■商品説明
Palo Alto PA-5220 P/N: 750-000132-00A ネットワークセキュリティアプライアンス、耳付き、動作確認済み
・FINISAR FCLF8522P2BTL SFP * 8個
・HDD SATA 2TB P/N:1FM101 - 004 * 2個
・SSD DC S3520 Series 240GB * 2個
IDFadmin
Pass:P@ssw0rd
admin@PA-5220> shadmin@PA-5220> show clo
> clock Show system date and time
> cloud-appid Show cloud appid information
> cloud-auth-service-metadata Get cloud authentication service metadata for a region
> cloud-auth-service-profiles Get cloud authentication service profiles of a tenant for a region
> cloud-auth-service-regions Get cloud authentication service deployed regions
> cloud-auth-service-tenants Get cloud authentication service tenants for a region
admin@PA-5220> show clock
Thu Feb 15 23:04:11 PST 2024
admin@PA-5220>
admin@PA-5220> show admin@PA-5220> show system admin@PA-5220> show system info
hostname: PA-5220
ip-address: 192.168.1.1
public-ip-address: unknown
netmask: 255.255.255.0
default-gateway:
ip-assignment: static
ipv6-address: unknown
ipv6-link-local-address: unknown
ipv6-default-gateway:
mac-address: d4:f4:be:c3:70:71
time: Thu Feb 15 23:04:20 2024
uptime: 0 days, 0:07:36
family: 5200
model: PA-5220
serial: 013201004874
cloud-mode: non-cloud
sw-version: 10.1.9-h1
global-protect-client-package-version: 0.0.0
device-dictionary-version: 1-211
device-dictionary-release-date:
app-version: 8635-7675
app-release-date:
av-version: 0
av-release-date:
threat-version: 0
threat-release-date:
wf-private-version: 0
wf-private-release-date: unknown
url-db: paloaltonetworks
wildfire-version: 0
wildfire-release-date:
wildfire-rt: Disabled
url-filtering-version: 0000.00.00.000
global-protect-datafile-version: unknown
global-protect-datafile-release-date: unknown
global-protect-clientless-vpn-version: 0
global-protect-clientless-vpn-release-date:
logdb-version: 10.1.2
dlp: dlp-1.0.7
platform-family: 5200
high-speed-log-forwarding-mode: off
vpn-disable-mode: off
multi-vsys: off
operational-mode: normal
device-certificate-status: None
admin@PA-5220>
admin@PA-5220> shadmin@PA-5220> show system admin@PA-5220> show system env
Invalid syntax.
admin@PA-5220> show system environmentals
----Thermal----
Slot Description Alarm Degrees C Min C Max C
S0 Temperature: Broadwell MP Core False 29.80 -5.00 85.00
S1 NP False 36.60 -5.00 70.00
S1 CP False 34.80 -5.00 85.00
S1 DP0/CE False 37.80 -5.00 75.00
S1 DP0 Core False 59.60 -5.00 85.00
S1 Top Front False 29.30 -5.00 70.00
S1 Switch False 29.40 -5.00 70.00
S1 CP Core False 49.60 -5.00 85.00
S1 Switch Core False 43.60 -5.00 85.00
S1 NP Core False 32.40 -5.00 70.00
S1 Bottom Front False 24.80 -5.00 70.00
S1 DP1/DP2 False 27.10 -5.00 70.00
S1 Bottom Rear False 28.20 -5.00 85.00
----Fan Tray----
Slot Description Alarm Inserted
S1 Fan Tray #1 (left) False True
S1 Fan Tray #2 (right) False True
----Fans----
Slot Description Alarm RPMs Min RPM
S1 Fan #1.1 RPM False 4591 3000
S1 Fan #1.2 RPM False 4648 3000
S1 Fan #1.3 RPM False 4758 3000
S1 Fan #1.4 RPM False 4804 3000
S1 Fan #2.1 RPM False 4911 3000
S1 Fan #2.2 RPM False 4679 3000
S1 Fan #2.3 RPM False 4879 3000
S1 Fan #2.4 RPM False 4898 3000
----Power----
Slot Description Alarm Volts Min V Max V
S1 Power Rail: NB - Switch 1.0V Core False 1.01 0.90 1.10
S1 Power Rail: NB - Switch 1.0V Serdes False 1.00 0.90 1.10
S1 Power Rail: NB - 2.5V Power Rail False 2.50 2.25 2.75
S1 Power Rail: NB - 3.3V Power Rail False 3.31 2.97 3.63
S1 Power Rail: CE - DP0 0.90V Core False 0.90 0.81 0.99
S1 Power Rail: CE - 0.95V Power Rail False 0.95 0.85 1.04
S1 Power Rail: CE - 0.95V CE40 FPGA False 0.98 0.85 1.04
S1 Power Rail: CE - 1.0V Power Rail False 1.00 0.90 1.10
S1 Power Rail: CE - 1.2V Power Rail False 1.20 1.08 1.32
S1 Power Rail: CE - 1.35V Power Rail False 1.36 1.22 1.49
S1 Power Rail: NB - 0.9V Power Rail False 0.91 0.81 0.99
S1 Power Rail: CE - 1.5V Power Rail False 1.50 1.35 1.65
S1 Power Rail: CE - 1.8V Power Rail False 1.79 1.62 1.98
S1 Power Rail: CE - 2.5V Power Rail False 2.50 2.25 2.75
S1 Power Rail: CE - 3.3V Power Rail False 3.32 2.97 3.63
S1 Power Rail: MP - 1.8V VCCIN False 1.79 1.62 1.98
S1 Power Rail: MP - 1V05 False 1.05 0.94 1.16
S1 Power Rail: MP - 1V2_VDDQ False 1.20 1.08 1.32
S1 Power Rail: MP - 0V6_VTT False 0.60 0.54 0.66
S1 Power Rail: MP - 1V2_MAC False 1.21 1.08 1.32
S1 Power Rail: MP - 1V3_VCCKRHV False 1.31 1.17 1.43
S1 Power Rail: NB - 0.95V TCAM False 0.95 0.85 1.04
S1 Power Rail: MP - 1V5_PCH False 1.49 1.35 1.65
S1 Power Rail: MP - 1V7_SUS False 1.71 1.53 1.87
S1 Power Rail: MP - 2V5_DDR4 False 2.51 2.25 2.75
S1 Power Rail: MP - 3V3_PCH False 3.31 2.97 3.63
S1 Power Rail: MP - 3V3 False 3.31 2.97 3.63
S1 Power Rail: MP - 5V0 False 5.01 4.50 5.50
S1 Power Rail: NB - 0.95V NP False 0.96 0.85 1.04
S1 Power Rail: NB - 1.028V VCS False 1.04 0.90 1.10
S1 Power Rail: NB - 1.2V Power Rail False 1.21 1.08 1.32
S1 Power Rail: NB - 1.2V NP False 1.21 1.08 1.32
S1 Power Rail: NB - 1.5V Power Rail False 1.50 1.35 1.65
S1 Power Rail: NB - 1.8V Power Rail False 1.80 1.62 1.98
----Power Supplies----
Slot Description Alarm Inserted
S1 Power Supply #1 (left) False True
S1 Power Supply #2 (right) True True
admin@PA-5220>
admin@PA-5220> show admin@PA-5220> show lrequest li
> license Perform license related operations
> list-content-downloads List content downloads
admin@PA-5220> request license info
Current GMT Date: February 16, 2024
admin@PA-5220>
admin@PA-5220> show admin@PA-5220> show interface a
all Show all interface information
aux-1 aux-1
aux-2 aux-2
<value> <name> interface name
<Enter> Finish input
admin@PA-5220> show interface all
Server error : Dataplane is not up or invalid target-dp(*.*).
admin@PA-5220> show interface all
| Pipe through a command
<Enter> Finish input
admin@PA-5220> show interface all
Server error : Dataplane is not up or invalid target-dp(*.*).
admin@PA-5220>
admin@PA-5220> show admin@PA-5220> show syssystem resources
top - 23:05:10 up 8 min, 1 user, load average: 1.41, 1.40, 0.78
Tasks: 295 total, 1 running, 185 sleeping, 0 stopped, 0 zombie
%Cpu(s): 0.4 us, 0.4 sy, 0.0 ni, 93.0 id, 6.2 wa, 0.0 hi, 0.0 si, 0.0 st
KiB Mem : 32603284 total, 22589776 free, 5013176 used, 5000332 buff/cache
KiB Swap: 0 total, 0 free, 0 used. 26919368 avail Mem
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
8398 20 0 645944 217016 147136 S 6.7 0.7 0:01.36 useridd
1 20 0 4388 1508 1404 S 0.0 0.0 0:00.91 init
2 20 0 0 0 0 S 0.0 0.0 0:00.00 kthreadd
3 0 -20 0 0 0 I 0.0 0.0 0:00.00 rcu_gp
4 0 -20 0 0 0 I 0.0 0.0 0:00.00 rcu_par_gp
5 20 0 0 0 0 I 0.0 0.0 0:00.00 kworker/0:+
6 0 -20 0 0 0 I 0.0 0.0 0:00.00 kworker/0:+
8 0 -20 0 0 0 I 0.0 0.0 0:00.00 mm_percpu_+
9 20 0 0 0 0 S 0.0 0.0 0:00.00 ksoftirqd/0
10 20 0 0 0 0 I 0.0 0.0 0:00.13 rcu_sched
11 rt 0 0 0 0 S 0.0 0.0 0:00.30 migration/0
12 rt 0 0 0 0 S 0.0 0.0 0:00.00 watchdog/0
13 20 0 0 0 0 S 0.0 0.0 0:00.00 cpuhp/0
14 20 0 0 0 0 S 0.0 0.0 0:00.00 cpuhp/1
15 rt 0 0 0 0 S 0.0 0.0 0:00.00 watchdog/1
16 rt 0 0 0 0 S 0.0 0.0 0:00.30 migration/1
17 20 0 0 0 0 S 0.0 0.0 0:00.00 ksoftirqd/1
18 20 0 0 0 0 I 0.0 0.0 0:00.00 kworker/1:+
19 0 -20 0 0 0 I 0.0 0.0 0:00.00 kworker/1:+
20 20 0 0 0 0 S 0.0 0.0 0:00.00 cpuhp/2
21 rt 0 0 0 0 S 0.0 0.0 0:00.00 watchdog/2
22 rt 0 0 0 0 S 0.0 0.0 0:00.30 migration/2
23 20 0 0 0 0 S 0.0 0.0 0:00.00 ksoftirqd/2
24 20 0 0 0 0 I 0.0 0.0 0:00.00 kworker/2:+
25 0 -20 0 0 0 I 0.0 0.0 0:00.00 kworker/2:+
26 20 0 0 0 0 S 0.0 0.0 0:00.00 cpuhp/3
27 rt 0 0 0 0 S 0.0 0.0 0:00.00 watchdog/3
28 rt 0 0 0 0 S 0.0 0.0 0:00.30 migration/3
29 20 0 0 0 0 S 0.0 0.0 0:00.00 ksoftirqd/3
30 20 0 0 0 0 I 0.0 0.0 0:00.00 kworker/3:+
31 0 -20 0 0 0 I 0.0 0.0 0:00.00 kworker/3:+
32 20 0 0 0 0 S 0.0 0.0 0:00.00 cpuhp/4
33 rt 0 0 0 0 S 0.0 0.0 0:00.00 watchdog/4
34 rt 0 0 0 0 S 0.0 0.0 0:00.30 migration/4
35 20 0 0 0 0 S 0.0 0.0 0:00.00 ksoftirqd/4
36 20 0 0 0 0 I 0.0 0.0 0:00.00 kworker/4:+
37 0 -20 0 0 0 I 0.0 0.0 0:00.00 kworker/4:+
38 20 0 0 0 0 S 0.0 0.0 0:00.00 cpuhp/5
39 rt 0 0 0 0 S 0.0 0.0 0:00.00 watchdog/5
40 rt 0 0 0 0 S 0.0 0.0 0:00.30 migration/5
41 20 0 0 0 0 S 0.0 0.0 0:00.00 ksoftirqd/5
43 0 -20 0 0 0 I 0.0 0.0 0:00.00 kworker/5:+
44 20 0 0 0 0 S 0.0 0.0 0:00.00 cpuhp/6
45 rt 0 0 0 0 S 0.0 0.0 0:00.00 watchdog/6
46 rt 0 0 0 0 S 0.0 0.0 0:00.30 migration/6
47 20 0 0 0 0 S 0.0 0.0 0:00.00 ksoftirqd/6
48 20 0 0 0 0 I 0.0 0.0 0:00.00 kworker/6:+
49 0 -20 0 0 0 I 0.0 0.0 0:00.00 kworker/6:+
50 20 0 0 0 0 S 0.0 0.0 0:00.00 cpuhp/7
51 rt 0 0 0 0 S 0.0 0.0 0:00.00 watchdog/7
52 rt 0 0 0 0 S 0.0 0.0 0:00.30 migration/7
53 20 0 0 0 0 S 0.0 0.0 0:00.00 ksoftirqd/7
54 20 0 0 0 0 I 0.0 0.0 0:00.00 kworker/7:+
55 0 -20 0 0 0 I 0.0 0.0 0:00.00 kworker/7:+
56 20 0 0 0 0 S 0.0 0.0 0:00.00 cpuhp/8
57 rt 0 0 0 0 S 0.0 0.0 0:00.00 watchdog/8
58 rt 0 0 0 0 S 0.0 0.0 0:00.30 migration/8
59 20 0 0 0 0 S 0.0 0.0 0:00.00 ksoftirqd/8
60 20 0 0 0 0 I 0.0 0.0 0:00.00 kworker/8:+
61 0 -20 0 0 0 I 0.0 0.0 0:00.00 kworker/8:+
62 20 0 0 0 0 S 0.0 0.0 0:00.00 cpuhp/9
63 rt 0 0 0 0 S 0.0 0.0 0:00.00 watchdog/9
64 rt 0 0 0 0 S 0.0 0.0 0:00.30 migration/9
65 20 0 0 0 0 S 0.0 0.0 0:00.00 ksoftirqd/9
66 20 0 0 0 0 I 0.0 0.0 0:00.00 kworker/9:+
67 0 -20 0 0 0 I 0.0 0.0 0:00.00 kworker/9:+
68 20 0 0 0 0 S 0.0 0.0 0:00.00 cpuhp/10
admin@PA-5220>
admin@PA-5220> show admin@PA-5220> show log admin@PA-5220> show log info
Invalid syntax.
admin@PA-5220>
admin@PA-5220> sconfigure
Entering configuration mode
[edit]
admin@PA-5220# show
set deviceconfig system ip-address 192.168.1.1
set deviceconfig system netmask 255.255.255.0
set deviceconfig system update-server updates.paloaltonetworks.com
set deviceconfig system update-schedule threats recurring weekly day-of-week wednesday
set deviceconfig system update-schedule threats recurring weekly at 01:02
set deviceconfig system update-schedule threats recurring weekly action download-only
set deviceconfig system timezone US/Pacific
set deviceconfig system service disable-telnet yes
set deviceconfig system service disable-http yes
set deviceconfig system hostname PA-5220
set deviceconfig setting config rematch yes
set deviceconfig setting management hostname-type-in-syslog FQDN
set network interface ethernet ethernet1/1 virtual-wire
set network interface ethernet ethernet1/2 virtual-wire
set network interface loopback units
set network interface vlan units
set network interface tunnel units
set network vlan
set network virtual-wire default-vwire interface1 ethernet1/1
set network virtual-wire default-vwire interface2 ethernet1/2
set network profiles monitor-profile default interval 3
set network profiles monitor-profile default threshold 5
set network profiles monitor-profile default action wait-recover
set network ike crypto-profiles ike-crypto-profiles default encryption [ aes-128-cbc 3des ]
set network ike crypto-profiles ike-crypto-profiles default hash sha1
set network ike crypto-profiles ike-crypto-profiles default dh-group group2
set network ike crypto-profiles ike-crypto-profiles default lifetime hours 8
set network ike crypto-profiles ike-crypto-profiles Suite-B-GCM-128 encryption aes-128-cbc
set network ike crypto-profiles ike-crypto-profiles Suite-B-GCM-128 hash sha256
set network ike crypto-profiles ike-crypto-profiles Suite-B-GCM-128 dh-group group19
set network ike crypto-profiles ike-crypto-profiles Suite-B-GCM-128 lifetime hours 8
set network ike crypto-profiles ike-crypto-profiles Suite-B-GCM-256 encryption aes-256-cbc
set network ike crypto-profiles ike-crypto-profiles Suite-B-GCM-256 hash sha384
set network ike crypto-profiles ike-crypto-profiles Suite-B-GCM-256 dh-group group20
set network ike crypto-profiles ike-crypto-profiles Suite-B-GCM-256 lifetime hours 8
set network ike crypto-profiles ipsec-crypto-profiles default esp encryption [ aes-128-cbc 3des ]
set network ike crypto-profiles ipsec-crypto-profiles default esp authentication sha1
set network ike crypto-profiles ipsec-crypto-profiles default dh-group group2
set network ike crypto-profiles ipsec-crypto-profiles default lifetime hours 1
set network ike crypto-profiles ipsec-crypto-profiles Suite-B-GCM-128 esp encryption aes-128-gcm
set network ike crypto-profiles ipsec-crypto-profiles Suite-B-GCM-128 esp authentication none
set network ike crypto-profiles ipsec-crypto-profiles Suite-B-GCM-128 dh-group group19
set network ike crypto-profiles ipsec-crypto-profiles Suite-B-GCM-128 lifetime hours 1
set network ike crypto-profiles ipsec-crypto-profiles Suite-B-GCM-256 esp encryption aes-256-gcm
set network ike crypto-profiles ipsec-crypto-profiles Suite-B-GCM-256 esp authentication none
set network ike crypto-profiles ipsec-crypto-profiles Suite-B-GCM-256 dh-group group20
set network ike crypto-profiles ipsec-crypto-profiles Suite-B-GCM-256 lifetime hours 1
set network ike crypto-profiles global-protect-app-crypto-profiles default encryption aes-128-cbc
set network ike crypto-profiles global-protect-app-crypto-profiles default authentication sha1
set network qos profile default class-bandwidth-type mbps class class1 priority real-time
set network qos profile default class-bandwidth-type mbps class class2 priority high
set network qos profile default class-bandwidth-type mbps class class3 priority high
set network qos profile default class-bandwidth-type mbps class class4 priority medium
set network qos profile default class-bandwidth-type mbps class class5 priority medium
set network qos profile default class-bandwidth-type mbps class class6 priority low
set network qos profile default class-bandwidth-type mbps class class7 priority low
set network qos profile default class-bandwidth-type mbps class class8 priority low
set network virtual-router default protocol bgp enable no
set network virtual-router default protocol bgp dampening-profile default cutoff 1.25
set network virtual-router default protocol bgp dampening-profile default reuse 0.5
set network virtual-router default protocol bgp dampening-profile default max-hold-time 900
set network virtual-router default protocol bgp dampening-profile default decay-half-life-reachable 300
set network virtual-router default protocol bgp dampening-profile default decay-half-life-unreachable 900
set network virtual-router default protocol bgp dampening-profile default enable yes
set shared application
set shared application-group
set shared service
set shared service-group
set shared botnet configuration http dynamic-dns enabled yes
set shared botnet configuration http dynamic-dns threshold 5
set shared botnet configuration http malware-sites enabled yes
set shared botnet configuration http malware-sites threshold 5
set shared botnet configuration http recent-domains enabled yes
set shared botnet configuration http recent-domains threshold 5
set shared botnet configuration http ip-domains enabled yes
set shared botnet configuration http ip-domains threshold 10
set shared botnet configuration http executables-from-unknown-sites enabled yes
set shared botnet configuration http executables-from-unknown-sites threshold 5
set shared botnet configuration other-applications irc yes
set shared botnet configuration unknown-applications unknown-tcp destinations-per-hour 10
set shared botnet configuration unknown-applications unknown-tcp sessions-per-hour 10
set shared botnet configuration unknown-applications unknown-tcp session-length maximum-bytes 100
set shared botnet configuration unknown-applications unknown-tcp session-length minimum-bytes 50
set shared botnet configuration unknown-applications unknown-udp destinations-per-hour 10
set shared botnet configuration unknown-applications unknown-udp sessions-per-hour 10
set shared botnet configuration unknown-applications unknown-udp session-length maximum-bytes 100
set shared botnet configuration unknown-applications unknown-udp session-length minimum-bytes 50
set shared botnet report topn 100
set shared botnet report scheduled yes
set zone trust network virtual-wire ethernet1/2
set zone untrust network virtual-wire ethernet1/1
set service-group
set service
set schedule
set rulebase security rules rule1 from trust
set rulebase security rules rule1 to untrust
set rulebase security rules rule1 source any
set rulebase security rules rule1 destination any
set rulebase security rules rule1 service any
set rulebase security rules rule1 application any
set rulebase security rules rule1 action allow
set rulebase security rules rule1 log-end yes
set application-group
set application
set mgt-config users admin phash $5$uuwfpkvu$ul6k0pUHC6uS8sJU4ZlIt.BsZR/g7O0FBYdpPyFGCc9
set mgt-config users admin permissions role-based superuser yes
set mgt-config password-complexity enabled yes
set mgt-config password-complexity minimum-length 8
[edit]
admin@PA-5220#
*細かい傷や汚れがあります。
■ 保証期間: NC/NRでお願いします。
■ 発送方法: 佐川/ヤマト運輸(運送会社のご指定はできません。)
■送料について:梱包資材の費用や配送業者に持ち込む際に発生する交通費などが含まれていますので、ご了承下さい。
■ 入札前にご確認ください
* 上記以外のチェックは行なっておりません。その他詳細はすべて未確認です。
* 電話応対は不可です。取引ナビ及び質問欄でご連絡ください。
* 多忙な為、リアルタイムの返答はできかねますので余裕をもっての投稿・質問をお願い致します
* 質問落札後の対応は営業時間(平日9:00~17:00)内になります。
* 落札物到着後のサポート・使用方法の問合せにはお答えする事は出来ません
* 当方も別業者さんから譲られたものなので詳しい事情、パスワード及び分解痕跡などの確認することはできません。
* 連絡事項がある場合、受領後48時間以内に取引ナビでご連絡お願いします。
* 現状の状態を分かりやすく表記するようにしておりますが、程度の基準相違や表記しきれない部分もあります。神経質な方は入札をご遠慮ください。
* 中古品につきましては、可能な限り清掃し出品しておりますが、ヨゴレ等が多少残っている場合もあります。予めご了承ください。
* 中古品につきましては、画像は特別な記載がない限り「現品」です。画像にて状態をご確認ください。
* ジャンク、現状品、保証なし商品については、いかなる場合(万一のスペック記載違い含む)においても保証・返品・クレーム対象外でお願いします。
* ジャンク扱い商品については、記載の瑕疵が悪化する、または記載の瑕疵に起因し記載以外の瑕疵が発生する可能性もあります。
* 落札して頂いた後全く連絡か取れない方か多く、イタズラ入札が多発しております。申し訳ありませんが、新規さまの方のご入札はご遠慮いただいております。ご入札頂きましても削除させていただく場合がありますので、ご了承下さい。
上記の為、記載の現在の状態や画像の状態を保証するものでもありません。十分にご理解の上での入札をお願いします。
▲ ページトップへ