<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE FWObjectDatabase SYSTEM "fwbuilder.dtd">
<FWObjectDatabase xmlns="http://www.fwbuilder.org/1.0/" version="2.0.8" lastModified="1119828472" id="root">
  <Library color="#FFFFFF" comment="" id="id42C39FB6" name="examples">
    <ObjectGroup id="id42C39FB7" name="Objects">
      <ObjectGroup id="id42C39FB8" name="Addresses">
        <IPv4 address="10.1.1.1" comment="" id="id42C4490D" name="hostA" netmask="255.255.255.255"/>
        <IPv4 address="10.1.1.2" comment="" id="id42C4490E" name="hostB" netmask="255.255.255.255"/>
        <IPv4 address="10.1.1.3" comment="" id="id42C4490F" name="hostC" netmask="255.255.255.255"/>
      </ObjectGroup>
      <ObjectGroup id="id42C39FB9" name="Groups"/>
      <ObjectGroup id="id42C39FBA" name="Hosts">
        <Host comment="This object represents a PC with a single network interface" id="id42C34CD1" name="hostA">
          <Interface dyn="False" id="id42C34CD3" label="" name="eth0" security_level="0" unnum="False">
            <IPv4 address="10.3.14.40" comment="" id="id42C34CD4" name="hostA:eth0:ip" netmask="255.255.255.0"/>
            <InterfacePolicy id="id42C34CD5"/>
          </Interface>
          <Management address="0.0.0.0">
            <SNMPManagement enabled="False" snmp_read_community="" snmp_write_community=""/>
            <FWBDManagement enabled="False" identity="" port="-1"/>
            <PolicyInstallScript arguments="" command="" enabled="False"/>
          </Management>
          <HostOptions>
            <Option name="use_mac_addr_filter">False</Option>
          </HostOptions>
        </Host>
        <Host comment="This object represents a PC with a single network interface" id="id42C34CDB" name="hostB">
          <Interface dyn="False" id="id42C34CDD" label="" name="eth0" security_level="0" unnum="False">
            <IPv4 address="10.3.14.41" comment="" id="id42C34CDE" name="hostB:eth0:ip" netmask="255.255.255.0"/>
            <InterfacePolicy id="id42C34CDF"/>
          </Interface>
          <Management address="0.0.0.0">
            <SNMPManagement enabled="False" snmp_read_community="" snmp_write_community=""/>
            <FWBDManagement enabled="False" identity="" port="-1"/>
            <PolicyInstallScript arguments="" command="" enabled="False"/>
          </Management>
          <HostOptions>
            <Option name="use_mac_addr_filter">False</Option>
          </HostOptions>
        </Host>
        <Host comment="This object represents a PC with a single network interface" id="id42C34CE5" name="hostC">
          <Interface dyn="False" id="id42C34CE7" label="" name="eth0" security_level="0" unnum="False">
            <IPv4 address="10.3.14.42" comment="" id="id42C34CE8" name="hostC:eth0:ip" netmask="255.255.255.0"/>
            <InterfacePolicy id="id42C34CE9"/>
          </Interface>
          <Management address="0.0.0.0">
            <SNMPManagement enabled="False" snmp_read_community="" snmp_write_community=""/>
            <FWBDManagement enabled="False" identity="" port="-1"/>
            <PolicyInstallScript arguments="" command="" enabled="False"/>
          </Management>
          <HostOptions>
            <Option name="use_mac_addr_filter">False</Option>
          </HostOptions>
        </Host>
      </ObjectGroup>
      <ObjectGroup id="id42C39FBB" name="Networks">
        <Network comment="" id="id42C34CCF" name="netA" address="1.1.1.0" netmask="255.255.255.0"/>
        <Network comment="" id="id42C34CD0" name="netB" address="1.1.2.0" netmask="255.255.255.0"/>
        <Network comment="" id="id42C34CEF" name="netC" address="1.1.3.0" netmask="255.255.255.0"/>
      </ObjectGroup>
      <ObjectGroup id="id42C39FBC" name="Address Ranges"/>
    </ObjectGroup>
    <ServiceGroup id="id42C39FBD" name="Services">
      <ServiceGroup id="id42C39FBE" name="Groups"/>
      <ServiceGroup id="id42C39FBF" name="ICMP"/>
      <ServiceGroup id="id42C39FC0" name="IP"/>
      <ServiceGroup id="id42C39FC1" name="TCP"/>
      <ServiceGroup id="id42C39FC2" name="UDP"/>
      <ServiceGroup id="id42C39FC3" name="Custom"/>
    </ServiceGroup>
    <ObjectGroup id="id42C39FC4" name="Firewalls">
      <Firewall comment="This firewall has two interfaces. Eth0 faces outside and has a dynamic address; eth1 faces inside.&#10;Policy includes basic rules to permit unrestricted outbound access and anti-spoofing rules. Access to the firewall is permitted only from internal network and only using SSH. The firewall uses one of the machines on internal network for DNS. Internal network is configured with address 192.168.1.0/255.255.255.0" host_OS="linux24" id="id410D6DDE" name="test-fw" platform="iptables" version="">
        <NAT id="id410D6E16">
          <NATRule disabled="False" id="id410D6E17" position="0">
            <OSrc neg="False">
              <ObjectRef ref="id3DC75CE7-1"/>
            </OSrc>
            <ODst neg="False">
              <ObjectRef ref="sysid0"/>
            </ODst>
            <OSrv neg="False">
              <ServiceRef ref="sysid1"/>
            </OSrv>
            <TSrc neg="False">
              <ObjectRef ref="id410D6E25"/>
            </TSrc>
            <TDst neg="False">
              <ObjectRef ref="sysid0"/>
            </TDst>
            <TSrv neg="False">
              <ServiceRef ref="sysid1"/>
            </TSrv>
            <NATRuleOptions/>
          </NATRule>
        </NAT>
        <Policy id="id410D6DE3">
          <PolicyRule action="Accept" disabled="False" id="id42C44AEF" log="False" position="0">
            <Src neg="False">
              <ObjectRef ref="id42C4490D"/>
              <ObjectRef ref="id42C4490E"/>
            </Src>
            <Dst neg="False">
              <ObjectRef ref="id42C34CCF"/>
              <ObjectRef ref="id42C34CD0"/>
            </Dst>
            <Srv neg="False">
              <ServiceRef ref="tcp-HTTP"/>
              <ServiceRef ref="id3C20EEB5"/>
            </Srv>
            <When neg="False">
              <IntervalRef ref="sysid2"/>
            </When>
            <PolicyRuleOptions/>
          </PolicyRule>
          <PolicyRule action="Accept" disabled="False" id="id42C44A3C" log="False" position="1">
            <Src neg="True">
              <ObjectRef ref="id42C34CCF"/>
              <ObjectRef ref="id42C34CD0"/>
            </Src>
            <Dst neg="False">
              <ObjectRef ref="id42C4490F"/>
            </Dst>
            <Srv neg="False">
              <ServiceRef ref="tcp-HTTP"/>
            </Srv>
            <When neg="False">
              <IntervalRef ref="sysid2"/>
            </When>
            <PolicyRuleOptions/>
          </PolicyRule>
          <PolicyRule action="Accept" disabled="False" id="id42C2FA1D" log="False" position="2">
            <Src neg="False">
              <ObjectRef ref="id42C34CCF"/>
              <ObjectRef ref="id42C34CD0"/>
            </Src>
            <Dst neg="False">
              <ObjectRef ref="id42C4490F"/>
            </Dst>
            <Srv neg="False">
              <ServiceRef ref="tcp-HTTP"/>
              <ServiceRef ref="tcp-FTP"/>
            </Srv>
            <When neg="False">
              <IntervalRef ref="sysid2"/>
            </When>
            <PolicyRuleOptions/>
          </PolicyRule>
        </Policy>
        <Interface comment="" dyn="True" id="id410D6E25" label="outside" mgmt="False" name="eth0" security_level="0" unnum="False">
          <InterfacePolicy id="id410D6E26">
            <PolicyRule action="Deny" comment="anti spoofing rule" direction="Inbound" disabled="False" id="id410D6E27" log="True" position="0">
              <Src neg="False">
                <ObjectRef ref="id410D6DDE"/>
                <ObjectRef ref="id3DC75CE7-1"/>
              </Src>
              <Dst neg="False">
                <ObjectRef ref="sysid0"/>
              </Dst>
              <Srv neg="False">
                <ServiceRef ref="sysid1"/>
              </Srv>
              <When neg="False">
                <IntervalRef ref="sysid2"/>
              </When>
              <PolicyRuleOptions/>
            </PolicyRule>
          </InterfacePolicy>
        </Interface>
        <Interface comment="" dyn="False" id="id410D6E32" label="inside" mgmt="True" name="eth1" security_level="100" unnum="False">
          <IPv4 address="192.168.1.1" comment="" id="id410D6E33" name="test-fw:eth1:ip" netmask="255.255.255.0"/>
          <InterfacePolicy id="id410D6E34"/>
        </Interface>
        <Interface comment="" dyn="False" id="id410D6E35" label="loopback" mgmt="False" name="lo" security_level="100" unnum="False">
          <IPv4 address="127.0.0.1" comment="" id="id410D6E36" name="test-fw:lo:ip" netmask="255.0.0.0"/>
          <InterfacePolicy id="id410D6E37">
            <PolicyRule action="Accept" direction="Both" disabled="False" id="id410D6E38" log="False" position="0">
              <Src neg="False">
                <ObjectRef ref="sysid0"/>
              </Src>
              <Dst neg="False">
                <ObjectRef ref="sysid0"/>
              </Dst>
              <Srv neg="False">
                <ServiceRef ref="sysid1"/>
              </Srv>
              <When neg="False">
                <IntervalRef ref="sysid2"/>
              </When>
              <PolicyRuleOptions/>
            </PolicyRule>
          </InterfacePolicy>
        </Interface>
        <Management address="0.0.0.0">
          <SNMPManagement enabled="False" snmp_read_community="" snmp_write_community=""/>
          <FWBDManagement enabled="False" identity="" port="-1"/>
          <PolicyInstallScript arguments="" command="" enabled="False"/>
        </Management>
        <FirewallOptions>
          <Option name="accept_established">true</Option>
          <Option name="accept_new_tcp_with_no_syn">true</Option>
          <Option name="check_shading">true</Option>
          <Option name="configure_interfaces">true</Option>
          <Option name="eliminate_duplicates">true</Option>
          <Option name="firewall_dir">/etc</Option>
          <Option name="firewall_is_part_of_any_and_networks">true</Option>
          <Option name="freebsd_ip_forward">1</Option>
          <Option name="in_out_code">true</Option>
          <Option name="limit_value">0</Option>
          <Option name="linksys_path_ip"></Option>
          <Option name="linksys_path_iptables"></Option>
          <Option name="linksys_path_logger"></Option>
          <Option name="linksys_path_lsmod"></Option>
          <Option name="linksys_path_modprobe"></Option>
          <Option name="linux24_ip_forward">1</Option>
          <Option name="load_modules">true</Option>
          <Option name="local_nat">false</Option>
          <Option name="log_level">info</Option>
          <Option name="log_prefix">RULE %N -- %A </Option>
          <Option name="loopback_interface">lo0</Option>
          <Option name="macosx_ip_forward">1</Option>
          <Option name="manage_virtual_addr">true</Option>
          <Option name="openbsd_ip_forward">1</Option>
          <Option name="pass_all_out">false</Option>
          <Option name="pf_limit_frags">5000</Option>
          <Option name="pf_limit_states">10000</Option>
          <Option name="pf_scrub_maxmss">1460</Option>
          <Option name="pf_timeout_frag">30</Option>
          <Option name="pf_timeout_interval">10</Option>
          <Option name="pix_add_clear_statements">true</Option>
          <Option name="pix_assume_fw_part_of_any">true</Option>
          <Option name="pix_default_logint">300</Option>
          <Option name="pix_emblem_log_format">false</Option>
          <Option name="pix_emulate_out_acl">true</Option>
          <Option name="pix_floodguard">true</Option>
          <Option name="pix_include_comments">true</Option>
          <Option name="pix_route_dnat_supported">true</Option>
          <Option name="pix_rule_syslog_settings">false</Option>
          <Option name="pix_security_fragguard_supported">true</Option>
          <Option name="pix_syslog_device_id_supported">false</Option>
          <Option name="pix_use_acl_remarks">true</Option>
          <Option name="prompt1"> $ </Option>
          <Option name="prompt2"> # </Option>
          <Option name="solaris_ip_forward">1</Option>
          <Option name="ulog_nlgroup">1</Option>
          <Option name="verify_interfaces">true</Option>
        </FirewallOptions>
      </Firewall>
      <Firewall comment="This firewall has two interfaces. Eth0 faces outside and has a dynamic address; eth1 faces inside.&#10;Policy includes basic rules to permit unrestricted outbound access and anti-spoofing rules. Access to the firewall is permitted only from internal network and only using SSH. The firewall uses one of the machines on internal network for DNS. Internal network is configured with address 192.168.1.0/255.255.255.0" host_OS="linux24" id="id42C44C61" name="test-fw-2" platform="iptables" version="">
        <NAT id="id42C44C8B">
          <NATRule disabled="False" id="id42C44C8C" position="0">
            <OSrc neg="False">
              <ObjectRef ref="id3DC75CE7-1"/>
            </OSrc>
            <ODst neg="False">
              <ObjectRef ref="sysid0"/>
            </ODst>
            <OSrv neg="False">
              <ServiceRef ref="sysid1"/>
            </OSrv>
            <TSrc neg="False">
              <ObjectRef ref="id42C44C9A"/>
            </TSrc>
            <TDst neg="False">
              <ObjectRef ref="sysid0"/>
            </TDst>
            <TSrv neg="False">
              <ServiceRef ref="sysid1"/>
            </TSrv>
            <NATRuleOptions/>
          </NATRule>
        </NAT>
        <Policy id="id42C44C66">
          <PolicyRule action="Accept" disabled="False" id="id42C44C67" log="False" position="0">
            <Src neg="False">
              <ObjectRef ref="id42C34CCF"/>
              <ObjectRef ref="id42C34CD0"/>
            </Src>
            <Dst neg="False">
              <ObjectRef ref="id42C4490F"/>
            </Dst>
            <Srv neg="False">
              <ServiceRef ref="id3C20EEB5"/>
              <ServiceRef ref="tcp-HTTP"/>
            </Srv>
            <When neg="False">
              <IntervalRef ref="sysid2"/>
            </When>
            <PolicyRuleOptions/>
          </PolicyRule>
          <PolicyRule action="Accept" disabled="False" id="id42C44C73" log="False" position="1">
            <Src neg="True">
              <ObjectRef ref="id42C34CCF"/>
              <ObjectRef ref="id42C34CD0"/>
            </Src>
            <Dst neg="False">
              <ObjectRef ref="id42C4490F"/>
            </Dst>
            <Srv neg="False">
              <ServiceRef ref="tcp-HTTP"/>
            </Srv>
            <When neg="False">
              <IntervalRef ref="sysid2"/>
            </When>
            <PolicyRuleOptions/>
          </PolicyRule>
          <PolicyRule action="Accept" disabled="False" id="id42C44C7E" log="False" position="2">
            <Src neg="False">
              <ObjectRef ref="id42C4490D"/>
              <ObjectRef ref="id42C4490E"/>
            </Src>
            <Dst neg="False">
              <ObjectRef ref="id42C34CCF"/>
              <ObjectRef ref="id42C34CD0"/>
            </Dst>
            <Srv neg="False">
              <ServiceRef ref="id3C20EEB5"/>
              <ServiceRef ref="tcp-HTTP"/>
            </Srv>
            <When neg="False">
              <IntervalRef ref="sysid2"/>
            </When>
            <PolicyRuleOptions/>
          </PolicyRule>
        </Policy>
        <Interface comment="" dyn="True" id="id42C44C9A" label="outside" mgmt="False" name="eth0" security_level="0" unnum="False">
          <InterfacePolicy id="id42C44CA7">
            <PolicyRule action="Deny" comment="anti spoofing rule" direction="Inbound" disabled="False" id="id42C44CA8" log="True" position="0">
              <Src neg="False">
                <ObjectRef ref="id42C44C61"/>
                <ObjectRef ref="id3DC75CE7-1"/>
              </Src>
              <Dst neg="False">
                <ObjectRef ref="sysid0"/>
              </Dst>
              <Srv neg="False">
                <ServiceRef ref="sysid1"/>
              </Srv>
              <When neg="False">
                <IntervalRef ref="sysid2"/>
              </When>
              <PolicyRuleOptions/>
            </PolicyRule>
          </InterfacePolicy>
        </Interface>
        <Interface comment="" dyn="False" id="id42C44CB3" label="inside" mgmt="True" name="eth1" security_level="100" unnum="False">
          <IPv4 address="192.168.1.1" comment="" id="id42C44CB7" name="test-fw-2:eth1:ip" netmask="255.255.255.0"/>
          <InterfacePolicy id="id42C44CB6"/>
        </Interface>
        <Interface comment="" dyn="False" id="id42C44CB8" label="loopback" mgmt="False" name="lo" security_level="100" unnum="False">
          <IPv4 address="127.0.0.1" comment="" id="id42C44CD0" name="test-fw-2:lo:ip" netmask="255.0.0.0"/>
          <InterfacePolicy id="id42C44CC5">
            <PolicyRule action="Accept" direction="Both" disabled="False" id="id42C44CC6" log="False" position="0">
              <Src neg="False">
                <ObjectRef ref="sysid0"/>
              </Src>
              <Dst neg="False">
                <ObjectRef ref="sysid0"/>
              </Dst>
              <Srv neg="False">
                <ServiceRef ref="sysid1"/>
              </Srv>
              <When neg="False">
                <IntervalRef ref="sysid2"/>
              </When>
              <PolicyRuleOptions/>
            </PolicyRule>
          </InterfacePolicy>
        </Interface>
        <Management address="0.0.0.0">
          <SNMPManagement enabled="False" snmp_read_community="" snmp_write_community=""/>
          <FWBDManagement enabled="False" identity="" port="-1"/>
          <PolicyInstallScript arguments="" command="" enabled="False"/>
        </Management>
        <FirewallOptions>
          <Option name="accept_established">true</Option>
          <Option name="accept_new_tcp_with_no_syn">true</Option>
          <Option name="check_shading">true</Option>
          <Option name="configure_interfaces">true</Option>
          <Option name="eliminate_duplicates">true</Option>
          <Option name="firewall_dir">/etc</Option>
          <Option name="firewall_is_part_of_any_and_networks">true</Option>
          <Option name="freebsd_ip_forward">1</Option>
          <Option name="in_out_code">true</Option>
          <Option name="limit_value">0</Option>
          <Option name="linksys_path_ip"></Option>
          <Option name="linksys_path_iptables"></Option>
          <Option name="linksys_path_logger"></Option>
          <Option name="linksys_path_lsmod"></Option>
          <Option name="linksys_path_modprobe"></Option>
          <Option name="linux24_ip_forward">1</Option>
          <Option name="load_modules">true</Option>
          <Option name="local_nat">false</Option>
          <Option name="log_level">info</Option>
          <Option name="log_prefix">RULE %N -- %A </Option>
          <Option name="loopback_interface">lo0</Option>
          <Option name="macosx_ip_forward">1</Option>
          <Option name="manage_virtual_addr">true</Option>
          <Option name="openbsd_ip_forward">1</Option>
          <Option name="pass_all_out">false</Option>
          <Option name="pf_limit_frags">5000</Option>
          <Option name="pf_limit_states">10000</Option>
          <Option name="pf_scrub_maxmss">1460</Option>
          <Option name="pf_timeout_frag">30</Option>
          <Option name="pf_timeout_interval">10</Option>
          <Option name="pix_add_clear_statements">true</Option>
          <Option name="pix_assume_fw_part_of_any">true</Option>
          <Option name="pix_default_logint">300</Option>
          <Option name="pix_emblem_log_format">false</Option>
          <Option name="pix_emulate_out_acl">true</Option>
          <Option name="pix_floodguard">true</Option>
          <Option name="pix_include_comments">true</Option>
          <Option name="pix_route_dnat_supported">true</Option>
          <Option name="pix_rule_syslog_settings">false</Option>
          <Option name="pix_security_fragguard_supported">true</Option>
          <Option name="pix_syslog_device_id_supported">false</Option>
          <Option name="pix_use_acl_remarks">true</Option>
          <Option name="prompt1"> $ </Option>
          <Option name="prompt2"> # </Option>
          <Option name="solaris_ip_forward">1</Option>
          <Option name="ulog_nlgroup">1</Option>
          <Option name="verify_interfaces">true</Option>
        </FirewallOptions>
      </Firewall>
      <Firewall comment="This firewall has two interfaces. Eth0 faces outside and has a dynamic address; eth1 faces inside.&#10;Policy includes basic rules to permit unrestricted outbound access and anti-spoofing rules. Access to the firewall is permitted only from internal network and only using SSH. The firewall uses one of the machines on internal network for DNS. Internal network is configured with address 192.168.1.0/255.255.255.0" host_OS="linux24" id="id42C453AE" name="test-fw-3" platform="iptables" version="">
        <NAT id="id42C453D8">
          <NATRule disabled="False" id="id42C453D9" position="0">
            <OSrc neg="False">
              <ObjectRef ref="id3DC75CE7-1"/>
            </OSrc>
            <ODst neg="False">
              <ObjectRef ref="sysid0"/>
            </ODst>
            <OSrv neg="False">
              <ServiceRef ref="sysid1"/>
            </OSrv>
            <TSrc neg="False">
              <ObjectRef ref="id42C453E7"/>
            </TSrc>
            <TDst neg="False">
              <ObjectRef ref="sysid0"/>
            </TDst>
            <TSrv neg="False">
              <ServiceRef ref="sysid1"/>
            </TSrv>
            <NATRuleOptions/>
          </NATRule>
        </NAT>
        <Policy id="id42C453B3">
          <PolicyRule action="Accept" disabled="False" id="id42C453B4" log="False" position="0">
            <Src neg="False">
              <ObjectRef ref="id42C34CCF"/>
              <ObjectRef ref="id42C34CD0"/>
            </Src>
            <Dst neg="False">
              <ObjectRef ref="id42C4490F"/>
            </Dst>
            <Srv neg="False">
              <ServiceRef ref="id3C20EEB5"/>
              <ServiceRef ref="tcp-HTTP"/>
            </Srv>
            <When neg="False">
              <IntervalRef ref="sysid2"/>
            </When>
            <PolicyRuleOptions/>
          </PolicyRule>
          <PolicyRule action="Accept" disabled="False" id="id42C453C0" log="False" position="1">
            <Src neg="True">
              <ObjectRef ref="id42C34CCF"/>
              <ObjectRef ref="id42C34CD0"/>
            </Src>
            <Dst neg="False">
              <ObjectRef ref="id42C4490F"/>
            </Dst>
            <Srv neg="False">
              <ServiceRef ref="tcp-HTTP"/>
            </Srv>
            <When neg="False">
              <IntervalRef ref="sysid2"/>
            </When>
            <PolicyRuleOptions/>
          </PolicyRule>
          <PolicyRule action="Accept" disabled="False" id="id42C453CB" log="False" position="2">
            <Src neg="False">
              <ObjectRef ref="id42C4490D"/>
              <ObjectRef ref="id42C4490E"/>
            </Src>
            <Dst neg="False">
              <ObjectRef ref="id42C34CCF"/>
              <ObjectRef ref="id42C34CD0"/>
            </Dst>
            <Srv neg="False">
              <ServiceRef ref="id3C20EEB5"/>
              <ServiceRef ref="tcp-HTTP"/>
            </Srv>
            <When neg="False">
              <IntervalRef ref="sysid2"/>
            </When>
            <PolicyRuleOptions/>
          </PolicyRule>
        </Policy>
        <Interface comment="" dyn="True" id="id42C453E7" label="" mgmt="False" name="ppp*" security_level="0" unnum="False">
          <InterfacePolicy id="id42C453F4">
            <PolicyRule action="Deny" comment="anti spoofing rule" direction="Inbound" disabled="False" id="id42C453F5" log="True" position="0">
              <Src neg="False">
                <ObjectRef ref="id42C453AE"/>
                <ObjectRef ref="id3DC75CE7-1"/>
              </Src>
              <Dst neg="False">
                <ObjectRef ref="sysid0"/>
              </Dst>
              <Srv neg="False">
                <ServiceRef ref="sysid1"/>
              </Srv>
              <When neg="False">
                <IntervalRef ref="sysid2"/>
              </When>
              <PolicyRuleOptions/>
            </PolicyRule>
          </InterfacePolicy>
        </Interface>
        <Interface comment="" dyn="False" id="id42C45400" label="" mgmt="True" name="eth0" security_level="100" unnum="False">
          <IPv4 address="192.168.1.1" comment="" id="id42C45404" name="test-fw-3:eth0:ip" netmask="255.255.255.0"/>
          <InterfacePolicy id="id42C45403"/>
        </Interface>
        <Interface comment="" dyn="False" id="id42C45405" label="" mgmt="False" name="lo" security_level="100" unnum="False">
          <IPv4 address="127.0.0.1" comment="" id="id42C4541D" name="test-fw-3:lo:ip" netmask="255.0.0.0"/>
          <InterfacePolicy id="id42C45412">
            <PolicyRule action="Accept" direction="Both" disabled="False" id="id42C45413" log="False" position="0">
              <Src neg="False">
                <ObjectRef ref="sysid0"/>
              </Src>
              <Dst neg="False">
                <ObjectRef ref="sysid0"/>
              </Dst>
              <Srv neg="False">
                <ServiceRef ref="sysid1"/>
              </Srv>
              <When neg="False">
                <IntervalRef ref="sysid2"/>
              </When>
              <PolicyRuleOptions/>
            </PolicyRule>
          </InterfacePolicy>
        </Interface>
        <Management address="0.0.0.0">
          <SNMPManagement enabled="False" snmp_read_community="" snmp_write_community=""/>
          <FWBDManagement enabled="False" identity="" port="-1"/>
          <PolicyInstallScript arguments="" command="" enabled="False"/>
        </Management>
        <FirewallOptions>
          <Option name="accept_established">true</Option>
          <Option name="accept_new_tcp_with_no_syn">true</Option>
          <Option name="check_shading">true</Option>
          <Option name="configure_interfaces">true</Option>
          <Option name="eliminate_duplicates">true</Option>
          <Option name="firewall_dir">/etc</Option>
          <Option name="firewall_is_part_of_any_and_networks">true</Option>
          <Option name="freebsd_ip_forward">1</Option>
          <Option name="in_out_code">true</Option>
          <Option name="limit_value">0</Option>
          <Option name="linksys_path_ip"></Option>
          <Option name="linksys_path_iptables"></Option>
          <Option name="linksys_path_logger"></Option>
          <Option name="linksys_path_lsmod"></Option>
          <Option name="linksys_path_modprobe"></Option>
          <Option name="linux24_ip_forward">1</Option>
          <Option name="load_modules">true</Option>
          <Option name="local_nat">false</Option>
          <Option name="log_level">info</Option>
          <Option name="log_prefix">RULE %N -- %A </Option>
          <Option name="loopback_interface">lo0</Option>
          <Option name="macosx_ip_forward">1</Option>
          <Option name="manage_virtual_addr">true</Option>
          <Option name="openbsd_ip_forward">1</Option>
          <Option name="pass_all_out">false</Option>
          <Option name="pf_limit_frags">5000</Option>
          <Option name="pf_limit_states">10000</Option>
          <Option name="pf_scrub_maxmss">1460</Option>
          <Option name="pf_timeout_frag">30</Option>
          <Option name="pf_timeout_interval">10</Option>
          <Option name="pix_add_clear_statements">true</Option>
          <Option name="pix_assume_fw_part_of_any">true</Option>
          <Option name="pix_default_logint">300</Option>
          <Option name="pix_emblem_log_format">false</Option>
          <Option name="pix_emulate_out_acl">true</Option>
          <Option name="pix_floodguard">true</Option>
          <Option name="pix_include_comments">true</Option>
          <Option name="pix_route_dnat_supported">true</Option>
          <Option name="pix_rule_syslog_settings">false</Option>
          <Option name="pix_security_fragguard_supported">true</Option>
          <Option name="pix_syslog_device_id_supported">false</Option>
          <Option name="pix_use_acl_remarks">true</Option>
          <Option name="prompt1"> $ </Option>
          <Option name="prompt2"> # </Option>
          <Option name="solaris_ip_forward">1</Option>
          <Option name="ulog_nlgroup">1</Option>
          <Option name="verify_interfaces">true</Option>
        </FirewallOptions>
      </Firewall>
    </ObjectGroup>
    <IntervalGroup id="id42C39FC5" name="Time"/>
  </Library>
  <Library id="sysid99" name="Deleted Objects" ro="False">
    <ObjectRef ref="sysid0"/>
  </Library>
  <Library color="#d4f8ff" comment="Standard objects" id="syslib000" name="Standard" ro="True">
    <ServiceGroup id="stdid05" name="Services">
      <ServiceGroup id="stdid09" name="TCP">
        <TCPService ack_flag="False" ack_flag_mask="False" comment="" dst_range_end="80" dst_range_start="80" fin_flag="False" fin_flag_mask="False" id="tcp-HTTP" name="http" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" src_range_end="0" src_range_start="0" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False"/>
        <TCPService ack_flag="False" ack_flag_mask="False" comment="" dst_range_end="21" dst_range_start="21" fin_flag="False" fin_flag_mask="False" id="tcp-FTP" name="ftp" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" src_range_end="0" src_range_start="0" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False"/>
      </ServiceGroup>
      <ServiceGroup id="stdid07" name="ICMP">
        <ICMPService code="-1" comment="" id="id3C20EEB5" name="any ICMP" type="-1"/>
      </ServiceGroup>
    </ServiceGroup>
    <AnyInterval comment="Any Interval" from_day="-1" from_hour="-1" from_minute="-1" from_month="-1" from_weekday="-1" from_year="-1" id="sysid2" name="Any" to_day="-1" to_hour="-1" to_minute="-1" to_month="-1" to_weekday="-1" to_year="-1"/>
    <ObjectGroup id="stdid01" name="Objects">
      <ObjectGroup id="stdid03" name="Networks">
        <Network comment="192.168.1.0/24 - Address often used for home and small office networks.&#10;" id="id3DC75CE7-1" name="net-192.168.1.0" address="192.168.1.0" netmask="255.255.255.0"/>
      </ObjectGroup>
    </ObjectGroup>
    <AnyNetwork comment="Any Network" id="sysid0" name="Any" address="0.0.0.0" netmask="0.0.0.0"/>
    <AnyIPService comment="Any IP Service" id="sysid1" name="Any" protocol_num="0"/>
  </Library>
</FWObjectDatabase>
