp host SGDeimos1 10.153.40.0 255.255.255.0 eq nameserver access-list TMP_A2_acl extended permit udp host SGDeimos1 10.153.35.0 255.255.255.0 eq ntp access-list TMP_A2_acl extended permit udp host SGDeimos1 10.153.36.0 255.255.252.0 eq ntp access-list TMP_A2_acl extended permit udp host SGDeimos1 10.153.40.0 255.255.255.0 eq ntp access-list TMP_A2_acl remark remark ----------------- 0.168 -- 40813 CAscott China to Demois access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.35.0 255.255.255.0 eq 135 access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.36.0 255.255.252.0 eq 135 access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.40.0 255.255.255.0 eq 135 access-list TMP_A2_acl extended permit udp host SGDeimos2 10.153.35.0 255.255.255.0 eq 135 access-list TMP_A2_acl extended permit udp host SGDeimos2 10.153.36.0 255.255.252.0 eq 135 access-list TMP_A2_acl extended permit udp host SGDeimos2 10.153.40.0 255.255.255.0 eq 135 access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.35.0 255.255.255.0 range 137 netbios-ssn access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.36.0 255.255.252.0 range 137 netbios-ssn access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.40.0 255.255.255.0 range 137 netbios-ssn access-list TMP_A2_acl extended permit udp host SGDeimos2 10.153.35.0 255.255.255.0 range netbios-ns 139 access-list TMP_A2_acl extended permit udp host SGDeimos2 10.153.36.0 255.255.252.0 range netbios-ns 139 access-list TMP_A2_acl extended permit udp host SGDeimos2 10.153.40.0 255.255.255.0 range netbios-ns 139 access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.35.0 255.255.255.0 eq 445 access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.36.0 255.255.252.0 eq 445 access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.40.0 255.255.255.0 eq 445 access-list TMP_A2_acl extended permit udp host SGDeimos2 10.153.35.0 255.255.255.0 eq 445 access-list TMP_A2_acl extended permit udp host SGDeimos2 10.153.36.0 255.255.252.0 eq 445 access-list TMP_A2_acl extended permit udp host SGDeimos2 10.153.40.0 255.255.255.0 eq 445 access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.35.0 255.255.255.0 eq ldap access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.36.0 255.255.252.0 eq ldap access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.40.0 255.255.255.0 eq ldap access-list TMP_A2_acl extended permit udp host SGDeimos2 10.153.35.0 255.255.255.0 eq 389 access-list TMP_A2_acl extended permit udp host SGDeimos2 10.153.36.0 255.255.252.0 eq 389 access-list TMP_A2_acl extended permit udp host SGDeimos2 10.153.40.0 255.255.255.0 eq 389 access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.35.0 255.255.255.0 eq ldaps access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.36.0 255.255.252.0 eq ldaps access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.40.0 255.255.255.0 eq ldaps access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.35.0 255.255.255.0 range 3268 3269 access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.36.0 255.255.252.0 range 3268 3269 access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.40.0 255.255.255.0 range 3268 3269 access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.35.0 255.255.255.0 eq 88 access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.36.0 255.255.252.0 eq 88 access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.40.0 255.255.255.0 eq 88 access-list TMP_A2_acl extended permit udp host SGDeimos2 10.153.35.0 255.255.255.0 eq 88 access-list TMP_A2_acl extended permit udp host SGDeimos2 10.153.36.0 255.255.252.0 eq 88 access-list TMP_A2_acl extended permit udp host SGDeimos2 10.153.40.0 255.255.255.0 eq 88 access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.35.0 255.255.255.0 eq domain access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.36.0 255.255.252.0 eq domain access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.40.0 255.255.255.0 eq domain access-list TMP_A2_acl extended permit udp host SGDeimos2 10.153.35.0 255.255.255.0 eq domain access-list TMP_A2_acl extended permit udp host SGDeimos2 10.153.36.0 255.255.252.0 eq domain access-list TMP_A2_acl extended permit udp host SGDeimos2 10.153.40.0 255.255.255.0 eq domain access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.35.0 255.255.255.0 eq 1512 access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.36.0 255.255.252.0 eq 1512 access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.40.0 255.255.255.0 eq 1512 access-list TMP_A2_acl extended permit udp host SGDeimos2 10.153.35.0 255.255.255.0 eq 1512 access-list TMP_A2_acl extended permit udp host SGDeimos2 10.153.36.0 255.255.252.0 eq 1512 access-list TMP_A2_acl extended permit udp host SGDeimos2 10.153.40.0 255.255.255.0 eq 1512 access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.35.0 255.255.255.0 eq 42 access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.36.0 255.255.252.0 eq 42 access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.40.0 255.255.255.0 eq 42 access-list TMP_A2_acl extended permit udp host SGDeimos2 10.153.35.0 255.255.255.0 eq nameserver access-list TMP_A2_acl extended permit udp host SGDeimos2 10.153.36.0 255.255.252.0 eq nameserver access-list TMP_A2_acl extended permit udp host SGDeimos2 10.153.40.0 255.255.255.0 eq nameserver access-list TMP_A2_acl extended permit udp host SGDeimos2 10.153.35.0 255.255.255.0 eq ntp access-list TMP_A2_acl extended permit udp host SGDeimos2 10.153.36.0 255.255.252.0 eq ntp access-list TMP_A2_acl extended permit udp host SGDeimos2 10.153.40.0 255.255.255.0 eq ntp access-list TMP_A2_acl remark remark 19 ------------ Aug 4 Allow tcp /1026/1105/1126 access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.35.0 255.255.255.0 eq 1026 access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.36.0 255.255.252.0 eq 1026 access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.40.0 255.255.255.0 eq 1026 access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.35.0 255.255.255.0 eq 1026 access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.36.0 255.255.252.0 eq 1026 access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.40.0 255.255.255.0 eq 1026 access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.35.0 255.255.255.0 eq 1105 access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.36.0 255.255.252.0 eq 1105 access-list TMP_A2_acl extended permit tcp host SGDeimos1 10.153.40.0 255.255.255.0 eq 1105 access-list TMP_A2_acl extended permit udp host SGDeimos1 10.153.35.0 255.255.255.0 eq 1126 access-list TMP_A2_acl extended permit udp host SGDeimos1 10.153.36.0 255.255.252.0 eq 1126 access-list TMP_A2_acl extended permit udp host SGDeimos1 10.153.40.0 255.255.255.0 eq 1126 access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.35.0 255.255.255.0 eq 1105 access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.36.0 255.255.252.0 eq 1105 access-list TMP_A2_acl extended permit tcp host SGDeimos2 10.153.40.0 255.255.255.0 eq 1105 access-list TMP_A2_acl extended permit udp host SGDeimos2 10.153.35.0 255.255.255.0 eq 1126 access-list TMP_A2_acl extended permit udp host SGDeimos2 10.153.36.0 255.255.252.0 eq 1126 access-list TMP_A2_acl extended permit udp host SGDeimos2 10.153.40.0 255.255.255.0 eq 1126 access-list TMP_A2_acl extended permit tcp host SGDeimos1 host ASTL_DEIMOS1 eq netbios-ssn access-list TMP_A2_acl extended permit tcp host SGDeimos1 host AS_VNDEIMOS1 eq netbios-ssn access-list TMP_A2_acl extended permit tcp host SGDeimos1 host Ascott_HQ_H1 eq netbios-ssn access-list TMP_A2_acl extended permit tcp host SGDeimos1 host Ascott_CHN_DC2 eq netbios-ssn access-list TMP_A2_acl extended permit tcp host SGDeimos1 host Ascott_CHN_DC1 eq netbios-ssn access-list TMP_A2_acl extended permit tcp object-group TMP_A2_Anti_Spoofing object-group HP_Mon_Hosts eq 135 access-list TMP_A2_acl extended permit tcp object-group TMP_A2_Anti_Spoofing object-group HP_Mon_Hosts range 381 383 access-list TMP_A2_acl extended permit tcp object-group TMP_A2_Anti_Spoofing object-group HP_Mon_Hosts range 10000 10200 access-list TMP_A2_acl extended permit tcp object-group TMP_A2_Anti_Spoofing object-group HP_Mon_Hosts range 14000 14010 access-list TMP_A2_acl extended permit udp object-group TMP_A2_Anti_Spoofing object-group HP_Mon_Hosts range snmp snmptrap access-list TMP_A2_acl extended permit udp object-group TMP_A2_Anti_Spoofing host HPMon3 range snmp snmptrap access-list TMP_A2_acl extended permit icmp object-group TMP_A2_Anti_Spoofing host HP_Pri_OVO_MgtSvr access-list TMP_A2_acl extended permit icmp object-group TMP_A2_Anti_Spoofing host HP_Sec_OVO_MgtSvr access-list TMP_A2_acl extended permit icmp object-group TMP_A2_Anti_Spoofing host HPMon3 access-list TMP_A2_acl extended deny ip any any log access-list ENR_DC_acl remark SCRS 2442 access-list ENR_DC_acl extended permit tcp object-group Equinix_CA_Notes_Svrs 10.154.128.0 255.255.255.0 eq lotusnotes access-list ENR_DC_acl extended permit tcp ENR_DC 255.255.255.240 object-group Omniback_Svrs object-group OmniBackup access-list ENR_DC_acl extended permit tcp ENR_DC 255.255.255.240 object-group Luthien_Galadriel object-group OmniBackup access-list ENR_DC_acl extended permit tcp host CLG201 host Anakin_ object-group Anakin_ports access-list ENR_DC_acl extended permit tcp object-group STMS_RCH_Access host 10.150.248.9 eq lotusnotes access-list ENR_DC_acl remark FTP SERVICE TO MANWE. access-list ENR_DC_acl extended permit tcp 10.200.0.0 255.254.0.0 host ManWe range ftp-data ftp access-list ENR_DC_acl extended permit tcp object-group CLG001_CLG101 host DUALITY eq lotusnotes access-list ENR_DC_acl extended permit icmp object-group CLG001_CLG101 host DUALITY echo-reply access-list ENR_DC_acl remark Request by Susie Chia access-list ENR_DC_acl extended permit tcp host CLGServer001 host ArchivalTest eq www access-list ENR_DC_acl extended permit tcp object-group STMS_RCH_Access host RHLSVRNOM1 eq lotusnotes access-list ENR_DC_acl extended permit icmp object-group CLG001_CLG101 host 10.156.202.199 echo-reply access-list ENR_DC_acl extended permit icmp object-group CLG001_CLG101 host 10.156.202.102 echo-reply access-list ENR_DC_acl extended permit icmp object-group CLG001_CLG101 any echo-reply access-list ENR_DC_acl extended permit tcp host CLGServer001 host ArchivalTest range 1200 1215 access-list ENR_DC_acl extended permit tcp host CLGServer001 host ArchivalTest eq lotusnotes access-list ENR_DC_acl extended permit tcp host CLGServer101 host ArchivalTest eq www access-list ENR_DC_acl extended permit tcp host CLGServer101 host ArchivalTest range 1200 1215 access-list ENR_DC_acl extended permit tcp host CLGServer101 host ArchivalTest eq lotusnotes access-list ENR_DC_acl extended permit tcp object-group Xtender_Servers host Anakin object-group EmailXtender access-list ENR_DC_acl extended permit tcp object-group Xtender_Servers host Anakin_ object-group EmailXtender access-list ENR_DC_acl extended permit tcp host 10.200.32.213 host IMS_Database_Srv eq 1433 access-list ENR_DC_acl extended permit tcp 10.200.0.0 255.254.0.0 TMP_CG_subnet 255.255.255.0 eq lotusnotes access-list ENR_DC_acl extended permit tcp 10.200.0.0 255.254.0.0 10.150.0.0 255.255.0.0 eq lotusnotes access-list ENR_DC_acl extended permit tcp 10.200.0.0 255.254.0.0 Ascott_BU_Net 255.255.255.0 eq lotusnotes access-list ENR_DC_acl extended permit tcp 10.200.0.0 255.254.0.0 AScott_TT 255.255.255.0 eq lotusnotes access-list ENR_DC_acl extended permit tcp 10.200.0.0 255.254.0.0 10.153.2.0 255.255.255.0 eq lotusnotes access-list ENR_DC_acl extended permit tcp 10.200.0.0 255.254.0.0 AS_Grand_Carnhill 255.255.255.0 eq lotusnotes access-list ENR_DC_acl extended permit tcp 10.200.0.0 255.254.0.0 AS_Orchard 255.255.255.0 eq lotusnotes access-list ENR_DC_acl extended permit tcp 10.200.0.0 255.254.0.0 AS_Compass 255.255.255.0 eq lotusnotes access-list ENR_DC_acl extended permit tcp 10.200.0.0 255.254.0.0 AS_TAS 255.255.255.0 eq lotusnotes access-list ENR_DC_acl extended permit tcp 10.200.0.0 255.254.0.0 Comm_BU_Net 255.255.224.0 eq lotusnotes access-list ENR_DC_acl extended permit tcp 10.200.0.0 255.254.0.0 Funan 255.255.255.0 eq lotusnotes access-list ENR_DC_acl extended permit tcp 10.200.0.0 255.254.0.0 10.154.33.0 255.255.255.0 eq lotusnotes access-list ENR_DC_acl extended permit tcp 10.200.0.0 255.254.0.0 10.154.34.0 255.255.255.0 eq lotusnotes access-list ENR_DC_acl extended permit tcp 10.200.0.0 255.254.0.0 Net_RHL 255.255.0.0 eq lotusnotes access-list ENR_DC_acl extended permit tcp 10.200.0.0 255.254.0.0 Resi_BU_Net 255.255.0.0 eq lotusnotes access-list ENR_DC_acl extended permit tcp 10.200.0.0 255.254.0.0 Raffles_BU_Net 255.255.0.0 eq lotusnotes access-list ENR_DC_acl extended permit tcp 10.200.0.0 255.254.0.0 Raffles_RCH 255.255.0.0 eq lotusnotes access-list ENR_DC_acl extended permit tcp 10.200.0.0 255.254.0.0 Raffles-Swissotel 255.255.252.0 eq lotusnotes access-list ENR_DC_acl extended permit tcp 10.200.0.0 255.254.0.0 192.168.181.0 255.255.255.0 eq lotusnotes access-list ENR_DC_acl extended permit tcp 10.200.0.0 255.254.0.0 195.35.121.0 255.255.255.0 eq lotusnotes access-list ENR_DC_acl extended permit tcp 10.200.0.0 255.254.0.0 10.150.248.0 255.255.255.0 eq lotusnotes access-list ENR_DC_acl extended permit icmp host STNMC005 any access-list ENR_DC_acl extended permit icmp host STNMC105 any access-list ENR_DC_acl extended permit icmp host 10.200.3.1 any access-list ENR_DC_acl extended permit icmp host 10.200.3.2 any access-list ENR_DC_acl extended permit icmp host 10.200.7.1 any access-list ENR_DC_acl extended permit icmp host 10.200.4.4 any access-list ENR_DC_acl extended permit icmp host 10.200.7.3 any access-list ENR_DC_acl extended permit icmp host 10.200.7.2 any access-list ENR_DC_acl extended permit tcp 10.200.0.0 255.254.0.0 10.154.40.0 255.255.255.0 eq lotusnotes access-list ENR_DC_acl extended permit icmp host host10_200_5_3 host host10_156_129_74 access-list ENR_DC_acl extended permit icmp host host10_200_5_6 host host10_156_129_74 access-list ENR_DC_acl extended permit icmp host host10_200_5_3 any access-list ENR_DC_acl extended permit icmp host host10_200_5_6 any access-list ENR_DC_acl extended permit tcp host 10.200.1.6 host Premas_Host_240-3 eq 1433 access-list ENR_DC_acl extended deny ip any any log access-list EMS_DC_acl extended permit tcp host Anakin_ host CLG201 object-group Anakin_ports access-list EMS_DC_acl remark FTP SERVICE TO MANWE. access-list EMS_DC_acl extended permit tcp object-group EMS_DC_Anti_Spoofing host ManWe range ftp-data ftp access-list EMS_DC_acl remark To access public internet via proxy. access-list EMS_DC_acl extended permit tcp object-group EMS_DC_Anti_Spoofing host Trendmicro eq www access-list EMS_DC_acl remark SCRS 1198 access-list EMS_DC_acl extended permit tcp host 10.150.253.21 host Flamingo_SMTPRelay eq smtp access-list EMS_DC_acl remark SCRS 1198 access-list EMS_DC_acl extended permit tcp host 10.150.253.20 host Flamingo_SMTPRelay eq smtp access-list EMS_DC_acl extended permit tcp host Anakin_ object-group CLL_CCL_CRL_BUs range 1200 1215 access-list EMS_DC_acl extended permit tcp host Anakin_ host IMS_Database_Srv eq 1433 access-list EMS_DC_acl extended permit tcp host Anakin_ object-group Xtender_Servers object-group EmailXtender access-list EMS_DC_acl extended permit udp object-group EMS_DC_Anti_Spoofing object-group Internal_DNS eq domain access-list EMS_DC_acl extended permit tcp object-group EMS_DC_Anti_Spoofing host Rodian object-group AD_TCP_Services access-list EMS_DC_acl extended permit udp object-group EMS_DC_Anti_Spoofing host Rodian object-group AD_UDP_Services access-list EMS_DC_acl extended permit tcp object-group EMS_DC_Anti_Spoofing host Rodian range 7000 7200 access-list EMS_DC_acl extended permit tcp object-group EMS_DC_Anti_Spoofing host Ackbar object-group AD_TCP_Services access-list EMS_DC_acl extended permit udp object-group EMS_DC_Anti_Spoofing host Ackbar object-group AD_UDP_Services access-list EMS_DC_acl extended permit tcp object-group EMS_DC_Anti_Spoofing host Ackbar range 7000 7200 access-list EMS_DC_acl extended permit tcp object-group EMS_DC_Anti_Spoofing object-group Omniback_Svrs object-group Omniback_Ports access-list EMS_DC_acl extended permit tcp object-group EMS_DC_Anti_Spoofing object-group Luthien_Galadriel object-group Omniback_Po rts access-list EMS_DC_acl extended permit tcp object-group EMS_DC_Anti_Spoofing object-group HP_Mon_Hosts eq 135 access-list EMS_DC_acl extended permit tcp object-group EMS_DC_Anti_Spoofing object-group HP_Mon_Hosts range 381 383 access-list EMS_DC_acl extended permit tcp object-group EMS_DC_Anti_Spoofing object-group HP_Mon_Hosts range 10000 10200 access-list EMS_DC_acl extended permit tcp object-group EMS_DC_Anti_Spoofing object-group HP_Mon_Hosts range 14000 14010 access-list EMS_DC_acl extended permit udp object-group EMS_DC_Anti_Spoofing object-group HP_Mon_Hosts range snmp snmptrap access-list EMS_DC_acl extended permit udp object-group EMS_DC_Anti_Spoofing host HPMon3 range snmp snmptrap access-list EMS_DC_acl extended permit icmp object-group EMS_DC_Anti_Spoofing host HP_Pri_OVO_MgtSvr access-list EMS_DC_acl extended permit icmp object-group EMS_DC_Anti_Spoofing host HP_Sec_OVO_MgtSvr access-list EMS_DC_acl extended permit icmp object-group EMS_DC_Anti_Spoofing host HPMon3 access-list EMS_DC_acl extended deny ip any any log access-list TMP_SZ2_acl extended permit tcp host DUALITY host 213.130.50.253 eq 7171 access-list TMP_SZ2_acl extended permit tcp TMP_SZ1_Subnet 255.255.255.0 host Trendmicro eq www access-list TMP_SZ2_acl remark FTP SERVICE TO MANWE. access-list TMP_SZ2_acl extended permit tcp object-group TMP_SZ2_Anti_Spoofing host ManWe range ftp-data ftp access-list TMP_SZ2_acl extended permit tcp host Tessek_ Corp_BU_Net 255.255.248.0 eq 3200 access-list TMP_SZ2_acl extended permit tcp host Tessek_ Comm_BU_Net 255.255.0.0 eq 3200 access-list TMP_SZ2_acl extended permit tcp host Tessek_ Resi_BU_Net 255.255.0.0 eq 3200 access-list TMP_SZ2_acl remark Access to internal DNS group. access-list TMP_SZ2_acl extended permit udp object-group TMP_SZ2_Anti_Spoofing object-group Internal_DNS eq domain access-list TMP_SZ2_acl extended permit tcp object-group TMP_SZ2_Servers_Group host Rodian object-group AD_TCP_Services access-list TMP_SZ2_acl extended permit udp object-group TMP_SZ2_Servers_Group host Rodian object-group AD_UDP_Services access-list TMP_SZ2_acl extended permit tcp object-group TMP_SZ2_Servers_Group host Rodian range 7000 7200 access-list TMP_SZ2_acl extended permit tcp object-group TMP_SZ2_Servers_Group host Ackbar object-group AD_TCP_Services access-list TMP_SZ2_acl extended permit udp object-group TMP_SZ2_Servers_Group host Ackbar object-group AD_Trust_UDP access-list TMP_SZ2_acl extended permit tcp object-group TMP_SZ2_Servers_Group host Ackbar range 7000 7200 access-list TMP_SZ2_acl extended permit tcp object-group TMP_SZ2_Anti_Spoofing object-group Omniback_Svrs object-group Omniback_Port s access-list TMP_SZ2_acl extended permit tcp object-group TMP_SZ2_Anti_Spoofing object-group Luthien_Galadriel object-group Omniback_ Ports access-list TMP_SZ2_acl extended permit tcp object-group TMP_SZ2_Servers_Group host Trendmicro eq www access-list TMP_SZ2_acl extended permit tcp host DUALITY object-group CLG001_CLG101 eq lotusnotes access-list TMP_SZ2_acl extended permit icmp host DUALITY object-group CLG001_CLG101 access-list TMP_SZ2_acl remark Request by Susie Chia access-list TMP_SZ2_acl extended permit tcp host ArchivalTest host CLGServer001 eq www access-list TMP_SZ2_acl extended permit tcp host ArchivalTest host CLGServer001 range 1200 1215 access-list TMP_SZ2_acl extended permit tcp host ArchivalTest host CLGServer001 eq lotusnotes access-list TMP_SZ2_acl extended permit tcp host ArchivalTest host CLGServer101 eq www access-list TMP_SZ2_acl extended permit tcp host ArchivalTest host CLGServer101 range 1200 1215 access-list TMP_SZ2_acl extended permit tcp host ArchivalTest host CLGServer101 eq lotusnotes access-list TMP_SZ2_acl extended permit tcp host ArchivalTest host IMS_Database_Srv eq 1433 access-list TMP_SZ2_acl extended permit tcp host ArchivalTest 10.156.202.0 255.255.255.0 range 1200 1215 access-list TMP_SZ2_acl extended permit tcp host ArchivalTest WOR_DC_Subnet 255.255.255.0 range 1200 1215 access-list TMP_SZ2_acl extended permit tcp object-group TMP_SZ2_Anti_Spoofing object-group HP_Mon_Hosts eq 135 access-list TMP_SZ2_acl extended permit tcp object-group TMP_SZ2_Anti_Spoofing object-group HP_Mon_Hosts range 381 383 access-list TMP_SZ2_acl extended permit tcp object-group TMP_SZ2_Anti_Spoofing object-group HP_Mon_Hosts range 10000 10200 access-list TMP_SZ2_acl extended permit tcp object-group TMP_SZ2_Anti_Spoofing object-group HP_Mon_Hosts range 14000 14010 access-list TMP_SZ2_acl extended permit udp object-group TMP_SZ2_Anti_Spoofing object-group HP_Mon_Hosts range snmp snmptrap access-list TMP_SZ2_acl extended permit tcp object-group TMP_SZ2_Anti_Spoofing host HPMon3 range 161 162 access-list TMP_SZ2_acl extended permit icmp object-group TMP_SZ2_Anti_Spoofing host HP_Pri_OVO_MgtSvr access-list TMP_SZ2_acl extended permit icmp object-group TMP_SZ2_Anti_Spoofing host HP_Sec_OVO_MgtSvr access-list TMP_SZ2_acl extended permit icmp object-group TMP_SZ2_Anti_Spoofing host HPMon3 access-list TMP_SZ2_acl extended deny ip any any log access-list MGT_DC_access_in extended permit udp object-group MGT_DC_Anti_Spoofing host 10.150.205.6 eq ntp access-list MGT_DC_access_in extended permit udp object-group MGT_DC_Anti_Spoofing host 10.150.205.5 eq ntp access-list MGT_DC_access_in remark FTP SERVICE TO MANWE. access-list MGT_DC_access_in extended permit tcp object-group MGT_DC_Anti_Spoofing host ManWe range ftp-data ftp log access-list MGT_DC_access_in extended permit ip host Optimizer_DC any log access-list MGT_DC_access_in extended permit icmp MGT_DC_Subnet 255.255.255.0 host Monitor-PC access-list MGT_DC_access_in extended permit tcp host Exindar_MonitorUnit host Postman201-smts eq smtp access-list MGT_DC_access_in extended permit udp object-group MGT_DC_Anti_Spoofing object-group Internal_DNS eq domain access-list MGT_DC_access_in extended permit tcp object-group MGT_DC_Anti_Spoofing host Trendmicro eq www access-list MGT_DC_access_in extended permit icmp object-group MGT_DC_Anti_Spoofing host 10.156.202.102 echo-reply log access-list MGT_DC_access_in extended permit tcp host Optimizer_DC host Postman201-smts eq smtp access-list MGT_DC_access_in extended permit icmp host Optimizer_DC host Postman201-smts access-list MGT_DC_access_in extended permit tcp object-group MGT_DC_Anti_Spoofing object-group HP_Mon_Hosts object-group HP_ITO_Ser vices_TCP access-list MGT_DC_access_in extended permit udp object-group MGT_DC_Anti_Spoofing object-group HP_Mon_Hosts range snmp snmptrap access-list MGT_DC_access_in extended permit udp object-group MGT_DC_Anti_Spoofing host HPMon3 range snmp snmptrap access-list MGT_DC_access_in extended permit icmp object-group MGT_DC_Anti_Spoofing host HP_Pri_OVO_MgtSvr access-list MGT_DC_access_in extended permit icmp object-group MGT_DC_Anti_Spoofing host HP_Sec_OVO_MgtSvr access-list MGT_DC_access_in extended permit icmp object-group MGT_DC_Anti_Spoofing host HPMon3 access-list MGT_DC_access_in extended deny ip any any log access-list DCB_RHL_access_in extended permit tcp object-group RHL_Citrix_Servers host 10.155.0.101 eq lpd access-list DCB_RHL_access_in extended permit tcp object-group RHL_Citrix_Servers host 10.155.0.101 eq 9100 access-list DCB_RHL_access_in extended permit tcp object-group DCB_RHL_Anti_Spoofing host RHLSVRNOM1 object-group AD_TCP_Services access-list DCB_RHL_access_in extended permit udp object-group DCB_RHL_Anti_Spoofing host RHLSVRNOM1 object-group AD_UDP_Services access-list DCB_RHL_access_in extended permit tcp object-group DCB_RHL_Anti_Spoofing host Rodian range 7000 7200 access-list DCB_RHL_access_in extended permit tcp object-group DCB_RHL_Anti_Spoofing host Rodian object-group AD_TCP_Services access-list DCB_RHL_access_in extended permit udp object-group DCB_RHL_Anti_Spoofing host Rodian object-group AD_UDP_Services access-list DCB_RHL_access_in extended permit tcp object-group DCB_RHL_Anti_Spoofing host Ackbar object-group AD_TCP_Services access-list DCB_RHL_access_in extended permit udp object-group DCB_RHL_Anti_Spoofing host Ackbar object-group AD_UDP_Services access-list DCB_RHL_access_in extended permit tcp object-group DCB_RHL_Anti_Spoofing host Ackbar range 7000 7200 access-list DCB_RHL_access_in extended permit udp object-group DCB_RHL_Anti_Spoofing object-group Internal_DNS eq domain access-list DCB_RHL_access_in remark access-list DCB_RHL_access_in extended permit tcp object-group DCB_RHL_Anti_Spoofing object-group Omniback_Svrs object-group Omnibac k_Ports access-list DCB_RHL_access_in remark Omniback by Luthien & Galadriel access-list DCB_RHL_access_in extended permit tcp object-group DCB_RHL_Anti_Spoofing object-group Luthien_Galadriel object-group Omn iback_Ports access-list DCB_RHL_access_in extended permit tcp object-group DCB_RHL_Anti_Spoofing host Trendmicro eq www access-list DCB_RHL_access_in remark HP Monitoring Ports/Services access-list DCB_RHL_access_in extended permit tcp object-group DCB_RHL_Anti_Spoofing object-group HP_Mon_Hosts eq 135 access-list DCB_RHL_access_in extended permit tcp object-group DCB_RHL_Anti_Spoofing host HP_MWA_Mgt_Svr range 381 383 access-list DCB_RHL_access_in remark access-list DCB_RHL_access_in extended permit tcp object-group DCB_RHL_Anti_Spoofing host HP_CODA_Mgt_Svr range 381 383 access-list DCB_RHL_access_in remark access-list DCB_RHL_access_in extended permit tcp object-group DCB_RHL_Anti_Spoofing host HP_Pri_OVO_MgtSvr range 10000 10200 access-list DCB_RHL_access_in remark access-list DCB_RHL_access_in extended permit tcp object-group DCB_RHL_Anti_Spoofing host HP_Sec_OVO_MgtSvr range 10000 10200 access-list DCB_RHL_access_in remark access-list DCB_RHL_access_in extended permit tcp object-group DCB_RHL_Anti_Spoofing object-group HP_Mon_Hosts range 14000 14010 access-list DCB_RHL_access_in remark access-list DCB_RHL_access_in extended permit udp object-group DCB_RHL_Anti_Spoofing host HP_Pri_OVO_MgtSvr range snmp snmptrap access-list DCB_RHL_access_in remark access-list DCB_RHL_access_in extended permit udp object-group DCB_RHL_Anti_Spoofing host HP_Sec_OVO_MgtSvr range snmp snmptrap access-list DCB_RHL_access_in remark access-list DCB_RHL_access_in extended permit udp object-group DCB_RHL_Anti_Spoofing host HPMon3 range snmp snmptrap access-list DCB_RHL_access_in remark access-list DCB_RHL_access_in extended permit icmp object-group DCB_RHL_Anti_Spoofing host HP_Pri_OVO_MgtSvr access-list DCB_RHL_access_in remark access-list DCB_RHL_access_in extended permit icmp object-group DCB_RHL_Anti_Spoofing host HP_Sec_OVO_MgtSvr access-list DCB_RHL_access_in remark access-list DCB_RHL_access_in extended permit icmp object-group DCB_RHL_Anti_Spoofing host HPMon3 access-list DCB_RHL_access_in extended deny ip any any log access-list STA_CP_acl extended permit ip host 10.150.128.196 host Rodian access-list STA_CP_acl extended permit tcp 10.150.128.192 255.255.255.192 object-group Omniback_Svrs object-group OmniBackup access-list STA_CP_acl extended permit tcp 10.150.128.192 255.255.255.192 object-group Luthien_Galadriel object-group OmniBackup access-list STA_CP_acl extended permit tcp host 10.150.128.196 host Evanzon object-group NetbiosTcpIP access-list STA_CP_acl extended permit udp host 10.150.128.196 host Evanzon object-group NetbiosTcpIP access-list STA_CP_acl extended permit udp host 10.150.128.196 host Evanzan object-group NetbiosTcpIP access-list STA_CP_acl extended permit tcp host 10.150.128.196 host Evanzan object-group NetbiosTcpIP access-list STA_CP_acl extended permit tcp host 10.150.128.196 host Evanzan eq citrix-ica access-list STA_CP_acl extended permit tcp host 10.150.128.196 host Evanzan eq 1433 access-list STA_CP_acl extended permit tcp host 10.150.128.196 host Evanzon eq 1433 access-list STA_CP_acl extended permit tcp host 10.150.128.196 host Ackbar object-group AD_TCP_Services access-list STA_CP_acl extended permit udp host 10.150.128.196 host Ackbar object-group AD_UDP_Services access-list STA_CP_acl extended permit tcp host 10.150.128.196 host Ackbar range 7000 7200 access-list STA_CP_acl extended permit tcp host 10.150.128.196 host Rodian object-group AD_TCP_Services access-list STA_CP_acl extended permit udp host 10.150.128.196 host Rodian object-group AD_UDP_Services access-list STA_CP_acl extended permit tcp host 10.150.128.196 host Rodian range 7000 7200 access-list STA_CP_acl extended permit tcp host 10.150.128.196 host Evanzon eq netbios-ssn access-list ILO_DC_acl extended permit udp object-group ILO_DC_Anti_Spoofing object-group Internal_DNS eq domain access-list ILO_DC_acl extended permit tcp host 172.200.1.1 object-group Luthien_Galadriel object-group Omniback_Ports access-list ILO_DC_acl extended permit tcp host 172.200.1.1 object-group Omniback_Svrs object-group Omniback_Ports access-list ILO_DC_acl extended permit tcp object-group ILO_DC_Anti_Spoofing object-group HP_Mon_Hosts eq 135 access-list ILO_DC_acl extended permit tcp object-group ILO_DC_Anti_Spoofing object-group HP_Mon_Hosts range 381 383 access-list ILO_DC_acl extended permit tcp object-group ILO_DC_Anti_Spoofing object-group HP_Mon_Hosts range 10000 10200 access-list ILO_DC_acl extended permit tcp object-group ILO_DC_Anti_Spoofing object-group HP_Mon_Hosts range 14000 14010 access-list ILO_DC_acl extended permit udp object-group ILO_DC_Anti_Spoofing object-group HP_Mon_Hosts range snmp snmptrap access-list ILO_DC_acl extended permit udp object-group ILO_DC_Anti_Spoofing host HPMon3 range snmp snmptrap access-list ILO_DC_acl extended permit icmp object-group ILO_DC_Anti_Spoofing host HP_Pri_OVO_MgtSvr access-list ILO_DC_acl extended permit icmp object-group ILO_DC_Anti_Spoofing host HP_Sec_OVO_MgtSvr access-list ILO_DC_acl extended permit icmp object-group ILO_DC_Anti_Spoofing host HPMon3 access-list ILO_DC_acl extended deny ip object-group ILO_DC_Anti_Spoofing any pager lines 30 logging on logging timestamp logging buffer-size 4096 logging buffered debugging logging trap debugging logging host TRS_DC_IN 10.156.202.102 logging host ITC_NW GALA 17/1688 mtu TRS_DC_IN 1500 mtu low_secure_intf 1500 mtu DCB_CP 1500 mtu CSR_CL 1500 mtu CSR_CG 1500 mtu CFV_DC 1500 mtu TMP_CG 1500 mtu TMP_RS 1500 mtu ITC_NW 1500 mtu WOR_DC 1500 mtu MGT_DC 1500 mtu ENM_DC 1500 mtu TMP_SZ 1500 mtu TMP_SZ1 1500 mtu STA_AS 1500 mtu CCL_AS 1500 mtu TMP_CM 1500 mtu ENR_DC 1500 mtu TMP_AS 1500 mtu TMP_A2 1500 mtu DCB_AS 1500 mtu EMS_DC 1500 mtu DCB_CM 1500 mtu TMP_SZ2 1500 mtu DCB_RHL 1500 mtu STA_CP 1500 mtu ILO_DC 1500 ip address TRS_DC_IN 10.150.205.3 255.255.255.248 standby 10.150.205.2 ip address low_secure_intf 10.149.1.3 255.255.255.0 standby 10.149.1.2 ip address DCB_CP 10.150.134.3 255.255.255.0 standby 10.150.134.2 ip address CSR_CL 10.150.210.3 255.255.255.0 standby 10.150.210.2 ip address CSR_CG 10.150.211.3 255.255.255.0 standby 10.150.211.2 ip address CFV_DC 10.150.252.3 255.255.255.0 standby 10.150.252.2 ip address TMP_CG Cisco7204_HSRP 255.255.255.192 standby 10.61.12.2 ip address TMP_RS 10.61.12.209 255.255.255.240 standby 10.61.12.210 ip address ITC_NW 10.150.200.1 255.255.255.0 standby 10.150.200.2 ip address WOR_DC 10.150.201.1 255.255.255.0 standby 10.150.201.2 ip address MGT_DC 10.150.255.3 255.255.255.0 standby 10.150.255.2 ip address ENM_DC 10.150.253.1 255.255.255.248 standby 10.150.253.2 ip address TMP_SZ 10.150.130.114 255.255.255.240 standby 10.150.130.113 ip address TMP_SZ1 10.150.130.3 255.255.255.192 standby 10.150.130.2 ip address STA_AS 10.150.128.3 255.255.255.192 standby 10.150.128.2 ip address CCL_AS 10.150.128.65 255.255.255.192 standby 10.150.128.67 ip address TMP_CM 10.61.12.193 255.255.255.240 standby 10.61.12.194 ip address ENR_DC 10.200.32.210 255.255.255.240 standby 10.200.32.211 ip address TMP_AS 10.61.12.145 255.255.255.240 standby 10.61.12.146 ip address TMP_A2 10.61.12.161 255.255.255.240 standby 10.61.12.162 ip address DCB_AS 10.150.131.3 255.255.255.0 standby 10.150.131.1 ip address EMS_DC 10.150.253.17 255.255.255.240 standby 10.150.253.18 ip address DCB_CM 10.150.132.3 255.255.255.0 standby 10.150.132.2 ip address TMP_SZ2 10.150.130.65 255.255.255.240 standby 10.150.130.66 ip address DCB_RHL 10.150.136.3 255.255.255.0 standby 10.150.136.2 ip address STA_CP 10.150.128.193 255.255.255.192 standby 10.150.128.194 ip address ILO_DC 172.200.0.1 255.255.0.0 standby 172.200.0.2 failover failover lan unit primary failover lan interface fo_state_stat vlan 700 failover polltime unit 1 holdtime 15 failover polltime interface 15 failover interface-policy 100% failover replication http failover link fo_state_sync vlan 800 failover interface ip fo_state_stat 10.7.1.3 255.255.255.0 standby 10.7.1.2 failover interface ip fo_state_sync 10.8.1.3 255.255.255.0 standby 10.8.1.2 monitor-interface TRS_DC_IN monitor-interface DCB_CP monitor-interface CSR_CL monitor-interface CSR_CG monitor-interface CFV_DC monitor-interface TMP_CG monitor-interface TMP_RS monitor-interface ITC_NW monitor-interface WOR_DC monitor-interface MGT_DC monitor-interface ENM_DC monitor-interface TMP_SZ monitor-interface TMP_SZ1 monitor-interface STA_AS monitor-interface CCL_AS monitor-interface TMP_CM monitor-interface ENR_DC monitor-interface TMP_AS monitor-interface TMP_A2 monitor-interface DCB_AS monitor-interface EMS_DC monitor-interface DCB_CM monitor-interface TMP_SZ2 monitor-interface DCB_RHL monitor-interface STA_CP monitor-interface ILO_DC icmp permit any TRS_DC_IN icmp permit any low_secure_intf icmp permit any DCB_CP icmp permit any CSR_CL icmp permit any CSR_CG icmp permit any CFV_DC icmp permit host Yavin CFV_DC icmp permit any TMP_CG icmp permit any TMP_RS icmp permit any ITC_NW icmp permit any WOR_DC icmp permit host 10.150.201.102 WOR_DC icmp permit any MGT_DC icmp permit any ENM_DC icmp permit host HPMon3 ENM_DC icmp permit host HP_Pri_OVO_MgtSvr ENM_DC icmp permit host HP_Sec_OVO_MgtSvr ENM_DC icmp permit any TMP_SZ icmp permit any TMP_SZ1 icmp permit any STA_AS icmp permit any CCL_AS icmp permit any TMP_CM icmp permit any ENR_DC icmp permit any TMP_AS icmp permit any TMP_A2 icmp permit any DCB_AS icmp permit any EMS_DC icmp permit any DCB_CM icmp permit any TMP_SZ2 icmp permit any DCB_RHL icmp permit any STA_CP icmp permit any ILO_DC pdm location Luthien 255.255.255.255 CSR_CG pdm location Galadriel 255.255.255.255 CSR_CG pdm location Rodian 255.255.255.255 TMP_CG pdm location Luthien 255.255.255.255 TMP_CG pdm location Galadriel 255.255.255.255 TMP_CG pdm location Orome 255.255.255.255 TMP_CG pdm location HP_Pri_OVO_MgtSvr 255.255.255.255 TMP_RS pdm location HP_Sec_OVO_MgtSvr 255.255.255.255 TMP_RS pdm location SGCalypso8 255.255.255.255 TRS_DC_IN pdm location SGCalypso7 255.255.255.255 TRS_DC_IN pdm location SGCalypso6 255.255.255.255 TRS_DC_IN pdm location SGCalypso5 255.255.255.255 TRS_DC_IN pdm location Marlex 255.255.255.255 TRS_DC_IN pdm location CLNT07 255.255.255.255 DCB_CP pdm location Gasgano 255.255.255.255 CFV_DC pdm location Resi_Proche_Server 255.255.255.255 TMP_RS pdm location Resi_Jaguar_Server 255.255.255.255 TMP_RS pdm location 10.150.210.103 255.255.255.255 CSR_CL pdm location Melasia1 255.255.255.255 TRS_DC_IN pdm location varda 255.255.255.255 CFV_DC pdm location Durin 255.255.255.255 CFV_DC pdm location Whiphid 255.255.255.255 CFV_DC pdm location Aumida 255.255.255.255 CFV_DC pdm location SGTitan1 255.255.255.255 TRS_DC_IN pdm location SGTitan2 255.255.255.255 TRS_DC_IN pdm location SGOrion1 255.255.255.255 TRS_DC_IN pdm location SGOrion2 255.255.255.255 TRS_DC_IN pdm location SGTitan1 255.255.255.255 CFV_DC pdm location Security_Ctrl_Zone 255.255.255.0 CFV_DC pdm location SGCalypso3 255.255.255.255 TRS_DC_IN pdm location SGCalypso4 255.255.255.255 TRS_DC_IN pdm location host10_156_129_74 255.255.255.255 CFV_DC pdm location Postman201-smts 255.255.255.255 CFV_DC pdm location Flamingo_SMTPRelay 255.255.255.255 CFV_DC pdm location Arien 255.255.255.255 TRS_DC_IN pdm location Orome 255.255.255.255 TRS_DC_IN pdm location Neucleus1 255.255.255.255 TRS_DC_IN pdm location Arien 255.255.255.255 TMP_CG pdm location Neucleus1 255.255.255.255 TMP_CG pdm location Rodian 255.255.255.255 TRS_DC_IN pdm location Worrt 255.255.255.255 CSR_CL pdm location Phoenix 255.255.255.255 TRS_DC_IN pdm location 10.200.0.0 255.254.0.0 TRS_DC_IN pdm location CRLNT02 255.255.255.255 TRS_DC_IN pdm location CRLNT09 255.255.255.255 TRS_DC_IN pdm location Warrick 255.255.255.255 CSR_CG pdm location VPN_Aventail 255.255.255.255 TRS_DC_IN pdm location Postman201-smts 255.255.255.255 TRS_DC_IN pdm location HPMon3 255.255.255.255 TMP_RS pdm location HPMon3 255.255.255.255 ENM_DC pdm location 172.22.22.4 255.255.255.255 TRS_DC_IN pdm location 172.24.8.64 255.255.255.192 TRS_DC_IN pdm location 172.24.8.130 255.255.255.255 TRS_DC_IN pdm location host_172_24_20_12 255.255.255.255 TRS_DC_IN pdm location Core_Rtr_Zone 255.255.255.240 TRS_DC_IN pdm location Dianoga 255.255.255.255 CSR_CL pdm location Skyworld 255.255.255.255 CSR_CG pdm location IMS_Database_Srv 255.255.255.255 CSR_CG pdm location Corp_Control_Subnet 255.255.255.0 CFV_DC pdm location Wandrella 255.255.255.255 CFV_DC pdm location TMP_SZ_Subnet 255.255.255.240 CFV_DC pdm location Ascott-BPE-Srv 255.255.255.255 CFV_DC pdm location 10.150.205.3 255.255.255.255 CFV_DC pdm location Fortigate 255.255.255.255 CFV_DC pdm location 10.154.63.0 255.255.255.0 CFV_DC pdm location 10.156.201.0 255.255.255.0 CFV_DC pdm location 10.157.176.0 255.255.255.0 CFV_DC pdm location TMP_CG_subnet 255.255.255.0 TMP_CG pdm location Exindar_MonitorUnit 255.255.255.255 MGT_DC pdm location HP_MWA_Mgt_Svr 255.255.255.255 TRS_DC_IN pdm location HP_CODA_Mgt_Svr 255.255.255.255 TRS_DC_IN pdm location 10.150.205.6 255.255.255.255 CFV_DC pdm location 192.170.75.0 255.255.255.0 ENM_DC pdm location HP_Pri_OVO_MgtSvr 255.255.255.255 ENM_DC pdm location HP_Sec_OVO_MgtSvr 255.255.255.255 ENM_DC pdm location SGTitan1 255.255.255.254 CFV_DC pdm location SGCalypso6 255.255.255.248 CFV_DC pdm location GALA 255.255.255.255 TRS_DC_IN pdm location Xavier 255.255.255.255 ITC_NW pdm location 10.150.200.16 255.255.255.255 ITC_NW pdm location 10.150.200.17 255.255.255.255 ITC_NW pdm location CLNS01 255.255.255.255 TRS_DC_IN pdm location Galaxy 255.255.255.255 CFV_DC pdm location Ascott_Mediaring_Qbox 255.255.255.255 TRS_DC_IN pdm location Acklay 255.255.255.255 TMP_SZ1 pdm location SGCalypso8 255.255.255.255 CFV_DC pdm location SGCalypso7 255.255.255.255 CFV_DC pdm location SGTitan1 255.255.255.255 STA_AS pdm location CCL_Bishop 255.255.255.255 CCL_AS pdm location Ascott_Dubai 255.255.255.255 TRS_DC_IN pdm location MediaRing_Host1 255.255.255.255 CFV_DC pdm location MediaRing_Host3 255.255.255.255 CFV_DC pdm location MediaRing_Host4 255.255.255.255 CFV_DC pdm location MediaRing_Host5 255.255.255.255 CFV_DC pdm location MediaRing_Host8 255.255.255.255 CFV_DC pdm location MediaRing_Host6 255.255.255.255 CFV_DC pdm location MediaRing_Host7 255.255.255.255 CFV_DC pdm location Phoenix 255.255.255.255 TMP_CM pdm location Comm_BU_Net 255.255.0.0 TMP_CG pdm location Havok 255.255.255.255 TMP_CM pdm location 10.61.12.203 255.255.255.255 TMP_CM pdm location Monitor-PC 255.255.255.255 TMP_CG pdm location Evanzan 255.255.255.255 TMP_CG pdm location Evanzon 255.255.255.255 TMP_CG pdm location Holocam 255.255.255.255 TMP_CG pdm location 10.150.201.103 255.255.255.255 WOR_DC pdm location Iceman 255.255.255.255 TMP_CM pdm location CCL_Rogue 255.255.255.255 TRS_DC_IN pdm location MediaRing_Host2 255.255.255.255 CFV_DC pdm location SGCalypso6 255.255.255.254 TRS_DC_IN pdm location Ascott_Mediaring_Qbox 255.255.255.255 CFV_DC pdm location Melasia1 255.255.255.255 ITC_NW pdm location SGCalyso1 255.255.255.255 TRS_DC_IN pdm location Ascott_BU_Net 255.255.0.0 CFV_DC pdm location CCL_Rogue 255.255.255.255 CFV_DC pdm location 10.61.12.34 255.255.255.255 TMP_CG pdm location Iceman 255.255.255.255 TRS_DC_IN pdm location Iceman 255.255.255.255 TMP_SZ1 pdm location Havok 255.255.255.255 TMP_SZ1 pdm location HP_MWA_Mgt_Svr 255.255.255.255 ENM_DC pdm location Magneto 255.255.255.255 CFV_DC pdm location Yavin 255.255.255.255 TMP_CG pdm location Gambit 255.255.255.255 TMP_CM pdm location Caliban 255.255.255.255 TMP_CM pdm location Singnet_SMTP 255.255.255.255 CFV_DC pdm location Lucas_MailSvr 255.255.255.255 CFV_DC pdm location Office_CVS_Server 255.255.255.255 CFV_DC pdm location Calisto 255.255.255.255 TRS_DC_IN pdm location Wandrella 255.255.255.255 TMP_SZ1 pdm location Resi_Proche_Server 255.255.255.255 TRS_DC_IN pdm location Ariel 255.255.255.255 TRS_DC_IN pdm location Calisto 255.255.255.255 CFV_DC pdm location 172.22.22.6 255.255.255.255 TRS_DC_IN pdm location Phoenix 255.255.255.255 TMP_CG pdm location 10.156.2.228 255.255.255.255 TRS_DC_IN pdm location SGDeimos1 255.255.255.255 TMP_CG pdm location SGDeimos2 255.255.255.255 TMP_CG pdm location 10.200.18.6 255.255.255.255 TRS_DC_IN pdm location Anakin 255.255.255.255 CSR_CG pdm location Anakin 255.255.255.255 TRS_DC_IN pdm location Ascott_TL_Router 255.255.255.255 TRS_DC_IN pdm location CCL2M 255.255.255.255 TRS_DC_IN pdm location Ascott_SQL_VIP 255.255.255.255 DCB_AS pdm location Phobos1 255.255.255.255 TMP_AS pdm location Acapulco 255.255.255.255 TMP_AS pdm location 10.156.202.108 255.255.255.255 TRS_DC_IN pdm location 10.200.0.0 255.254.0.0 ENR_DC pdm location 10.150.205.6 255.255.255.255 TRS_DC_IN pdm location Ariel 255.255.255.255 TMP_AS pdm location Trendmicro 255.255.255.255 TMP_CG pdm location Prospero 255.255.255.255 TMP_AS pdm location 10.200.32.213 255.255.255.255 ENR_DC pdm location Ascott_SQL_VIP 255.255.255.255 TMP_A2 pdm location DPRStephano1 255.255.255.255 TRS_DC_IN pdm location 10.153.2.52 255.255.255.255 TRS_DC_IN pdm location Ariel 255.255.255.255 DCB_AS pdm location 10.61.12.170 255.255.255.255 TMP_A2 pdm location SGStephno1 255.255.255.255 TMP_A2 pdm location SGDeimos2 255.255.255.255 TMP_A2 pdm location SMTP_Relay_Server 255.255.255.255 TRS_DC_IN pdm location AscottExchange3 255.255.255.255 TRS_DC_IN pdm location SGpluto1 255.255.255.255 CFV_DC pdm location 10.153.2.28 255.255.255.255 CFV_DC pdm location HPMon3 255.255.255.255 TMP_SZ pdm location SGDeimos1 255.255.255.255 TMP_A2 pdm location HP_Sec_OVO_MgtSvr 255.255.255.255 TMP_AS pdm location Ascott_CHN_SQLSvr 255.255.255.255 CFV_DC pdm location ASKR_Deimos1 255.255.255.255 CFV_DC pdm location ASKR_TEST 255.255.255.255 CFV_DC pdm location Ascot_Korea 255.255.255.0 CFV_DC pdm location Ascott_SQL_VIP 255.255.255.255 TRS_DC_IN pdm location Ariel 255.255.255.255 TMP_A2 pdm location BACKUPCLNS 255.255.255.255 TRS_DC_IN pdm location Jubilee 255.255.255.255 TRS_DC_IN pdm location CRLNT10 255.255.255.255 TMP_RS pdm location CRLNT10 255.255.255.255 TRS_DC_IN pdm location GALA 255.255.255.255 ITC_NW pdm location SGStephno1 255.255.255.255 TMP_AS pdm location 10.153.1.91 255.255.255.255 CFV_DC pdm location 10.150.253.13 255.255.255.255 EMS_DC pdm location AscottRT 255.255.255.255 CFV_DC pdm location 10.154.1.0 255.255.255.0 TRS_DC_IN pdm location ASKR_Pluto1 255.255.255.255 CFV_DC pdm location PIX_VPN_Inside_int 255.255.255.255 CFV_DC pdm location CLG001 255.255.255.255 ENR_DC pdm location CLG101 255.255.255.255 ENR_DC pdm location Anakin_ 255.255.255.255 EMS_DC pdm location RP_Exinda_Opt 255.255.255.255 TRS_DC_IN pdm location RP_Exinda_Opt 255.255.255.255 CFV_DC pdm location Ascott_BU_Net 255.255.0.0 TRS_DC_IN pdm location Resi_BU_Net 255.255.0.0 TRS_DC_IN pdm location 10.150.201.102 255.255.255.255 TRS_DC_IN pdm location Control_DT_102 255.255.255.255 TRS_DC_IN pdm location Ascott_BU_Net 255.255.0.0 ENR_DC pdm location Optimizer_DC 255.255.255.255 MGT_DC pdm location ASTL_DEIMOS1 255.255.255.255 CFV_DC pdm location Ascott_HQ_H1 255.255.255.255 CFV_DC pdm location Jason_PC 255.255.255.254 CFV_DC pdm location Blandine_PC 255.255.255.255 CFV_DC pdm location Thomas_PC 255.255.255.255 CFV_DC pdm location AS_SG_Admin 255.255.255.248 CFV_DC pdm location AS_Oracle_AdmHost1 255.255.255.255 CFV_DC pdm location AS_Oracle_Admin1 255.255.255.248 CFV_DC pdm location AS_Oracle_Admin2 255.255.255.248 CFV_DC pdm location ASTL_Printserver 255.255.255.255 CFV_DC pdm location ASTL_SuperIP 255.255.255.255 CFV_DC pdm location ASTL_NET_10-153-75 255.255.255.0 TRS_DC_IN pdm location ASTL_NET_10-153-75 255.255.255.0 CFV_DC pdm location Ascott_Malaysia 255.255.255.0 CFV_DC pdm location ASML_SuperIP 255.255.255.255 CFV_DC pdm location Ascott_Malaysia 255.255.255.255 CFV_DC pdm location ASML_Deimos1 255.255.255.255 CFV_DC pdm location Dashade 255.255.255.255 CSR_CG pdm location Anakin_ 255.255.255.255 ENM_DC pdm location Fortigate 255.255.255.255 TRS_DC_IN pdm location TMP_CG_subnet 255.255.255.0 TRS_DC_IN pdm location ITC_NW_subnet 255.255.255.255 TRS_DC_IN pdm location ITC_NW_subnet 255.255.255.0 TRS_DC_IN pdm location Comm_BU_Net 255.255.0.0 TRS_DC_IN pdm location 10.150.200.6 255.255.255.255 ITC_NW pdm location VPN_Aventail 255.255.255.255 CFV_DC pdm location host10_156_2_19 255.255.255.255 TRS_DC_IN pdm location 10.200.3.101 255.255.255.255 EMS_DC pdm location 10.200.3.101 255.255.255.255 ENR_DC pdm location 202.138.112.194 255.255.255.255 TRS_DC_IN pdm location 202.138.112.194 255.255.255.255 CFV_DC pdm location 192.170.75.0 255.255.255.255 ENM_DC pdm location 10.150.201.101 255.255.255.255 TRS_DC_IN pdm location Control_DT_101 255.255.255.255 WOR_DC pdm location TEST 255.255.255.255 CFV_DC pdm location Hui_Juien_PC 255.255.255.255 TRS_DC_IN pdm location KC_IP 255.255.255.255 TRS_DC_IN pdm location Lobot 255.255.255.255 TRS_DC_IN pdm location Cable 255.255.255.255 TRS_DC_IN pdm location AScott_TT 255.255.255.0 TRS_DC_IN pdm location 10.150.201.109 255.255.255.255 WOR_DC pdm location AEDeimos1 255.255.255.255 CFV_DC pdm location Iarwain 255.255.255.255 TMP_SZ pdm location 10.154.1.36 255.255.255.255 TRS_DC_IN pdm location Sicrus_Server 255.255.255.255 TMP_CG pdm location Retail_Net_GW41_1 255.255.255.255 CFV_DC pdm location Retail_Net_GW41_1 255.255.255.255 TRS_DC_IN pdm location Falleen 255.255.255.255 DCB_CP pdm location TMP_A2_Subnet 255.255.255.240 TMP_AS pdm location Prospero 255.255.255.255 DCB_AS pdm location SGpluto1 255.255.255.255 TRS_DC_IN pdm location 10.153.1.12 255.255.255.255 TRS_DC_IN pdm location 10.61.12.153 255.255.255.255 TMP_AS pdm location Saturn 255.255.255.255 TMP_AS pdm location 10.153.1.41 255.255.255.255 TMP_AS pdm location Neptune 255.255.255.255 TMP_AS pdm location Ascott_SQL_VIP 255.255.255.255 TMP_AS pdm location Raffles_BU_Net 255.255.0.0 CFV_DC pdm location 10.0.0.0 255.0.0.0 low_secure_intf pdm location Cyclops 255.255.255.255 TMP_CM pdm location Maverick 255.255.255.255 TMP_CM pdm location Cable 255.255.255.255 TMP_CM pdm location SIS_Server1 255.255.255.255 CFV_DC pdm location Raffles_FW1 255.255.255.255 TRS_DC_IN pdm location Raffles_FW2 255.255.255.255 CFV_DC pdm location Raffles_FW1 255.255.255.255 low_secure_intf pdm location Raffles_FW2 255.255.255.255 low_secure_intf pdm location 10.150.131.109 255.255.255.255 DCB_AS pdm location 10.154.8.99 255.255.255.255 CFV_DC pdm location DPRCalypso2 255.255.255.255 TRS_DC_IN pdm location CLG001 255.255.255.255 EMS_DC pdm location CLG101 255.255.255.255 EMS_DC pdm location RP_Exinda_Opt 255.255.255.255 ENR_DC pdm location 10.156.202.102 255.255.255.255 TRS_DC_IN pdm location VPN_Aventail2 255.255.255.255 CFV_DC pdm location Raffles_FW2 255.255.255.255 TRS_DC_IN pdm location Raffles_FW1 255.255.255.255 CFV_DC pdm location VPN_Aventail2 255.255.255.255 EMS_DC pdm location Flamingo_SMTPRelay 255.255.255.255 TRS_DC_IN pdm location 203.116.1.93 255.255.255.255 CFV_DC pdm location Netrust_LDAP 255.255.255.255 CFV_DC pdm location 203.116.254.150 255.255.255.255 TRS_DC_IN pdm location 10.153.1.146 255.255.255.255 ENR_DC pdm location CA_Staging_CT 255.255.255.255 TRS_DC_IN pdm location Brocade_Switch 255.255.255.255 TMP_CG pdm location ControlPC1 255.255.255.252 ITC_NW pdm location 10.0.0.0 255.0.0.0 CFV_DC pdm location HP_CODA_Mgt_Svr 255.255.255.255 ENM_DC pdm location SGOrion2 255.255.255.255 DCB_AS pdm location host10_156_2_19 255.255.255.255 TMP_RS pdm location TEST_PC 255.255.255.255 TMP_CM pdm location HPMS2 255.255.255.255 TMP_CG pdm location DMZ 255.255.255.192 TMP_AS pdm location 10.153.2.180 255.255.255.255 CFV_DC pdm location 10.150.120.2 255.255.255.255 TRS_DC_IN pdm location 10.156.202.152 255.255.255.255 TRS_DC_IN pdm location 10.156.202.153 255.255.255.255 TRS_DC_IN pdm location 10.156.202.154 255.255.255.255 TRS_DC_IN pdm location 10.156.202.155 255.255.255.255 TRS_DC_IN pdm location 10.150.119.65 255.255.255.255 TRS_DC_IN pdm location 10.150.119.65 255.255.255.255 CFV_DC pdm location 10.100.100.0 255.255.255.0 TRS_DC_IN pdm location Buz_Partner 255.255.255.0 CFV_DC pdm location Pri_Svr_Zone 255.255.255.0 CFV_DC pdm location 10.153.2.0 255.255.255.0 CFV_DC pdm location AS_Grand_Carnhill 255.255.255.0 CFV_DC pdm location AS_Orchard 255.255.255.0 CFV_DC pdm location AS_Bencoolen 255.255.255.0 CFV_DC pdm location AS_Compass 255.255.255.0 CFV_DC pdm location AS_TAS 255.255.255.0 CFV_DC pdm location 10.153.35.0 255.255.255.0 CFV_DC pdm location 10.153.36.0 255.255.255.0 CFV_DC pdm location 10.153.37.0 255.255.255.0 CFV_DC pdm location 10.153.38.0 255.255.255.0 CFV_DC pdm location 10.153.39.0 255.255.255.0 CFV_DC pdm location 10.153.40.0 255.255.255.0 CFV_DC pdm location 10.153.50.0 255.255.255.0 CFV_DC pdm location 10.153.51.0 255.255.255.0 CFV_DC pdm location 10.153.52.0 255.255.255.0 CFV_DC pdm location 10.153.53.0 255.255.255.0 CFV_DC pdm location 10.153.71.0 255.255.255.0 CFV_DC pdm location 10.153.73.0 255.255.255.0 CFV_DC pdm location 10.153.74.0 255.255.255.0 CFV_DC pdm location 10.153.100.0 255.255.255.0 CFV_DC pdm location Ascott_Dubai 255.255.255.255 CFV_DC pdm location 10.153.138.0 255.255.255.0 CFV_DC pdm location 10.153.254.232 255.255.255.248 CFV_DC pdm location 10.153.254.240 255.255.255.248 CFV_DC pdm location 10.153.254.248 255.255.255.248 CFV_DC pdm location Funan 255.255.255.0 CFV_DC pdm location 10.154.33.0 255.255.255.0 CFV_DC pdm location 10.154.34.0 255.255.255.0 CFV_DC pdm location 10.154.35.0 255.255.255.0 CFV_DC pdm location 10.154.36.0 255.255.255.0 CFV_DC pdm location 10.154.37.0 255.255.255.0 CFV_DC pdm location 10.154.39.0 255.255.255.0 CFV_DC pdm location 10.154.49.0 255.255.255.0 CFV_DC pdm location 10.154.50.0 255.255.255.0 CFV_DC pdm location 10.154.51.0 255.255.255.0 CFV_DC pdm location 10.154.52.0 255.255.255.0 CFV_DC pdm location 10.156.129.0 255.255.255.0 CFV_DC pdm location 192.168.181.0 255.255.255.0 CFV_DC pdm location 10.150.200.80 255.255.255.255 ITC_NW pdm location host10_150_200_98 255.255.255.255 ITC_NW pdm location DCPC 255.255.255.255 ITC_NW pdm location ControlPC1 255.255.255.254 ITC_NW pdm location 10.153.139.0 255.255.255.0 ENR_DC pdm location 10.153.140.0 255.255.255.0 ENR_DC pdm location 10.153.141.0 255.255.255.0 ENR_DC pdm location 10.153.142.0 255.255.255.0 ENR_DC pdm location 10.153.143.0 255.255.255.0 ENR_DC pdm location 10.153.144.0 255.255.255.0 ENR_DC pdm location 10.153.145.0 255.255.255.0 ENR_DC pdm location 10.153.146.0 255.255.255.0 ENR_DC pdm location 10.153.147.0 255.255.255.0 ENR_DC pdm location 10.153.148.0 255.255.255.0 ENR_DC pdm location 10.153.149.0 255.255.255.0 ENR_DC pdm location 10.153.150.0 255.255.255.0 ENR_DC pdm location 10.153.151.0 255.255.255.0 ENR_DC pdm location SGCalypso6 255.255.255.255 DCB_AS pdm location SGCalypso5 255.255.255.255 DCB_AS pdm location DCB_CM_Subnet 255.255.255.0 DCB_AS pdm location Dazzler 255.255.255.255 DCB_CM pdm location Melasia1 255.255.255.255 DCB_CM pdm location GALA 255.255.255.255 DCB_CM pdm location 202.172.234.171 255.255.255.255 CFV_DC pdm location DC_105 255.255.255.255 WOR_DC pdm location CLGServer001 255.255.255.255 ENR_DC pdm location CLGServer101 255.255.255.255 ENR_DC pdm location ArchivalTest 255.255.255.255 TMP_SZ2 pdm location 10.156.202.0 255.255.255.0 TRS_DC_IN pdm location SGCalypso7 255.255.255.255 DCB_AS pdm location DCB_CM_Subnet 255.255.255.0 TMP_SZ pdm location DCB_CM_Subnet 255.255.255.0 TMP_CM pdm location SGCalypso8 255.255.255.255 DCB_AS pdm location Ascott_Dubai 255.255.255.0 CFV_DC pdm location 10.150.202.102 255.255.255.255 TRS_DC_IN pdm location MGT_DC_Subnet 255.255.255.0 CFV_DC pdm location 10.156.202.150 255.255.255.255 TRS_DC_IN pdm location 10.154.1.4 255.255.255.255 TRS_DC_IN pdm location 10.200.0.0 255.252.0.0 EMS_DC pdm location Raffles-com 255.255.255.255 TMP_AS pdm location Raffles-com 255.255.255.255 CFV_DC pdm location 10.61.12.153 255.255.255.255 DCB_AS pdm location JoanneTan 255.255.255.255 TRS_DC_IN pdm location 10.156.202.199 255.255.255.255 TRS_DC_IN pdm location TMP_CG_subnet 255.255.255.0 CFV_DC pdm location 10.150.0.0 255.255.0.0 CFV_DC pdm location Optimizer_DC 255.255.255.255 TRS_DC_IN pdm location Raffles_Host_03 255.255.255.255 TRS_DC_IN pdm location VLAN888 255.255.255.0 TRS_DC_IN pdm location VLAN888 255.255.255.192 TRS_DC_IN pdm location Dazzler 255.255.255.255 TRS_DC_IN pdm location Ackbar 255.255.255.255 CSR_CG pdm location 128.8.10.28 255.255.255.255 CFV_DC pdm location 128.8.10.90 255.255.255.255 CFV_DC pdm location 10.150.131.109 255.255.255.255 EMS_DC pdm location 10.150.131.109 255.255.255.255 DCB_CM pdm location DUALITY 255.255.255.255 TMP_SZ2 pdm location DUALITY 255.255.255.255 TMP_A2 pdm location TMP_SZ2 255.255.255.240 TMP_CG pdm location DMZ 255.255.255.192 CFV_DC pdm location 194.170.246.135 255.255.255.255 CFV_DC pdm location CT_CA_Console 255.255.255.255 TRS_DC_IN pdm location COMM-CONTROL1 255.255.255.255 TRS_DC_IN pdm location DMZ 255.255.255.192 TMP_CG pdm location TMP_RS_Subnet 255.255.255.240 TMP_A2 pdm location Neptune 255.255.255.255 TMP_CM pdm location Neptune 255.255.255.255 TMP_A2 pdm location DMZ 255.255.255.240 CFV_DC pdm location DMZ 255.255.255.240 TMP_AS pdm location Tessek_ 255.255.255.255 TMP_SZ2 pdm location 10.154.64.2 255.255.255.255 TRS_DC_IN pdm location FootFall_PC 255.255.255.255 TRS_DC_IN pdm location 211.152.32.81 255.255.255.255 CFV_DC pdm location Aventail_VPN_Pool 255.255.254.0 CFV_DC pdm location Bigatom 255.255.255.255 TMP_CG pdm location Flamingo_SMTPRelay 255.255.255.255 TMP_RS pdm location 10.156.2.30 255.255.255.255 TRS_DC_IN pdm location Marlex 255.255.255.255 ITC_NW pdm location Corp_BU_Net 255.255.248.0 TRS_DC_IN pdm location Comm_BU_Net 255.255.248.0 TRS_DC_IN pdm location 203.125.137.126 255.255.255.255 ITC_NW pdm location 10.156.202.220 255.255.255.255 TRS_DC_IN pdm location 10.154.38.0 255.255.255.0 TRS_DC_IN pdm location 10.200.0.0 255.255.0.0 ENR_DC pdm location 10.200.5.9 255.255.255.255 ENR_DC pdm location 10.200.5.10 255.255.255.255 ENR_DC pdm location Prospero 255.255.255.255 TMP_A2 pdm location Chripa 255.255.255.255 TMP_CG pdm location 10.154.64.10 255.255.255.255 TMP_CG pdm location 203.125.137.126 255.255.255.255 TRS_DC_IN pdm location 10.150.201.102 255.255.255.255 WOR_DC pdm location Ascott-BPE-Srv 255.255.255.255 TRS_DC_IN pdm location Rodian 255.255.255.255 CFV_DC pdm location Orome 255.255.255.255 TMP_SZ pdm location Retail_Net_GW41_1 255.255.255.255 TMP_CG pdm location 10.154.4.247 255.255.255.255 TRS_DC_IN pdm location 10.154.63.6 255.255.255.255 TRS_DC_IN pdm location 172.22.22.4 255.255.255.255 CFV_DC pdm location CCL_Bishop 255.255.255.255 STA_AS pdm location Dazzler 255.255.255.255 STA_AS pdm location Phoenix 255.255.255.255 CCL_AS pdm location Dazzler 255.255.255.255 TMP_CG pdm location 172.24.8.110 255.255.255.255 TRS_DC_IN pdm location 10.153.2.12 255.255.255.255 CFV_DC pdm location IPQ_Subnet 255.255.255.0 TRS_DC_IN pdm location 10.150.120.61 255.255.255.255 TRS_DC_IN pdm location DPRCalypso1 255.255.255.255 TRS_DC_IN pdm location 10.153.46.0 255.255.255.0 CFV_DC pdm location 10.153.46.12 255.255.255.255 CFV_DC pdm location 10.154.1.254 255.255.255.255 TRS_DC_IN pdm location 10.156.202.220 255.255.255.255 CFV_DC pdm location Arien 255.255.255.255 TMP_CM pdm location Ackbar 255.255.255.255 TMP_CM pdm location Tessek 255.255.255.255 TMP_SZ1 pdm location ManWe 255.255.255.255 CSR_CG pdm location MGT_DC_Subnet 255.255.255.0 ENM_DC pdm location 172.24.8.122 255.255.255.255 TRS_DC_IN pdm location Security_Ctrl_Zone 255.255.255.0 ITC_NW pdm location Colossus 255.255.255.255 TMP_SZ1 pdm location RHLSVRNOM1 255.255.255.255 TRS_DC_IN pdm location 10.156.202.198 255.255.255.255 TRS_DC_IN pdm location CLNS01 255.255.255.255 CFV_DC pdm location TMP_CG_subnet 255.255.255.192 TRS_DC_IN pdm location 10.150.123.45 255.255.255.255 MGT_DC pdm location Callista 255.255.255.255 DCB_RHL pdm location Alavar 255.255.255.255 DCB_RHL pdm location SarDBVirt 255.255.255.255 CSR_CL pdm location SarCIAPPSVirt 255.255.255.255 CSR_CL pdm location SarDBCIVirt 255.255.255.255 CSR_CL pdm location Dengar 255.255.255.255 TMP_SZ1 pdm location 203.125.30.97 255.255.255.255 CFV_DC pdm location 203.125.30.99 255.255.255.255 CFV_DC pdm location Control_DT_101 255.255.255.255 TRS_DC_IN pdm location Aragorn 255.255.255.255 CFV_DC pdm location 10.150.203.105 255.255.255.255 CFV_DC pdm location 10.154.34.0 255.255.255.0 TRS_DC_IN pdm location BACKUPCLNS 255.255.255.255 CFV_DC pdm location 10.61.12.174 255.255.255.255 TMP_A2 pdm location Rodian 255.255.255.255 DCB_CP pdm location CLG_CN_DNS 255.255.255.255 CFV_DC pdm location Colossus 255.255.255.255 DCB_CM pdm location Corsair 255.255.255.255 DCB_CM pdm location Trance 255.255.255.255 DCB_CM pdm location 10.154.1.0 255.255.255.0 CFV_DC pdm location 10.156.202.188 255.255.255.255 TRS_DC_IN pdm location Junct8_traffic_count 255.255.255.255 TRS_DC_IN pdm location 10.150.200.67 255.255.255.255 ITC_NW pdm location Elixir 255.255.255.255 DCB_CM pdm location Cosmo 255.255.255.255 DCB_CM pdm location Sidaster 255.255.255.255 TMP_CG pdm location Sidaster 255.255.255.255 CFV_DC pdm location Cosmo_ 255.255.255.255 CCL_AS pdm location Tessek 255.255.255.255 TRS_DC_IN pdm location CLG201 255.255.255.255 ENR_DC pdm location 10.154.65.249 255.255.255.255 TRS_DC_IN pdm location 10.154.65.250 255.255.255.255 TRS_DC_IN pdm location 10.154.65.66 255.255.255.255 TRS_DC_IN pdm location Muftakia 255.255.255.255 ITC_NW pdm location CLGServer001 255.255.255.255 ITC_NW pdm location CLGServer101 255.255.255.255 ITC_NW pdm location 172.24.7.78 255.255.255.255 TRS_DC_IN pdm location Saelt1 255.255.255.255 CSR_CG pdm location Saelt2 255.255.255.255 CSR_CG pdm location BARADA1 255.255.255.255 CSR_CG pdm location BARADA2 255.255.255.255 CSR_CG pdm location 172.24.0.0 255.255.0.0 TRS_DC_IN pdm location 10.154.38.1 255.255.255.255 TRS_DC_IN pdm location 10.156.202.33 255.255.255.255 TRS_DC_IN pdm location 10.155.0.101 255.255.255.255 TRS_DC_IN pdm location DCB_RHL_Subnet 255.255.255.0 DCB_CP pdm location 10.155.0.2 255.255.255.255 TRS_DC_IN pdm location 10.150.128.196 255.255.255.255 STA_CP pdm location 10.150.121.39 255.255.255.255 TRS_DC_IN pdm location 10.150.123.14 255.255.255.255 TRS_DC_IN pdm location 10.155.0.2 255.255.255.255 TMP_CG pdm location RHLSVRNOM1 255.255.255.255 TMP_CG pdm location 10.156.9.103 255.255.255.255 TMP_CM pdm location 10.154.65.66 255.255.255.255 TMP_CG pdm location 10.150.128.196 255.255.255.255 STA_AS pdm location 10.150.128.192 255.255.255.192 TRS_DC_IN pdm location Ackbar 255.255.255.255 TMP_CG pdm location Tessek_ 255.255.255.255 TRS_DC_IN pdm location Acapulco 255.255.255.255 TMP_SZ pdm location Aumida 255.255.255.255 TMP_CG pdm location Aumida 255.255.255.255 STA_CP pdm location 10.153.80.11 255.255.255.255 CFV_DC pdm location TT_10-156-202-190 255.255.255.255 TRS_DC_IN pdm location Net-10-156-131-0_0-32 255.255.255.224 CFV_DC pdm location 10.156.202.202 255.255.255.255 TRS_DC_IN pdm location DEMOCRM 255.255.255.255 CFV_DC pdm location DEMOCRM 255.255.255.255 CSR_CG pdm location Trebor 255.255.255.255 ITC_NW pdm location Comm_BU_Net 255.255.224.0 TRS_DC_IN pdm location 10.156.202.0 255.255.255.255 TRS_DC_IN pdm location Prospero 255.255.255.255 TRS_DC_IN pdm location 10.150.119.254 255.255.255.255 TRS_DC_IN pdm location EMC_DC 255.255.255.0 CSR_CG pdm location Frixgrizz 255.255.255.255 CSR_CG pdm location AS_Paris_Citrix 255.255.255.255 CFV_DC pdm location AS_Paris_Router 255.255.255.255 CFV_DC pdm location AS_Paris_Net 255.255.255.0 CFV_DC pdm location Ascott_PH_SMM 255.255.255.0 CFV_DC pdm location Frixgrizz 255.255.255.255 TRS_DC_IN pdm location AS_Paris_Citrix 255.255.255.255 TRS_DC_IN pdm location AS_Paris_Net 255.255.255.255 CFV_DC pdm location Magneto 255.255.255.255 STA_CP pdm location Magneto 255.255.255.255 TRS_DC_IN pdm location 213.130.50.253 255.255.255.255 CFV_DC pdm location 10.150.200.73 255.255.255.255 ITC_NW pdm location TMP_AS_Subnet 255.255.255.240 CFV_DC pdm location TMP_A2_Subnet 255.255.255.240 CFV_DC pdm location host10_154_4_122 255.255.255.255 TRS_DC_IN pdm location Cosmo_ 255.255.255.255 DCB_CM pdm location AS_Paris_Net 255.255.255.0 TRS_DC_IN pdm location 10.154.52.11 255.255.255.255 TRS_DC_IN pdm location 172.200.1.1 255.255.255.255 ILO_DC pdm location 10.61.12.95 255.255.255.255 CFV_DC pdm location 172.24.8.114 255.255.255.255 TRS_DC_IN pdm location 10.156.10.7 255.255.255.255 TRS_DC_IN pdm location CLNS01 255.255.255.255 TMP_CG pdm location BACKUPCLNS 255.255.255.255 TMP_CG pdm location Jubilee 255.255.255.255 TMP_CG pdm location Comm_BU_Net 255.255.0.0 CFV_DC pdm location Comm_BU_Net 255.255.0.0 EMS_DC pdm location 10.153.120.12 255.255.255.255 CFV_DC pdm location WibroAX 255.255.255.255 CSR_CG pdm location Sarlac1 255.255.255.255 CSR_CL pdm location Sarlac2 255.255.255.255 CSR_CL pdm location 10.150.205.5 255.255.255.255 TRS_DC_IN pdm location SGSun 255.255.255.255 STA_AS pdm location Trendmicro 255.255.255.255 TMP_RS pdm location 10.150.211.130 255.255.255.255 CSR_CG pdm location 10.155.0.1 255.255.255.255 TRS_DC_IN pdm location SGvenus2 255.255.255.255 DCB_AS pdm location SQLvenus 255.255.255.255 DCB_AS pdm location SGVenus 255.255.255.255 DCB_AS pdm location 10.154.64.2 255.255.255.255 EMS_DC pdm location 192.168.0.0 255.255.0.0 CFV_DC pdm location SMTP_Relay_Server 255.255.255.255 CFV_DC pdm location host10_154_39_99 255.255.255.255 TRS_DC_IN pdm location Raffles_BU_Net 255.255.0.0 TRS_DC_IN pdm location SMTP_Relay_Server 255.255.255.255 TMP_RS pdm location 10.154.128.0 255.255.255.0 CFV_DC pdm location 10.154.1.32 255.255.255.255 TRS_DC_IN pdm location host10_154_39_99 255.255.255.255 CFV_DC pdm location Ascott_SG_Transit 255.255.255.0 CFV_DC pdm location Nobelie 255.255.255.255 CFV_DC pdm location Aumida 255.255.255.255 TRS_DC_IN pdm location 10.154.52.11 255.255.255.255 CFV_DC pdm location 10.154.4.60 255.255.255.255 CFV_DC pdm location 172.16.65.8 255.255.255.255 CFV_DC pdm location Raffles_BU_Net 255.255.252.0 TRS_DC_IN pdm location SISV_SQL_Server 255.255.255.255 CFV_DC pdm group IT_Control_Hosts TRS_DC_IN pdm group CSR_CL_Servers CSR_CL pdm group Internal_DNS TMP_CG pdm group CLG_SHARED_Servers CSR_CG pdm group RESI_Server_Zone TMP_RS pdm group CL_SBUs TRS_DC_IN pdm group HP_Monitoring_Hosts TRS_DC_IN pdm group CL_Treasury_Zone TRS_DC_IN pdm group CCL_Retail_Sites CFV_DC pdm group PhaseI_DC_real TRS_DC_IN pdm group SIS_Station_Site CFV_DC pdm group Checkpoint_EFM CFV_DC pdm group BU_VPN_ANY CFV_DC pdm group Ascott_HQ_H1-H2 CFV_DC pdm group Ascott_H1_HQ_H3 CFV_DC pdm group Miranda_Earth_Galaxy CFV_DC pdm group STMS CFV_DC pdm group Zurich_Host1-2 CFV_DC pdm group Celeris_IT CFV_DC pdm group Raffles_100 CFV_DC pdm group Zurich CFV_DC pdm group Raf_NaiLertPark CFV_DC pdm group RIL_Server_Farm CFV_DC pdm group Tarkin1-3 CFV_DC pdm group DMZ CFV_DC pdm group BuzPart_Ascott CFV_DC pdm group NET_COMMERCIAL CFV_DC pdm group Ascott_CHN_AdminHosts CFV_DC pdm group CHN_Citrix_Servers CFV_DC pdm group HP_VPN_Group CFV_DC pdm group Ascott_HQ CFV_DC pdm group Net10_150_244_0 CFV_DC pdm group Net10_156_17_0 CFV_DC pdm group Net10_200_0_0 CFV_DC pdm group NET_192_168_181_0 CFV_DC pdm group PhaseI_DC CFV_DC reference PhaseI_DC_real pdm group NET_10_153_100_0 CFV_DC pdm group NET_10_154_32_0 CFV_DC pdm group NET_10_154_40_0 CFV_DC pdm group Retail_Net_GW CFV_DC pdm group Retail_Staging_Host CFV_DC pdm group Ascott_AU_Admin_Hosts CFV_DC pdm group PIX_VPN CFV_DC pdm group NET_10_156_137_0 CFV_DC pdm group Ascot_SGTitan_SGOrion CFV_DC pdm group BUS_VPN_device_Group CFV_DC pdm group BU_VPN_ITO_Mnged_Devs CFV_DC pdm group ANY-SEC-CONTROL CFV_DC pdm group Security_Control CFV_DC pdm group Varda_Durin_Whiphid CFV_DC pdm group RIL_DC_Servers CFV_DC pdm group LDAP_Servers TMP_CG pdm group SGCalypso1-2 TMP_CG pdm group Luthien_Galadriel TMP_CG pdm group Ph_Ya_Oro_Ma_Cyc TMP_CG pdm group Galadriel_Orome_Grp TMP_CG pdm group SGDeimos1-2 TMP_CG pdm group PIX_SVR_Prospero_Orome TMP_CG pdm group Orome_Yavin_Maverick TMP_CG pdm group Phoenix_Arien TMP_CG pdm group HP_OVA_Mgt_Svrs TMP_RS pdm group HP_Mon_ICMP_Svrs TMP_RS pdm group CLL_CCL_CRL_BUs TRS_DC_IN pdm group USPSD_clients TRS_DC_IN pdm group HP_TT_Fix_IP TRS_DC_IN pdm group DC_Working_ZONE WOR_DC pdm group HP_VPN_Access_Group TRS_DC_IN pdm group DC_Control_Hosts ITC_NW pdm group HP_Mon_Hosts ENM_DC pdm group HPMon1-2 ENM_DC pdm group HP_ITO_Servers ENM_DC pdm group SBU_Control_Hosts TRS_DC_IN pdm group VPN_IP_Pools CFV_DC pdm group VNpluto1-2 CFV_DC pdm group AS_AE_NET CFV_DC pdm group MediaRing_Svr_Group CFV_DC pdm group SBU_Novell_Servers TRS_DC_IN pdm group Intranet_Citrix_Svrs TMP_CG pdm group Ascott_TT TRS_DC_IN pdm group Ascott_TAS TRS_DC_IN pdm group Ascott_Orchard TRS_DC_IN pdm group Ascott_Liang_Court TRS_DC_IN pdm group Ascott_Compass TRS_DC_IN pdm group Ascott_Carinhill TRS_DC_IN pdm group CCL_DC_Citrix_Svrs TMP_CM pdm group CCL_Retails_Net CFV_DC pdm group Bloomberg_Site4 CFV_DC pdm group Bloomberg_Site3 CFV_DC pdm group Bloomberg_Site2 CFV_DC pdm group Bloomberg_Site1 CFV_DC pdm group Bloomberg_Sites CFV_DC pdm group Bloomberg_Nets CFV_DC pdm group Ascott_Vietnam CFV_DC pdm group Ascott_Thailand CFV_DC pdm group Ascott_SGCalys3-8 TRS_DC_IN pdm group Ascott_SGCalyso1-2 TRS_DC_IN pdm group Ascott_SGCalyso5-6 TRS_DC_IN pdm group Ascott_China CFV_DC pdm group Raffles_Bloomberg_Hosts TRS_DC_IN pdm group Corp_Treasury_Hosts TRS_DC_IN pdm group Corp_HR_Hosts TRS_DC_IN pdm group CSLucas_Hosts TRS_DC_IN pdm group CCL_Retail_Nets CFV_DC pdm group CT_BMO TRS_DC_IN pdm group NET_RESIDENTIAL TRS_DC_IN pdm group NET_RAFFLES TRS_DC_IN pdm group NET_PREMA_INT TRS_DC_IN pdm group NET_CORPORATE TRS_DC_IN pdm group NET_ASCOTT TRS_DC_IN pdm group intranet TMP_CG pdm group HP_Remote_Monitoring_Server ENM_DC pdm group EmailXtenders TRS_DC_IN pdm group RP_VIP TRS_DC_IN pdm group SGDeimosX TMP_A2 pdm group SGCalypsoX TMP_A2 pdm group SGStephnoX TMP_A2 pdm group SGOrionX DCB_AS pdm group SGCalypso3-8 DCB_AS pdm group SGTitanX STA_AS pdm group Ascott_SG_Properties CFV_DC pdm group SIStation_Hosts TRS_DC_IN pdm group ASKR_NET_10-153-56 CFV_DC pdm group AS_Oversea_Nets CFV_DC pdm group AS_Oversea_Deimos CFV_DC pdm group AS_Oversea_Tests CFV_DC pdm group AS_CN_AU_deimos CFV_DC pdm group Ascott_SQL_ALL TMP_A2 pdm group Ascott_Admin_Hosts TRS_DC_IN pdm group AKR_Orcale_Printing CFV_DC pdm group EMS_Servers EMS_DC pdm group Xtender_Servers ENR_DC pdm group SGCalypso5-8 DCB_AS pdm group DC_Exinda MGT_DC pdm group AS_Oversea_Printservers CFV_DC pdm group SGCalypso1-2and5-8 TRS_DC_IN pdm group SGTitanX-SGOrionX TRS_DC_IN pdm group Resi_DCs TRS_DC_IN pdm group CRL_PC TRS_DC_IN pdm group Raffles_FW2_Host72-73 TRS_DC_IN pdm group Corp_Servers_VL134 DCB_CP pdm group Intranet_Webs TRS_DC_IN pdm group SGCalypso01-08 TRS_DC_IN pdm group AS_Managed_Servers TRS_DC_IN pdm group SBU_Control_PCs TRS_DC_IN pdm group Ascott_LC_72-87 CFV_DC pdm group Ascott_SQLs TRS_DC_IN pdm group MRLiu TRS_DC_IN pdm group Ascott_LC_Admin1 TRS_DC_IN pdm group AS_Antivirus_Hosts TRS_DC_IN pdm group CSR_CL_Anti_Spoofing CSR_CL pdm group DCB_CP_Anti_Spoofing DCB_CP pdm group CSR_CG_Anti_Spoofing CSR_CG pdm group TMP_RS_Anti_Spoofing TMP_RS pdm group ITC_NW_Anti_Spoofing ITC_NW pdm group WOR_DC_Anti_Spoofing WOR_DC pdm group TMP_SZ_Anti_Spoofing TMP_SZ pdm group TMP_SZ1_Anti_Spoofing TMP_SZ1 pdm group STA_AS_Anti_Spoofing STA_AS pdm group CCL_AS_Anti_Spoofing CCL_AS pdm group TMP_CM_Anti_Spoofing TMP_CM pdm group TMP_AS_Anti_Spoofing TMP_AS pdm group TMP_A2_Anti_Spoofing TMP_A2 pdm group DCB_AS_Anti_Spoofing DCB_AS pdm group EMS_DC_Anti_Spoofing EMS_DC pdm group MGT_DC_Anti_Spoofing MGT_DC pdm group TRS_DC_IN_Anti_Spoofing TRS_DC_IN pdm group Public_DNS CFV_DC pdm group CA_TT TRS_DC_IN pdm group Comm_Subnets_TRS_DC TRS_DC_IN pdm group DCB_CM_Anti_Spoofing DCB_CM pdm group Ascott_Oracle_Team TRS_DC_IN pdm group Ascott_Australia CFV_DC pdm group CL_Exinda TRS_DC_IN pdm group DPRCalypsoX TRS_DC_IN pdm group Ascott_Nets_on-CFV-DC CFV_DC pdm group CLG001_CLG101 ENR_DC pdm group CL_Network TRS_DC_IN pdm group CL_CHN_VPN CFV_DC pdm group CHN_Oracle_Printing CFV_DC pdm group AS_Oversea_Networks CFV_DC pdm group TT_Control_Hosts TRS_DC_IN pdm group TMP_SZ2_Anti_Spoofing TMP_SZ2 pdm group CCL_Retail_99_Hosts CFV_DC pdm group TMP_SZ2_Servers_Group TMP_SZ2 pdm group Mark_SQL_Managed_Servers TRS_DC_IN pdm group Mark_Mng_Rafles_SQL CFV_DC pdm group Traffic_Counts_System CFV_DC pdm group FootFall_SNMP_Servers CFV_DC pdm group New_AS_CN_Nets CFV_DC pdm group AS_CN_FileServers CFV_DC pdm group SGcalypso3-4 DCB_AS pdm group Intranet_Webservers TMP_CG pdm group CCL_Retail_Nets_Mgp TRS_DC_IN pdm group CCL_Retail_Stagging_Hosts_Mgp TRS_DC_IN pdm group CCL_Retail_Telnet_Hosts_Mgp TRS_DC_IN pdm group CCL_Retail_GWs TRS_DC_IN pdm group Ascott_Exchange_Servers CFV_DC pdm group RP_Bloomberg_PCs TRS_DC_IN pdm group Bloomberg_Severs CFV_DC pdm group Ascott_CN_76_85 CFV_DC pdm group CL_CHN_NewNet CFV_DC pdm group AS_CN_Net-30-40 CFV_DC pdm group Ascott_CHN_Oracle_IPs CFV_DC pdm group STMS_RCH_Access ENR_DC pdm group Ascott_TT_DC_Admin TRS_DC_IN pdm group Ascott_TT_Oracle_Team TRS_DC_IN pdm group ASML_45_64-79 CFV_DC pdm group ASML_46_64-79 CFV_DC pdm group RHL_Bloombergs_Sites_01 CFV_DC pdm group RHL_Bloombergs_Sites02 CFV_DC pdm group Aventail_VPN_DHCP_Pool CFV_DC pdm group FTP_Access_To_ManWe CFV_DC pdm group DCB_RHL_Anti_Spoofing DCB_RHL pdm group SarApps_Svrs CSR_CL pdm group SAP_Clients TRS_DC_IN pdm group SAP_Developer TRS_DC_IN pdm group VPN_Aventail_Box CFV_DC pdm group SAP_PhySvr_Group CSR_CL pdm group Elixir_Cosmo DCB_CM pdm group CCT_Properties TRS_DC_IN pdm group CCT_CRTL_Properties TRS_DC_IN pdm group CCL_VIP_VPN CFV_DC pdm group CCL_VIP_VPN_Stagging CFV_DC pdm group NET_RHL_TEST TRS_DC_IN pdm group RHL_Citrix_Servers DCB_RHL pdm group CCL_VIP_VPN_Routers CFV_DC pdm group SAELT1_SAELT2 CSR_CG pdm group IMM_HarbourF_Link CFV_DC pdm group RHL_Svr TRS_DC_IN pdm group Ascott_Phillipine CFV_DC pdm group Ascott_PH_Finance_Clients CFV_DC pdm group SAP_Training_Group TRS_DC_IN pdm group BU_SAP_Client TRS_DC_IN pdm group AS_TT_H40-H50 TRS_DC_IN pdm group Omniback_Svrs ITC_NW pdm group TesseK_denga_Sarlacc1_2 CFV_DC pdm group ILO_DC_Anti_Spoofing ILO_DC pdm group MSN_Yahoo_Messenger CFV_DC pdm group AS_AE_NET_64-79 CFV_DC pdm group AS_Dot_NET_TT-Admin TRS_DC_IN pdm group AS_Dot_NET_LC-Admin CFV_DC pdm group CL_SBUs_2006 TRS_DC_IN pdm group AS_LC_H40-H50 CFV_DC pdm group FlamingoSMTPRelaySvr CFV_DC pdm group SQLVenus_Group DCB_AS pdm group SGmars1-2 DCB_AS pdm group Share_Investor.com CFV_DC pdm group Redi_TT_FujiXerox_Printers TRS_DC_IN pdm group AS_JP_Nets CFV_DC pdm group AS_TT_78-83 TRS_DC_IN pdm group AS_JP_Nets_64-79 CFV_DC pdm group CL_SMTP_Printers TRS_DC_IN pdm group Bloomberg_Global_Sites CFV_DC pdm group Equinix_Notes_CA_Svrs ENR_DC pdm group CTRL_104-MRTG_Devices TRS_DC_IN pdm group Aventail_GRP CFV_DC pdm group Resi_Clients TRS_DC_IN pdm group China_Servers CFV_DC pdm group Equinix_CA_Notes_Svrs ENR_DC pdm group RP_VIP_Internet_Access TMP_CG pdm history enable arp timeout 14400 global (ENR_DC) 3 interface nat (CFV_DC) 3 10.150.179.0 255.255.255.248 nat (CFV_DC) 3 Susie_Home_VPN 255.255.255.0 static (TRS_DC_IN,CFV_DC) host10_61_12_6 10.154.4.99 netmask 255.255.255.255 static (TRS_DC_IN,CFV_DC) host10_61_12_50 10.150.122.6 netmask 255.255.255.255 static (TRS_DC_IN,CFV_DC) host10_61_12_51 TT_Monitoring_Host netmask 255.255.255.255 static (TRS_DC_IN,CFV_DC) host10_61_12_49 10.154.4.110 netmask 255.255.255.255 static (TRS_DC_IN,CFV_DC) host10_61_12_44 10.154.4.188 netmask 255.255.255.255 static (TRS_DC_IN,CFV_DC) host10_61_12_15 10.150.255.78 netmask 255.255.255.255 static (TRS_DC_IN,CFV_DC) RP_Martin_Tan 10.154.4.111 netmask 255.255.255.255 static (TRS_DC_IN,CFV_DC) RP_Zalina 10.154.4.112 netmask 255.255.255.255 static (CFV_DC,ENR_DC) 10.150.248.1 Zurich_Host1 netmask 255.255.255.255 static (CFV_DC,ENR_DC) 10.150.248.2 Zurich_Host2 netmask 255.255.255.255 static (TRS_DC_IN,CFV_DC) 10.61.12.54 10.154.4.53 netmask 255.255.255.255 static (CFV_DC,ENR_DC) 10.150.248.9 RHLSVRNOA1 netmask 255.255.255.255 static (TRS_DC_IN,CFV_DC) 10.61.12.62 10.154.4.101 netmask 255.255.255.255 access-group TRS_DC_IN_acl in interface TRS_DC_IN access-group DCB_CP_acl in interface DCB_CP access-group CSR_CL_acl in interface CSR_CL access-group CSR_CG_acl in interface CSR_CG access-group CFV_DC_acl in interface CFV_DC access-group TMP_CG_acl in interface TMP_CG access-group TMP_RS_acl in interface TMP_RS access-group ITC_NW_acl in interface ITC_NW access-group WOR_DC_access_in in interface WOR_DC access-group MGT_DC_access_in in interface MGT_DC access-group ENM_DC_acl in interface ENM_DC access-group TMP_SZ_acl in interface TMP_SZ access-group TMP_SZ1_acl in interface TMP_SZ1 access-group STA_AS_acl in interface STA_AS access-group CCL_AS_acl in interface CCL_AS access-group TMP_CM_acl in interface TMP_CM access-group ENR_DC_acl in interface ENR_DC access-group TMP_AS_acl in interface TMP_AS access-group TMP_A2_acl in interface TMP_A2 access-group DCB_AS_acl in interface DCB_AS access-group EMS_DC_acl in interface EMS_DC access-group DCB_CM_access_in in interface DCB_CM access-group TMP_SZ2_acl in interface TMP_SZ2 access-group DCB_RHL_access_in in interface DCB_RHL access-group STA_CP_acl in interface STA_CP access-group ILO_DC_acl in interface ILO_DC rip TRS_DC_IN passive version 2 ! interface TRS_DC_IN ! ! interface low_secure_intf ! ! interface DCB_CP ! ! interface CSR_CL ! ! interface CSR_CG ! ! interface CFV_DC ! ! interface TMP_CG ! ! interface TMP_RS ! ! interface ITC_NW ! ! interface WOR_DC ! ! interface MGT_DC ! ! interface ENM_DC ! ! interface TMP_SZ ! ! interface TMP_SZ1 ! ! interface STA_AS ! ! interface CCL_AS ! ! interface TMP_CM ! ! interface ENR_DC ! ! interface TMP_AS ! ! interface TMP_A2 ! ! interface DCB_AS ! ! interface EMS_DC ! ! interface DCB_CM ! ! interface TMP_SZ2 ! ! interface DCB_RHL ! ! interface STA_CP ! ! interface ILO_DC ! ! route TRS_DC_IN 10.154.8.0 255.255.255.0 10.150.205.5 1 route TRS_DC_IN 10.154.8.0 255.255.255.0 10.150.205.6 250 route TRS_DC_IN 10.154.17.0 255.255.255.0 10.150.205.5 250 route TRS_DC_IN 10.154.17.0 255.255.255.0 10.150.205.6 1 route TRS_DC_IN 10.154.11.0 255.255.255.0 10.150.205.5 1 route TRS_DC_IN 10.154.11.0 255.255.255.0 10.150.205.6 250 route TRS_DC_IN 10.154.54.0 255.255.255.0 10.150.205.6 250 route TRS_DC_IN 10.154.54.0 255.255.255.0 10.150.205.5 1 route TRS_DC_IN 10.154.53.0 255.255.255.0 10.150.205.6 250 route TRS_DC_IN 10.154.53.0 255.255.255.0 10.150.205.5 1 route TRS_DC_IN 10.154.50.0 255.255.255.0 10.150.205.6 250 route TRS_DC_IN 10.154.50.0 255.255.255.0 10.150.205.5 1 route TRS_DC_IN 10.154.51.0 255.255.255.0 10.150.205.6 250 route TRS_DC_IN 10.154.51.0 255.255.255.0 10.150.205.5 1 route TRS_DC_IN 10.154.52.0 255.255.255.0 10.150.205.6 250 route TRS_DC_IN 10.154.52.0 255.255.255.0 10.150.205.5 1 route TRS_DC_IN 10.154.49.0 255.255.255.0 10.150.205.6 250 route TRS_DC_IN 10.154.49.0 255.255.255.0 10.150.205.5 1 route TRS_DC_IN 10.154.65.0 255.255.255.0 10.150.205.5 250 route TRS_DC_IN 10.154.65.0 255.255.255.0 10.150.205.6 1 route TRS_DC_IN 10.150.38.0 255.255.255.0 10.150.205.5 1 route TRS_DC_IN 10.150.140.0 255.255.255.0 10.150.205.6 1 route TRS_DC_IN Corp_Control_Subnet 255.255.255.0 10.150.205.6 1 route TRS_DC_IN Corp_BU_Net 255.255.248.0 10.150.205.6 1 route TRS_DC_IN 10.150.251.0 255.255.255.240 10.150.205.6 1 route TRS_DC_IN 10.150.251.16 255.255.255.240 10.150.205.5 1 route TRS_DC_IN AScott_TT 255.255.255.0 10.150.205.6 1 route TRS_DC_IN Comm_BU_Net 255.255.248.0 10.150.205.6 1 route TRS_DC_IN 10.154.9.0 255.255.255.0 10.150.205.6 1 route TRS_DC_IN 10.154.10.0 255.255.255.0 10.150.205.6 1 route TRS_DC_IN 10.154.12.0 255.255.255.0 10.150.205.6 1 route TRS_DC_IN 10.154.13.0 255.255.255.0 10.150.205.6 1 route TRS_DC_IN 10.154.14.0 255.255.255.0 10.150.205.6 1 route TRS_DC_IN 10.154.15.0 255.255.255.0 10.150.205.6 1 route TRS_DC_IN 10.154.16.0 255.255.255.0 10.150.205.6 1 route TRS_DC_IN Funan 255.255.255.0 10.150.205.5 1 route TRS_DC_IN 10.154.33.0 255.255.255.0 10.150.205.5 1 route TRS_DC_IN 10.154.34.0 255.255.255.0 10.150.205.5 1 route TRS_DC_IN 10.154.35.0 255.255.255.0 10.150.205.5 1 route TRS_DC_IN 10.154.36.0 255.255.255.0 10.150.205.5 1 route TRS_DC_IN 10.154.37.0 255.255.255.0 10.150.205.5 1 route TRS_DC_IN 10.154.38.0 255.255.255.0 10.150.205.5 1 route TRS_DC_IN 10.154.39.0 255.255.255.0 10.150.205.5 1 route TRS_DC_IN 10.154.40.0 255.255.255.0 10.150.205.5 1 route TRS_DC_IN 10.154.41.0 255.255.255.0 10.150.205.5 1 route TRS_DC_IN 10.154.63.0 255.255.255.0 10.150.205.6 1 route TRS_DC_IN 10.154.64.0 255.255.255.0 10.150.205.6 1 route TRS_DC_IN Net_RHL 255.255.254.0 10.150.205.6 1 route TRS_DC_IN Resi_BU_Net 255.255.240.0 10.150.205.6 1 route TRS_DC_IN 10.156.16.0 255.255.240.0 10.150.205.6 1 route TRS_DC_IN 10.156.32.0 255.255.224.0 10.150.205.6 1 route TRS_DC_IN 10.156.48.0 255.255.254.0 10.150.205.6 1 route TRS_DC_IN 10.156.64.0 255.255.192.0 10.150.205.6 1 route TRS_DC_IN 10.156.200.0 255.255.255.0 10.150.205.6 1 route TRS_DC_IN 10.156.200.0 255.255.248.0 10.150.205.6 1 route TRS_DC_IN 10.156.201.0 255.255.255.0 10.150.205.6 1 route TRS_DC_IN 10.156.202.0 255.255.255.0 10.150.205.6 1 route TRS_DC_IN 10.156.208.0 255.255.240.0 10.150.205.6 1 route TRS_DC_IN 10.156.224.0 255.255.224.0 10.150.205.6 1 route TRS_DC_IN Raffles_BU_Net 255.255.0.0 10.150.205.6 1 route TRS_DC_IN Raffles_RCH 255.255.0.0 10.150.205.6 1 route TRS_DC_IN 10.205.2.21 255.255.255.255 10.150.205.6 1 route TRS_DC_IN Corp_PIX_Outside_Net 255.255.255.0 10.150.205.6 1 route TRS_DC_IN 172.24.8.104 255.255.255.252 10.150.205.6 1 route TRS_DC_IN 172.24.8.108 255.255.255.252 10.150.205.6 1 route TRS_DC_IN 172.24.8.112 255.255.255.252 10.150.205.6 1 route TRS_DC_IN 172.24.8.120 255.255.255.252 10.150.205.6 1 route TRS_DC_IN 172.24.8.124 255.255.255.252 10.150.205.6 1 route TRS_DC_IN 172.24.20.8 255.255.255.248 10.150.205.6 1 route TRS_DC_IN 172.24.254.96 255.255.255.240 10.150.205.6 1 route TRS_DC_IN 172.26.1.8 255.255.255.252 10.150.205.6 1 route TRS_DC_IN 172.26.2.0 255.255.255.252 10.150.205.5 1 route TRS_DC_IN Host192_168_5_10 255.255.255.255 10.150.205.6 1 route TRS_DC_IN Corp_Control_Subnet 255.255.255.0 10.150.205.5 250 route TRS_DC_IN Corp_BU_Net 255.255.248.0 10.150.205.5 250 route TRS_DC_IN 10.150.251.0 255.255.255.240 10.150.205.5 250 route TRS_DC_IN 10.150.251.16 255.255.255.240 10.150.205.6 250 route TRS_DC_IN AScott_TT 255.255.255.0 10.150.205.5 250 route TRS_DC_IN Comm_BU_Net 255.255.248.0 10.150.205.5 250 route TRS_DC_IN 10.154.9.0 255.255.255.0 10.150.205.5 250 route TRS_DC_IN 10.154.10.0 255.255.255.0 10.150.205.5 250 route TRS_DC_IN 10.154.12.0 255.255.255.0 10.150.205.5 250 route TRS_DC_IN 10.154.13.0 255.255.255.0 10.150.205.5 250 route TRS_DC_IN 10.154.14.0 255.255.255.0 10.150.205.5 250 route TRS_DC_IN 10.154.15.0 255.255.255.0 10.150.205.5 250 route TRS_DC_IN 10.154.16.0 255.255.255.0 10.150.205.5 250 route TRS_DC_IN Funan 255.255.255.0 10.150.205.6 250 route TRS_DC_IN 10.154.33.0 255.255.255.0 10.150.205.6 250 route TRS_DC_IN 10.154.34.0 255.255.255.0 10.150.205.6 250 route TRS_DC_IN 10.154.35.0 255.255.255.0 10.150.205.6 250 route TRS_DC_IN 10.154.36.0 255.255.255.0 10.150.205.6 250 route TRS_DC_IN 10.154.37.0 255.255.255.0 10.150.205.6 250 route TRS_DC_IN 10.154.38.0 255.255.255.0 10.150.205.6 250 route TRS_DC_IN 10.154.39.0 255.255.255.0 10.150.205.6 250 route TRS_DC_IN 10.154.40.0 255.255.255.0 10.150.205.6 250 route TRS_DC_IN 10.154.41.0 255.255.255.0 10.150.205.6 250 route TRS_DC_IN 10.154.63.0 255.255.255.0 10.150.205.5 250 route TRS_DC_IN 10.154.64.0 255.255.255.0 10.150.205.5 250 route TRS_DC_IN Net_RHL 255.255.254.0 10.150.205.5 250 route TRS_DC_IN Resi_BU_Net 255.255.240.0 10.150.205.5 250 route TRS_DC_IN 10.156.16.0 255.255.240.0 10.150.205.5 250 route TRS_DC_IN 10.156.32.0 255.255.224.0 10.150.205.5 250 route TRS_DC_IN 10.156.48.0 255.255.254.0 10.150.205.5 250 route TRS_DC_IN 10.156.64.0 255.255.192.0 10.150.205.5 250 route TRS_DC_IN 10.156.200.0 255.255.255.0 10.150.205.5 250 route TRS_DC_IN 10.156.200.0 255.255.248.0 10.150.205.5 250 route TRS_DC_IN 10.156.201.0 255.255.255.0 10.150.205.5 250 route TRS_DC_IN 10.156.202.0 255.255.255.0 10.150.205.5 250 route TRS_DC_IN 10.156.208.0 255.255.240.0 10.150.205.5 250 route TRS_DC_IN 10.156.224.0 255.255.224.0 10.150.205.5 250 route TRS_DC_IN Raffles_BU_Net 255.255.0.0 10.150.205.5 250 route TRS_DC_IN Raffles_RCH 255.255.0.0 10.150.205.5 250 route TRS_DC_IN 10.205.2.21 255.255.255.255 10.150.205.5 250 route TRS_DC_IN Corp_PIX_Outside_Net 255.255.255.0 10.150.205.5 250 route TRS_DC_IN 172.24.8.104 255.255.255.252 10.150.205.5 250 route TRS_DC_IN 172.24.8.108 255.255.255.252 10.150.205.5 250 route TRS_DC_IN 172.24.8.112 255.255.255.252 10.150.205.5 250 route TRS_DC_IN 172.24.8.120 255.255.255.252 10.150.205.5 250 route TRS_DC_IN 172.24.8.124 255.255.255.252 10.150.205.5 250 route TRS_DC_IN 172.24.20.8 255.255.255.248 10.150.205.5 250 route TRS_DC_IN 172.24.254.96 255.255.255.240 10.150.205.5 250 route TRS_DC_IN 172.26.1.8 255.255.255.252 10.150.205.5 250 route TRS_DC_IN 172.26.2.0 255.255.255.252 10.150.205.6 250 route TRS_DC_IN Host192_168_5_10 255.255.255.255 10.150.205.5 250 route CFV_DC 10.157.176.0 255.255.255.0 Fortigate 1 route CFV_DC 10.150.179.0 255.255.255.248 Fortigate 1 route CFV_DC Susie_Home_VPN 255.255.255.0 Fortigate 1 route CFV_DC 0.0.0.0 0.0.0.0 Fortigate 1 route CFV_DC AS_Compass 255.255.255.0 Fortigate 1 route CFV_DC 10.153.254.248 255.255.255.248 Fortigate 1 route CFV_DC 10.153.254.240 255.255.255.248 Fortigate 1 route CFV_DC 10.153.254.232 255.255.255.248 Fortigate 1 route CFV_DC AS_TAS 255.255.255.0 Fortigate 1 route CFV_DC AS_Bencoolen 255.255.255.0 Fortigate 1 route CFV_DC AS_Orchard 255.255.255.0 Fortigate 1 route CFV_DC AS_Grand_Carnhill 255.255.255.0 Fortigate 1 route CFV_DC 10.153.2.0 255.255.255.0 Fortigate 1 route ENM_DC 192.170.75.0 255.255.255.0 10.150.253.4 1 route ENR_DC 10.200.0.0 255.254.0.0 10.200.32.209 1 route ENR_DC 10.1.0.0 255.255.0.0 10.200.32.209 1 route ENR_DC 10.61.18.0 255.255.255.0 10.200.32.209 1 timeout xlate 4:00:00 timeout conn 6:00:00 half-closed 0:20:00 udp 0:15:00 icmp 0:00:02 rpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 sip 0:30:00 sip _media 0:02:00 timeout uauth 0:05:00 absolute username cappa password c3sW3QbWzFwE6/Rs encrypted privilege 2 username cuher password RKcXUzSm0ErLfAYF encrypted privilege 2 username cerlin password 2Bdr7NzqMQjZoibZ encrypted privilege 2 aaa-server TACACS+ protocol tacacs+ aaa-server TACACS+ max-failed-attempts 3 aaa-server TACACS+ deadtime 10 aaa-server RADIUS protocol radius aaa-server RADIUS max-failed-attempts 3 aaa-server RADIUS deadtime 10 aaa-server LOCAL protocol local aaa-server tacacs protocol tacacs+ aaa-server tacacs max-failed-attempts 3 aaa-server tacacs deadtime 10 aaa authentication telnet console LOCAL aaa authentication ssh console LOCAL http server enable http Control_DT_101 255.255.255.255 TRS_DC_IN http Control_DT_102 255.255.255.255 TRS_DC_IN http 10.156.202.102 255.255.255.255 TRS_DC_IN http CT_CA_Console 255.255.255.255 TRS_DC_IN http 10.156.202.220 255.255.255.255 TRS_DC_IN http Control_DT_105 255.255.255.255 TRS_DC_IN http Control_DT_104 255.255.255.255 TRS_DC_IN http COMM-CONTROL1 255.255.255.255 TRS_DC_IN http ControlPC1 255.255.255.252 ITC_NW http ControlPC2 255.255.255.255 ITC_NW http ControlPC3 255.255.255.255 ITC_NW http ControlPC1 255.255.255.255 ITC_NW http 10.150.201.102 255.255.255.255 WOR_DC http 10.150.201.103 255.255.255.255 WOR_DC http 10.150.201.101 255.255.255.255 WOR_DC http 10.150.255.77 255.255.255.255 MGT_DC snmp-server host TRS_DC_IN 10.156.202.102 snmp-server location DC snmp-server contact HP OVSD snmp-server community f!cape snmp-server enable traps all floodguard enable fragment size 200 TRS_DC_IN fragment chain 24 TRS_DC_IN fragment size 200 low_secure_intf fragment chain 24 low_secure_intf fragment size 200 DCB_CP fragment chain 24 DCB_CP fragment size 200 CSR_CL fragment chain 24 CSR_CL fragment size 200 CSR_CG fragment chain 24 CSR_CG fragment size 200 CFV_DC fragment chain 24 CFV_DC fragment size 200 TMP_CG fragment chain 24 TMP_CG fragment size 200 TMP_RS fragment chain 24 TMP_RS fragment size 200 ITC_NW fragment chain 24 ITC_NW fragment size 200 WOR_DC fragment chain 24 WOR_DC fragment size 200 MGT_DC fragment chain 24 MGT_DC fragment size 200 ENM_DC fragment chain 24 ENM_DC fragment size 200 TMP_SZ fragment chain 24 TMP_SZ fragment size 200 TMP_SZ1 fragment chain 24 TMP_SZ1 fragment size 200 STA_AS fragment chain 24 STA_AS fragment size 200 CCL_AS fragment chain 24 CCL_AS fragment size 200 TMP_CM fragment chain 24 TMP_CM fragment size 200 ENR_DC fragment chain 24 ENR_DC fragment size 200 TMP_AS fragment chain 24 TMP_AS fragment size 200 TMP_A2 fragment chain 24 TMP_A2 fragment size 200 DCB_AS fragment chain 24 DCB_AS fragment size 200 EMS_DC fragment chain 24 EMS_DC fragment size 200 DCB_CM fragment chain 24 DCB_CM fragment size 200 TMP_SZ2 fragment chain 24 TMP_SZ2 fragment size 200 DCB_RHL fragment chain 24 DCB_RHL fragment size 200 STA_CP fragment chain 24 STA_CP fragment size 200 ILO_DC fragment chain 24 ILO_DC sysopt nodnsalias inbound sysopt nodnsalias outbound telnet VLAN888 255.255.255.0 TRS_DC_IN telnet ITC_NW_subnet 255.255.255.0 ITC_NW telnet 10.150.201.102 255.255.255.255 WOR_DC telnet 10.150.201.104 255.255.255.255 WOR_DC telnet MGT_DC_Subnet 255.255.255.0 MGT_DC telnet timeout 15 ssh VLAN888 255.255.255.0 TRS_DC_IN ssh Control_DT_101 255.255.255.255 TRS_DC_IN ssh Control_DT_102 255.255.255.255 TRS_DC_IN ssh 10.156.202.16 255.255.255.255 TRS_DC_IN ssh CT_CA_Console 255.255.255.255 TRS_DC_IN ssh 10.156.201.0 255.255.255.0 TRS_DC_IN ssh 10.156.202.102 255.255.255.255 TRS_DC_IN ssh ITC_NW_subnet 255.255.255.0 ITC_NW ssh 10.150.201.102 255.255.255.255 WOR_DC ssh MGT_DC_Subnet 255.255.255.0 MGT_DC ssh timeout 15 terminal width 130 Cryptochecksum:0f3f176ffc27a0eb8810405800a8cbeb : end