Here is it:
=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2014.07.23 10:20:22 =~=~=~=~=~=~=~=~=~=~=~=
sh run
version 6.4.0.0-4.1.0
virtual-controller-country US
virtual-controller-key 3133393336333835353132343a44453a43382062797465737a
name "Instant Virtual Controller"
organization
virtual-controller-ip 10.8.10.54
terminal-access
ntp-server 0.us.pool.ntp.org
clock timezone Pacific-Time -08 00
clock summer-time PDT recurring second sunday march 02:00 first sunday november 02:00
rf-band all
dynamic-radius-proxy
ams-ip 10.8.2.5
ams-key 60fb94dae318cae66224937b82c85dc4b1e0d418b54551d3
ams-identity 25833716fc0233aafbeda2b4a800f9a3
allow-new-aps
allowed-ap 24:de:c6:ce:84:d3
allowed-ap 24:de:c6:ce:84:ed
allowed-ap 24:de:c6:ce:84:d9
allowed-ap 24:de:c6:ce:84:d0
allowed-ap 24:de:c6:ce:84:d8
allowed-ap 24:de:c6:ce:84:2b
allowed-ap 24:de:c6:ce:84:da
allowed-ap 24:de:c6:ce:84:d6
allowed-ap 18:64:72:c6:63:00
arm
wide-bands all
80mhz-support
min-tx-power 18
max-tx-power 127
band-steering-mode prefer-5ghz
air-time-fairness-mode preferred-access
client-aware
scanning
client-match
rf dot11g-radio-profile
spectrum-monitor
interference-immunity 3
rf dot11a-radio-profile
spectrum-monitor
internal-domains
domain-name
domain-name
syslog-level warn ap-debug
syslog-level warn network
syslog-level warn security
syslog-level warn system
syslog-level warn user
syslog-level warn user-debug
syslog-level warn wireless
deny-inter-user-bridging
deny-local-routing
user guest 9fb79ea1a40485f29da7d23c86066964 portal
mgmt-user admin 1ebc3cfd407fcdeade12fb8650a884ec60c46c9e821a07b7
wlan access-rule default_wired_port_profile
index 0
rule any any match any any any permit
wlan access-rule "TP 2.4GHZ"
index 1
rule any any match any any any permit
wlan access-rule wired-instant
index 2
rule masterip 0.0.0.0 match tcp 80 80 permit
rule masterip 0.0.0.0 match tcp 4343 4343 permit
rule any any match udp 67 68 permit
rule any any match udp 53 53 permit
wlan access-rule "internal"
index 3
rule any any match any any any permit
wlan access-rule TP-Guest
index 4
rule any any match udp 67 68 permit
rule any any match udp 53 53 permit
rule 10.8.1.4 255.255.255.255 match icmp any any permit
rule 10.8.0.0 255.255.0.0 match any any any deny
rule any any match any any any permit
wlan access-rule "TP 5GHZ"
index 5
rule any any match any any any permit
wlan access-rule test
index 6
rule any any match any any any permit
wlan ssid-profile "TP 2.4GHZ"
enable
index 0
type employee
essid "TP 2.4GHZ"
opmode wpa2-aes
max-authentication-failures 0
vlan guest
auth-server vdc1
auth-survivability
rf-band 2.4
captive-portal disable
dtim-period 1
inactivity-timeout 1000
broadcast-filter arp
dmo-channel-utilization-threshold 90
local-probe-req-thresh 0
max-clients-threshold 64
okc
dot11r
dot11k
dot11v
wlan ssid-profile "internal"
enable
index 1
termination
type employee
essid "internal"
opmode wpa2-aes
max-authentication-failures 0
auth-server vdc1
rf-band all
captive-portal disable
dtim-period 1
inactivity-timeout 1000
broadcast-filter none
blacklist
dmo-channel-utilization-threshold 90
local-probe-req-thresh 0
max-clients-threshold 64
dot11v
wlan ssid-profile TP-Guest
enable
index 2
type guest
essid TP-Guest
wpa-passphrase f5985a98506272e3423f6aeed258d2ebf8c837ddd574653c
opmode wpa2-psk-aes
max-authentication-failures 0
rf-band all
captive-portal disable
dtim-period 1
inactivity-timeout 1000
broadcast-filter arp
dmo-channel-utilization-threshold 90
local-probe-req-thresh 0
max-clients-threshold 64
wlan ssid-profile "TP 5GHZ"
enable
index 3
type employee
essid "TP 5GHZ"
opmode wpa2-aes
max-authentication-failures 0
auth-server vdc1
auth-survivability
rf-band 5.0
captive-portal disable
dtim-period 1
inactivity-timeout 1000
broadcast-filter arp
dmo-channel-utilization-threshold 90
local-probe-req-thresh 0
max-clients-threshold 64
okc
dot11r
dot11k
dot11v
wlan ssid-profile test
enable
index 4
type guest
essid test
wpa-passphrase 8ead216160a9de007a593acae1c51923af87e11d46958d6e
opmode wpa2-psk-aes
max-authentication-failures 0
vlan guest
rf-band all
captive-portal disable
dtim-period 1
inactivity-timeout 1000
broadcast-filter arp
dmo-channel-utilization-threshold 90
local-probe-req-thresh 0
max-clients-threshold 64
auth-survivability cache-time-out 24
dpi
wlan auth-server
ip
port 1812
acctport 1813
key a1c81747945dcec66a03927fcc43f764e495b2fe9fc9ac7e
nas-ip 10.8.10.54
rfc3576
cppm-rfc3576-port 5999
wlan external-captive-portal
server localhost
port 80
url "/"
auth-text "Authenticated"
blacklist-time 3600
auth-failure-blacklist-time 3600
ids
wireless-containment none
infrastructure-detection-level high
client-detection-level high
infrastructure-protection-level high
client-protection-level high
wired-port-profile default_wired_port_profile
switchport-mode trunk
allowed-vlan all
native-vlan 1
shutdown
access-rule-name default_wired_port_profile
speed auto
duplex full
no poe
type employee
captive-portal disable
no dot1x
wired-port-profile wired-instant
switchport-mode access
allowed-vlan all
native-vlan guest
no shutdown
access-rule-name wired-instant
speed auto
duplex auto
no poe
type guest
captive-portal disable
no dot1x
enet0-port-profile default_wired_port_profile
uplink
preemption
enforce none
failover-internet-pkt-lost-cnt 10
failover-internet-pkt-send-freq 30
failover-vpn-timeout 180
airgroup
disable
airgroupservice airplay
disable
description AirPlay
airgroupservice airprint
disable
description AirPrint
attack
drop-bad-arp-enable
fix-dhcp-enable
poison-check-enable
Accounting 225 - p11-35#