From b54a481241d52d350b0422cdf8ea6427d39aa80f Mon Sep 17 00:00:00 2001 From: proposalbot Date: Fri, 27 Oct 2023 20:20:19 +0000 Subject: [PATCH] Changes to vpc_umn from docs/doc-exports#820 (VPC UMN 20230720 version MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit VPC UMN Reviewed-by: Hajba, László Antal Co-authored-by: proposalbot Co-committed-by: proposalbot --- .../images/en-us_image_0000001151300782.png | Bin 7846 -> 0 bytes .../images/en-us_image_0000001229959315.png | Bin 35050 -> 0 bytes .../images/en-us_image_0000001267230305.png | Bin 391 -> 0 bytes .../images/en-us_image_0000001267350317.png | Bin 391 -> 0 bytes ...6.png => en-us_image_0000001572300492.png} | Bin ...0.png => en-us_image_0000001626574358.png} | Bin ...4.png => en-us_image_0000001626574362.png} | Bin ...2.png => en-us_image_0000001626574366.png} | Bin ...0.png => en-us_image_0000001626574370.png} | Bin ...4.png => en-us_image_0000001626575750.png} | Bin ...2.png => en-us_image_0000001626576382.png} | Bin ...4.png => en-us_image_0000001626576858.png} | Bin ...8.png => en-us_image_0000001626578706.png} | Bin ...8.png => en-us_image_0000001626734158.png} | Bin ...6.png => en-us_image_0000001626734162.png} | Bin ...0.png => en-us_image_0000001626734166.png} | Bin ...3.png => en-us_image_0000001626734174.png} | Bin ...7.png => en-us_image_0000001626735566.png} | Bin ...3.png => en-us_image_0000001626735570.png} | Bin ...7.png => en-us_image_0000001626736198.png} | Bin ...1.png => en-us_image_0000001626736678.png} | Bin ...5.png => en-us_image_0000001626736794.png} | Bin ...9.png => en-us_image_0000001626738526.png} | Bin .../images/en-us_image_0000001626894086.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001626894090.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001626894094.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001626894098.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001626894106.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001626894110.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001626895486.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001626896590.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001626897562.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001627052380.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001627054054.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001627054058.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001627054062.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001627054082.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001627055450.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001627055454.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001627056086.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001627056574.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001627056686.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001627174280.png | Bin 0 -> 356 bytes .../images/en-us_image_0000001627334080.png | Bin 0 -> 222 bytes .../images/en-us_image_0000001627493158.png | Bin 0 -> 8699 bytes .../images/en-us_image_0000001627653972.png | Bin 0 -> 8727 bytes .../images/en-us_image_0000001627744152.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001650535960.png | Bin 0 -> 36622 bytes .../images/en-us_image_0000001675254013.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675254017.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675254021.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675254033.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675255405.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675256029.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675256529.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675256657.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675258381.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675258889.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675373901.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675373905.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675373909.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675373913.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675373917.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675375297.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675375405.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675378241.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675413821.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675413825.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675413829.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675413833.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675413841.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675413845.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675415213.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675415841.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675416345.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675418673.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675613937.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675613941.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675613945.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675613953.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675613957.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675615337.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675616433.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675616561.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675618277.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675619157.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001675813933.png | Bin 0 -> 356 bytes .../images/en-us_image_0000001676063997.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001678437642.png | Bin 0 -> 38616 bytes .../images/en-us_image_0000001681512581.png | Bin 0 -> 128 bytes .../images/en-us_image_0000001699135873.png | Bin 0 -> 22788 bytes .../_static/images/en-us_image_0122999741.png | Bin 18362 -> 0 bytes .../_static/images/en-us_image_0148244691.png | Bin 16620 -> 0 bytes .../_static/images/en-us_image_0162733894.png | Bin 0 -> 13191 bytes .../_static/images/en-us_image_0167839112.png | Bin 20352 -> 22431 bytes .../_static/images/en-us_image_0167840073.png | Bin 39790 -> 22431 bytes .../_static/images/en-us_image_0211552164.png | Bin 27985 -> 22034 bytes .../_static/images/en-us_image_0211560998.png | Bin 28193 -> 22331 bytes .../_static/images/en-us_image_0239476777.png | Bin 457 -> 0 bytes .../_static/images/en-us_image_0274115599.png | Bin 20924 -> 16728 bytes .../_static/images/en-us_image_0285048674.png | Bin 24606 -> 19325 bytes ..._between_security_groups_and_firewalls.rst | 8 +- .../firewall/adding_a_firewall_rule.rst | 95 +++++---- .../associating_subnets_with_a_firewall.rst | 17 +- ...anging_the_sequence_of_a_firewall_rule.rst | 4 +- .../firewall/creating_a_firewall.rst | 8 +- .../firewall/deleting_a_firewall.rst | 10 +- .../firewall/deleting_a_firewall_rule.rst | 9 +- ...isassociating_a_subnet_from_a_firewall.rst | 10 +- .../enabling_or_disabling_a_firewall.rst | 12 +- .../enabling_or_disabling_a_firewall_rule.rst | 4 +- .../firewall_configuration_examples.rst | 12 +- .../firewall/firewall_overview.rst | 8 +- .../firewall/index.rst | 0 .../firewall/modifying_a_firewall.rst | 13 +- .../firewall/modifying_a_firewall_rule.rst | 90 ++++---- .../firewall/viewing_a_firewall.rst | 8 +- .../{security => access_control}/index.rst | 4 +- .../adding_a_security_group_rule.rst | 79 +++++-- ...ving_an_instance_from_a_security_group.rst | 84 ++++++++ .../changing_the_security_group_of_an_ecs.rst | 4 +- .../cloning_a_security_group.rst | 22 +- .../creating_a_security_group.rst | 89 ++++---- .../default_security_group_and_its_rules.rst} | 14 +- .../deleting_a_security_group.rst | 10 +- .../deleting_a_security_group_rule.rst | 52 +++++ .../fast-adding_security_group_rules.rst | 123 +++++++++++ ...ing_and_exporting_security_group_rules.rst | 81 ++++--- .../security_group/index.rst | 40 ++-- .../modifying_a_security_group.rst | 37 ++++ .../modifying_a_security_group_rule.rst | 24 ++- .../replicating_a_security_group_rule.rst | 39 ++++ .../security_group_configuration_examples.rst | 201 ++++++++++++++++++ ...curity_groups_and_security_group_rules.rst | 122 +++++++++++ .../viewing_the_security_group_of_an_ecs.rst | 3 +- umn/source/change_history.rst | 84 +++++++- ...igning_an_eip_and_binding_it_to_an_ecs.rst | 2 - ..._eip_from_an_ecs_and_releasing_the_eip.rst | 4 +- .../how_do_i_buy_a_shared_bandwidth.rst | 15 -- umn/source/faq/bandwidth/index.rst | 2 - .../what_bandwidth_types_are_available.rst | 2 +- ...cs_with_an_eip_bound_from_the_internet.rst | 2 +- .../how_many_firewalls_can_i_create.rst | 8 - .../how_many_security_groups_can_i_create.rst | 10 - umn/source/faq/security/index.rst | 6 +- .../why_cant_i_delete_a_security_group.rst | 16 ++ ..._connected_by_a_vpc_peering_connection.rst | 2 +- ...an_subnets_communicate_with_each_other.rst | 3 +- .../what_subnet_cidr_blocks_are_available.rst | 4 +- ...ocks_are_available_for_the_vpc_service.rst | 24 ++- .../why_cant_i_delete_my_vpcs_and_subnets.rst | 4 +- .../index.rst | 160 +++++++------- .../step_1_create_a_vpc.rst | 160 +++++++------- .../step_2_create_a_subnet_for_the_vpc.rst | 62 +++--- ..._3_assign_an_eip_and_bind_it_to_an_ecs.rst | 2 - .../step_4_create_a_security_group.rst | 82 +++---- .../step_5_add_a_security_group_rule.rst | 73 +++++-- .../overview.rst | 46 ++-- .../step_1_create_a_vpc.rst | 160 +++++++------- .../step_2_create_a_subnet_for_the_vpc.rst | 62 +++--- .../step_3_create_a_security_group.rst | 82 +++---- .../step_4_add_a_security_group_rule.rst | 73 +++++-- .../typical_application_scenarios.rst | 1 - umn/source/index.rst | 2 +- .../monitoring/creating_an_alarm_rule.rst | 3 +- umn/source/monitoring/viewing_metrics.rst | 26 ++- ...ng_a_user_and_granting_vpc_permissions.rst | 28 +-- .../vpc_custom_policies.rst | 2 +- .../route_tables/adding_a_custom_route.rst | 6 +- ...ssociating_a_route_table_with_a_subnet.rst | 15 +- ...e_route_table_associated_with_a_subnet.rst | 4 +- .../configuring_an_snat_server.rst | 2 +- .../creating_a_custom_route_table.rst | 8 +- umn/source/route_tables/deleting_a_route.rst | 4 +- .../route_tables/deleting_a_route_table.rst | 12 +- .../exporting_route_table_information.rst | 4 +- umn/source/route_tables/index.rst | 4 +- umn/source/route_tables/modifying_a_route.rst | 11 +- .../route_tables/replicating_a_route.rst | 16 +- ...erview.rst => route_tables_and_routes.rst} | 41 ++-- .../viewing_route_table_information.rst | 4 +- ...e_route_table_associated_with_a_subnet.rst | 4 +- ...nd_removing_them_from_a_security_group.rst | 52 ----- .../deleting_a_security_group_rule.rst | 38 ---- .../fast-adding_security_group_rules.rst | 93 -------- .../modifying_a_security_group.rst | 43 ---- .../replicating_a_security_group_rule.rst | 33 --- .../security_group_configuration_examples.rst | 199 ----------------- .../security_group_overview.rst | 75 ------- .../basic_concepts/route_table.rst | 25 +-- .../basic_concepts/security_group.rst | 38 ++-- .../basic_concepts/shared_snat.rst | 12 +- .../basic_concepts/subnet.rst | 14 +- umn/source/service_overview/index.rst | 2 - .../notes_and_constraints.rst | 69 ------ umn/source/service_overview/permissions.rst | 160 +++++++------- .../adding_eips_to_a_shared_bandwidth.rst | 7 +- .../assigning_a_shared_bandwidth.rst | 4 +- .../deleting_a_shared_bandwidth.rst | 3 +- .../shared_bandwidth_overview.rst | 4 + .../assigning_a_virtual_ip_address.rst | 11 +- ...binding_a_virtual_ip_address_to_an_eip.rst | 10 +- ..._a_virtual_ip_address_to_an_eip_or_ecs.rst | 16 +- ...bling_ip_forwarding_on_the_standby_ecs.rst | 61 ++++++ ...eck_ha_load_balancing_cluster_scenario.rst | 11 +- umn/source/virtual_ip_address/index.rst | 2 + .../releasing_a_virtual_ip_address.rst | 8 +- ...nding_a_virtual_ip_address_from_an_eip.rst | 4 +- ..._a_virtual_ip_address_from_an_instance.rst | 4 +- .../virtual_ip_address_overview.rst | 25 +-- .../subnet/creating_a_subnet_for_the_vpc.rst | 62 +++--- .../subnet/deleting_a_subnet.rst | 4 +- .../subnet/exporting_subnet_list.rst | 4 +- .../subnet/managing_subnet_tags.rst | 22 +- .../subnet/modifying_a_subnet.rst | 8 +- ...ing_and_deleting_resources_in_a_subnet.rst | 16 +- .../viewing_ip_addresses_in_a_subnet.rst | 4 +- .../vpc_and_subnet/vpc/creating_a_vpc.rst | 160 +++++++------- .../vpc_and_subnet/vpc/deleting_a_vpc.rst | 4 +- .../vpc_and_subnet/vpc/exporting_vpc_list.rst | 10 +- .../vpc_and_subnet/vpc/managing_vpc_tags.rst | 64 +++--- .../vpc_and_subnet/vpc/modifying_a_vpc.rst | 94 ++++---- .../vpc_and_subnet/vpc/obtaining_a_vpc_id.rst | 8 +- .../vpc/viewing_a_vpc_topology.rst | 4 +- .../vpc_flow_log/creating_a_vpc_flow_log.rst | 4 +- .../vpc_flow_log/deleting_a_vpc_flow_log.rst | 4 +- .../enabling_or_disabling_vpc_flow_log.rst | 4 +- .../vpc_flow_log/viewing_a_vpc_flow_log.rst | 4 +- .../vpc_flow_log/vpc_flow_log_overview.rst | 4 +- ...nnection_with_a_vpc_in_another_account.rst | 80 +++---- ...ction_with_another_vpc_in_your_account.rst | 83 ++++---- .../deleting_a_vpc_peering_connection.rst | 3 +- ...onfigured_for_a_vpc_peering_connection.rst | 8 +- .../modifying_a_vpc_peering_connection.rst | 3 +- ...onfigured_for_a_vpc_peering_connection.rst | 8 +- ...project_id_of_a_vpc_peering_connection.rst | 2 +- ...onfigured_for_a_vpc_peering_connection.rst | 8 +- .../viewing_vpc_peering_connections.rst | 3 +- .../vpc_peering_connection_usage_examples.rst | 7 +- 239 files changed, 2521 insertions(+), 1874 deletions(-) delete mode 100644 umn/source/_static/images/en-us_image_0000001151300782.png delete mode 100644 umn/source/_static/images/en-us_image_0000001229959315.png delete mode 100644 umn/source/_static/images/en-us_image_0000001267230305.png delete mode 100644 umn/source/_static/images/en-us_image_0000001267350317.png rename umn/source/_static/images/{en-us_image_0000001500905066.png => en-us_image_0000001572300492.png} (100%) rename umn/source/_static/images/{en-us_image_0000001503011070.png => en-us_image_0000001626574358.png} (100%) rename umn/source/_static/images/{en-us_image_0000001503011074.png => en-us_image_0000001626574362.png} (100%) rename umn/source/_static/images/{en-us_image_0000001503159042.png => en-us_image_0000001626574366.png} (100%) rename umn/source/_static/images/{en-us_image_0000001503170970.png => en-us_image_0000001626574370.png} (100%) rename umn/source/_static/images/{en-us_image_0000001503170974.png => en-us_image_0000001626575750.png} (100%) rename umn/source/_static/images/{en-us_image_0000001503318922.png => en-us_image_0000001626576382.png} (100%) rename umn/source/_static/images/{en-us_image_0000001503330854.png => en-us_image_0000001626576858.png} (100%) rename umn/source/_static/images/{en-us_image_0000001503330858.png => en-us_image_0000001626578706.png} (100%) rename umn/source/_static/images/{en-us_image_0000001503478818.png => en-us_image_0000001626734158.png} (100%) rename umn/source/_static/images/{en-us_image_0000001503490746.png => en-us_image_0000001626734162.png} (100%) rename umn/source/_static/images/{en-us_image_0000001503490750.png => en-us_image_0000001626734166.png} (100%) rename umn/source/_static/images/{en-us_image_0000001553650753.png => en-us_image_0000001626734174.png} (100%) rename umn/source/_static/images/{en-us_image_0000001553650757.png => en-us_image_0000001626735566.png} (100%) rename umn/source/_static/images/{en-us_image_0000001553770733.png => en-us_image_0000001626735570.png} (100%) rename umn/source/_static/images/{en-us_image_0000001553770737.png => en-us_image_0000001626736198.png} (100%) rename umn/source/_static/images/{en-us_image_0000001553930581.png => en-us_image_0000001626736678.png} (100%) rename umn/source/_static/images/{en-us_image_0000001554010645.png => en-us_image_0000001626736794.png} (100%) rename umn/source/_static/images/{en-us_image_0000001554010649.png => en-us_image_0000001626738526.png} (100%) create mode 100644 umn/source/_static/images/en-us_image_0000001626894086.png create mode 100644 umn/source/_static/images/en-us_image_0000001626894090.png create mode 100644 umn/source/_static/images/en-us_image_0000001626894094.png create mode 100644 umn/source/_static/images/en-us_image_0000001626894098.png create mode 100644 umn/source/_static/images/en-us_image_0000001626894106.png create mode 100644 umn/source/_static/images/en-us_image_0000001626894110.png create mode 100644 umn/source/_static/images/en-us_image_0000001626895486.png create mode 100644 umn/source/_static/images/en-us_image_0000001626896590.png create mode 100644 umn/source/_static/images/en-us_image_0000001626897562.png create mode 100644 umn/source/_static/images/en-us_image_0000001627052380.png create mode 100644 umn/source/_static/images/en-us_image_0000001627054054.png create mode 100644 umn/source/_static/images/en-us_image_0000001627054058.png create mode 100644 umn/source/_static/images/en-us_image_0000001627054062.png create mode 100644 umn/source/_static/images/en-us_image_0000001627054082.png create mode 100644 umn/source/_static/images/en-us_image_0000001627055450.png create mode 100644 umn/source/_static/images/en-us_image_0000001627055454.png create mode 100644 umn/source/_static/images/en-us_image_0000001627056086.png create mode 100644 umn/source/_static/images/en-us_image_0000001627056574.png create mode 100644 umn/source/_static/images/en-us_image_0000001627056686.png create mode 100644 umn/source/_static/images/en-us_image_0000001627174280.png create mode 100644 umn/source/_static/images/en-us_image_0000001627334080.png create mode 100644 umn/source/_static/images/en-us_image_0000001627493158.png create mode 100644 umn/source/_static/images/en-us_image_0000001627653972.png create mode 100644 umn/source/_static/images/en-us_image_0000001627744152.png create mode 100644 umn/source/_static/images/en-us_image_0000001650535960.png create mode 100644 umn/source/_static/images/en-us_image_0000001675254013.png create mode 100644 umn/source/_static/images/en-us_image_0000001675254017.png create mode 100644 umn/source/_static/images/en-us_image_0000001675254021.png create mode 100644 umn/source/_static/images/en-us_image_0000001675254033.png create mode 100644 umn/source/_static/images/en-us_image_0000001675255405.png create mode 100644 umn/source/_static/images/en-us_image_0000001675256029.png create mode 100644 umn/source/_static/images/en-us_image_0000001675256529.png create mode 100644 umn/source/_static/images/en-us_image_0000001675256657.png create mode 100644 umn/source/_static/images/en-us_image_0000001675258381.png create mode 100644 umn/source/_static/images/en-us_image_0000001675258889.png create mode 100644 umn/source/_static/images/en-us_image_0000001675373901.png create mode 100644 umn/source/_static/images/en-us_image_0000001675373905.png create mode 100644 umn/source/_static/images/en-us_image_0000001675373909.png create mode 100644 umn/source/_static/images/en-us_image_0000001675373913.png create mode 100644 umn/source/_static/images/en-us_image_0000001675373917.png create mode 100644 umn/source/_static/images/en-us_image_0000001675375297.png create mode 100644 umn/source/_static/images/en-us_image_0000001675375405.png create mode 100644 umn/source/_static/images/en-us_image_0000001675378241.png create mode 100644 umn/source/_static/images/en-us_image_0000001675413821.png create mode 100644 umn/source/_static/images/en-us_image_0000001675413825.png create mode 100644 umn/source/_static/images/en-us_image_0000001675413829.png create mode 100644 umn/source/_static/images/en-us_image_0000001675413833.png create mode 100644 umn/source/_static/images/en-us_image_0000001675413841.png create mode 100644 umn/source/_static/images/en-us_image_0000001675413845.png create mode 100644 umn/source/_static/images/en-us_image_0000001675415213.png create mode 100644 umn/source/_static/images/en-us_image_0000001675415841.png create mode 100644 umn/source/_static/images/en-us_image_0000001675416345.png create mode 100644 umn/source/_static/images/en-us_image_0000001675418673.png create mode 100644 umn/source/_static/images/en-us_image_0000001675613937.png create mode 100644 umn/source/_static/images/en-us_image_0000001675613941.png create mode 100644 umn/source/_static/images/en-us_image_0000001675613945.png create mode 100644 umn/source/_static/images/en-us_image_0000001675613953.png create mode 100644 umn/source/_static/images/en-us_image_0000001675613957.png create mode 100644 umn/source/_static/images/en-us_image_0000001675615337.png create mode 100644 umn/source/_static/images/en-us_image_0000001675616433.png create mode 100644 umn/source/_static/images/en-us_image_0000001675616561.png create mode 100644 umn/source/_static/images/en-us_image_0000001675618277.png create mode 100644 umn/source/_static/images/en-us_image_0000001675619157.png create mode 100644 umn/source/_static/images/en-us_image_0000001675813933.png create mode 100644 umn/source/_static/images/en-us_image_0000001676063997.png create mode 100644 umn/source/_static/images/en-us_image_0000001678437642.png create mode 100644 umn/source/_static/images/en-us_image_0000001681512581.png create mode 100644 umn/source/_static/images/en-us_image_0000001699135873.png delete mode 100644 umn/source/_static/images/en-us_image_0122999741.png delete mode 100644 umn/source/_static/images/en-us_image_0148244691.png create mode 100644 umn/source/_static/images/en-us_image_0162733894.png delete mode 100644 umn/source/_static/images/en-us_image_0239476777.png rename umn/source/{security => access_control}/differences_between_security_groups_and_firewalls.rst (96%) rename umn/source/{security => access_control}/firewall/adding_a_firewall_rule.rst (60%) rename umn/source/{security => access_control}/firewall/associating_subnets_with_a_firewall.rst (71%) rename umn/source/{security => access_control}/firewall/changing_the_sequence_of_a_firewall_rule.rst (91%) rename umn/source/{security => access_control}/firewall/creating_a_firewall.rst (94%) rename umn/source/{security => access_control}/firewall/deleting_a_firewall.rst (76%) rename umn/source/{security => access_control}/firewall/deleting_a_firewall_rule.rst (89%) rename umn/source/{security => access_control}/firewall/disassociating_a_subnet_from_a_firewall.rst (90%) rename umn/source/{security => access_control}/firewall/enabling_or_disabling_a_firewall.rst (69%) rename umn/source/{security => access_control}/firewall/enabling_or_disabling_a_firewall_rule.rst (90%) rename umn/source/{security => access_control}/firewall/firewall_configuration_examples.rst (93%) rename umn/source/{security => access_control}/firewall/firewall_overview.rst (91%) rename umn/source/{security => access_control}/firewall/index.rst (100%) rename umn/source/{security => access_control}/firewall/modifying_a_firewall.rst (82%) rename umn/source/{security => access_control}/firewall/modifying_a_firewall_rule.rst (60%) rename umn/source/{security => access_control}/firewall/viewing_a_firewall.rst (87%) rename umn/source/{security => access_control}/index.rst (92%) rename umn/source/{security => access_control}/security_group/adding_a_security_group_rule.rst (66%) create mode 100644 umn/source/access_control/security_group/adding_an_instance_to_or_removing_an_instance_from_a_security_group.rst rename umn/source/{security => access_control}/security_group/changing_the_security_group_of_an_ecs.rst (91%) rename umn/source/{security => access_control}/security_group/cloning_a_security_group.rst (53%) rename umn/source/{security => access_control}/security_group/creating_a_security_group.rst (54%) rename umn/source/{security/security_group/default_security_groups_and_security_group_rules.rst => access_control/security_group/default_security_group_and_its_rules.rst} (67%) rename umn/source/{security => access_control}/security_group/deleting_a_security_group.rst (73%) create mode 100644 umn/source/access_control/security_group/deleting_a_security_group_rule.rst create mode 100644 umn/source/access_control/security_group/fast-adding_security_group_rules.rst rename umn/source/{security => access_control}/security_group/importing_and_exporting_security_group_rules.rst (64%) rename umn/source/{security => access_control}/security_group/index.rst (78%) create mode 100644 umn/source/access_control/security_group/modifying_a_security_group.rst rename umn/source/{security => access_control}/security_group/modifying_a_security_group_rule.rst (54%) create mode 100644 umn/source/access_control/security_group/replicating_a_security_group_rule.rst create mode 100644 umn/source/access_control/security_group/security_group_configuration_examples.rst create mode 100644 umn/source/access_control/security_group/security_groups_and_security_group_rules.rst rename umn/source/{security => access_control}/security_group/viewing_the_security_group_of_an_ecs.rst (80%) delete mode 100644 umn/source/faq/bandwidth/how_do_i_buy_a_shared_bandwidth.rst delete mode 100644 umn/source/faq/security/how_many_firewalls_can_i_create.rst delete mode 100644 umn/source/faq/security/how_many_security_groups_can_i_create.rst create mode 100644 umn/source/faq/security/why_cant_i_delete_a_security_group.rst rename umn/source/route_tables/{route_table_overview.rst => route_tables_and_routes.rst} (80%) delete mode 100644 umn/source/security/security_group/adding_instances_to_and_removing_them_from_a_security_group.rst delete mode 100644 umn/source/security/security_group/deleting_a_security_group_rule.rst delete mode 100644 umn/source/security/security_group/fast-adding_security_group_rules.rst delete mode 100644 umn/source/security/security_group/modifying_a_security_group.rst delete mode 100644 umn/source/security/security_group/replicating_a_security_group_rule.rst delete mode 100644 umn/source/security/security_group/security_group_configuration_examples.rst delete mode 100644 umn/source/security/security_group/security_group_overview.rst delete mode 100644 umn/source/service_overview/notes_and_constraints.rst create mode 100644 umn/source/virtual_ip_address/disabling_ip_forwarding_on_the_standby_ecs.rst diff --git a/umn/source/_static/images/en-us_image_0000001151300782.png b/umn/source/_static/images/en-us_image_0000001151300782.png deleted file mode 100644 index eb1ae9b407d67278bf665b2e7c981a42794b7101..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 7846 zcmc(Ec{r5+_xG)Z2(6YR<5N@!l`Xr97(&RtmTeeI_I2>7kR@BB$d)Ze_H}HPP}VSJ zG-9%48Dk&IFg)-1e6MHu?>Ce&rY=c$U3NZM;;6HemLB`wR%ES+hKd4=Q#^=tJo|5+hFmYYJ4*`&UviJ9Ut}39Bt0EJec9sE z^ViPr_cRV!-8{qAlkhZPUt{*otNV98*=6ndx8fed`((W~Gkb5Ye;+4S4Hf3(ux1OiHW$ zi3{56i~Kd`m6kSdb;o$PD5Nm9OcprIV}I3OKA?S5@8A?tUR|H2NZgm9`p zxKf#G(7INgC3wfQze^KG!62ygc`k#17moG9wGef6B5`z5cO6;<+ou9EKH5LW9a0&} zf1Z|>4eY$BxQbm*;t5@AofxgFYv@@a)XErwYb90Ngw%f2?N_Y&idh;vAP`IQqY=v$ z^Qir%*;WE2?OFTsRj>kF-*C7{#BEpnU`PEW3|~L&*527E9&n;)CP@c5h4+q{(Lc}` zSRxVz&qCR=^PH{69jsUX=G3~H_+TLM(BIjcWRXNHw-V>UM#$*SGVyIubbLIzcp-V8 zJl{Fv+gSR+>Y``X-piwex-wPZZ>zGxyW?#$E41zx()~<_Zi@!nRIu}jRb3D#v=|67 zu{%vst%YTslJh#kZYj^65@}LX0Ol2MZ~Mno#F|jhK3zl;ez@7rul|p_3{ar7`eBWM z%?v%#HG!hvGDsiVbQDYY7pijjr~rJbGau2`T9$+-Me%5+c{N&6XS(du)_UQAlSQ+x zW$^`2qL=j|it%e9p^D}8m2953k^mHPcm4T#q(OE1+wCFd}- z+E{T^R)Os~?V+F9Ov?v}QW6uC!0PQpCIL9`Qc-0wVbh)dv1C^#Yg79rEcHFUu4(YG z!&FpZW}QPtW{?B(#9=7#tr$!tjYszJ8!|~t^sfzp#K2?`(NfnXaF+YJQ)WTc?cPq* z5B{=<%j|mg!$KLdXAl%Vyl&=)FT@#Z&w!$4iX;@4ncK~oBe#0SqY0mjZn>eMzcKls zsKO!V(q`9-UkAnRtj-mZ1Kt)Fs}y$59~awQCE_|{^pEUzlI1UmQk&csYk1Obsj2~2 z#JewfmH>3GV}@D3RZLxRwXWL|irZWZRK)C4CE)|gE0?5>(@z|S&C~`NRQ=iHfR#JL z?!|InPDNABy=+%*CUV}n@A`XKGFA$$_GK3LO?|f;AY*Nd}ZSRedqSTry zr@V+9#oaK0D=!DTW<$pR(Bz6wdVk(q^c9tA7!#u{XZ>;WxL;E8Us?@ub%xv2r$LNm33w^a^^Un9ueS^zW2<*b92o~Hn) z12czTU`=|q|C~R_0d6j_J^sgWRC>d?yS@T%mhKN9T%EeY!Ctq|5CRgf_GN3D@OCdj z-13;5q{oZ#;3;J>QsVe@o?hU}J`AoOiM@Yz&w(uHc)rOho+UJuIO&wzV=7TSpQ2#y z57*(z2MB)b>d9GQ6S67TN&0iX&}py!ERypG^kbdkgg_vkV9tPY<~PqN!4F;?{{jW+ zzoxGLS89g;%(b6t5o%r2GlSRQ;cbsbSDTs?W@cv8P%nwgc+}Qdq0M!~`xq$9EdqKf zGP$)&SwNS`jj=&0GHTF#!P?qdwd<%fiR3z3D}ba4-xZ&`DU#l&9!c0#Tbm-=uU6C403JyJI_tK7e3dxSr_IDvv5z39;g3s zltOmpf_?;TNR8P5y|KCYGk0OZ8K@?>{?)VkrlxQ8_4TJc8wB98va*_5T2+0sGc!eb zd8$rMPQpS$0|naY8{1Ry-Lvbavw}hr5r>g(&A!a_@HAJs$hEB?&u)~ zHXg}uJdyK5g~+X?vEt%leQoWRjO@H0zJ67O>$|zRVT15kEaJ;^W}uf+x@QJ2`2EVk zTZdZe+uo7|*1G}g%&)Q@ITRfeGqf>3Bq+5nAH4FJDT(K>UJ&6Zw87WmsB-%B>9a6c z+2Ei)$;8K}#@X39IW3KcBIQ69H9o8dh_PZ5@^b|5gZY0B@&U*d}q#_ zk$U{~*f175_ao;nhPr^BS@joy^Tn%MmDRN)b>7_?m^8V?i+iQ3R0Mx@86W@-;AV~` zUBvJ2Z?)o^0@h2ix%CVTatQ>&hcYBN1W4-cZPpi~WFt+@=&r6V@AY08KqKht>WAOI ze_z`P);p|vo%>-xK*QkBkU5)(QkJe(s+bf-ns?T-K{8;?4vo85xpz@2&Y1sXLg$no z|H<+W@9mWdVKFf`k1XI^B;onv}Ee)hj~_i;|h{ROI4F1s(MkVyVGO zS)8I~c_k&+;DbGHB`DLcbZhI&fS=slNo^Y)DKG3xm@YpN#M`W{ot8Df1G#L zW&(fz%_JGT{RHmp*9c;it9$qE-DhXmWJGQ5-@jiSefb&4W&eqzz)xyy{E1J8l9SJx ze|Eagjg4SCU;Sj_i`9kuz+KgW6lX=+#!z!0F9cbp+wO+t6&4~7_GviD&>&!#y`3Eb zUuucl=gfJaabDUb0Z*E_%LVx7Q=%X@TvJn1A7n|BRT)667^x=lZ6b$=kxA!e?X*0Q z;@${Ys#EppH{2pegY<@=sd;+KT_rhb^oN z<-9j6RcJqu9?|SD(qtCE&uaZ@}c_*6S>Us zooy}&hyQQgtjdXM(BbXSLJAuhs-r@!h*6mLI~P`Q5kQDo1@ti5xXwSh?*02a-LFN5D($W z`K1SdqW(V2^ls_3E%%AW(p!9gtEhl7sHv;FTpo1K8BVVuz*QoOik9gz?zNU@*duE^ zrtW3PdKI)0)cWs1e|L3v*Z3`4y*wvz549U|L&yk(_&Ar?)f+eTlIZz=^x17-wCu3q z)WX67w$9y}jZeYk#*G_13jXCfSxO(N)WE{VKgT-SN=4$-L6wNahk(owk&(eu1G|!i z)^=&2a^WiK#sjs02Y+PWekND#x?vF~`Z+l{89}2`aQ~2!gF``Hhf|Ywy7YWbBwvz1 z^U9aw#YIIG%}Q6U&@YRlAaNynSI<^jN;nM)h?dCwZQ~U$$9Lu?C7mV{ zYP1>}8d94h2-VAD_JyDG@&p701&c5kGg#)@l0f03nwu)m7UbA$g zkUxdQ#B@62E*JoSm6=B;amW9`O!{xrLV7b58x2Np0n&>&0TWB@7A#ub9bX!2^Z@}` z_?CDngW&6BUhARC#IKH3JoW&QpA#*ZF7!hRYw&ye@)s}-1fP9fpZ zx>-tQ^-ppxk?}a3+@KrsAMBS_R_X)B0jp==?g6=C6-1U2HLvYq;Rh6q*%}YxfWe4P z|vq6HgffbNqM6LTyZ zeQVxOUaa^l(D@7GMk6&PGqY5M|HotqSX0Ef^r4PU93Wp8xI8zj^YUc$Ndhv%34*-V)a<@Yr z#9<@7?Rvk@&<*8?$m@Vz&tS<%C{JaH0T2Q_IISv2f!Z{fuO%qOsb{GPB+On&D7sbU zDmSZ@(O<8L%f?`@F@mXJqy!&a7)JX{e>>$$sD=YMz|71{D1Y>RnnPC}F|u-Jd(HM00e9a^wFcJ3)^KP88@xe!BQ=|AYmER3 zD&~FuVJi_)QF8T-)m@qy#=8h;GZ)?Zrro8+K+3T3$18RMLNYSOAPyOW@rYk;b(~@r zAGoZ8_4IA|Cr(Y5_9w#J$K2|gtlT5VC3xA9?a>^ywxB@AVfIdwsX#>8J35Y*GKb$` zIdTY;@B}a_s=-^KL0vAcuExs2-Y&S9wO)jWZnwc)IvaD}yy2#hM~w{)4K+11eymP) z0zng~O^d{Ge-X2&&mJn&6}f!*UZHMQEem_lC3?QTq$gHkuzLzmYgzO5WQ^z+aI*Bp zqs7{=HYr!2i-3x$+>Zkrg--9-9Nbh(1MD*KWQ2-w(pCpxWjTIa3i#H@n%Kmc2Q*^8 z!g?%U(BchJ8X$#Hm-|Bp4e52nCilbx#%G`13}Oiu_wUCR=wuZ8jR&Z!$Me-}GR$k! z-F@Dz{&vvTlA(u31*ngb9+RqtjWgW;dyAsac;&n`^7Hd?Oifs-6~B(B=ec94{r(VK zL*oIct3Zyp!sP%2+alP=R(0r-l4Lx|(8a|ihMtjtfVOBy8eCX=F}-6Uq#R97s4VUKvxNu;n7cSm8`9K!e1Kx z25D41oOeH6S{tZW-0qREzE3#PTpX|I(6plC=X$h!kaQgI{={hpR^sec^OYHe(dsu>#F)>qp8{fynb%3fg+RGdr& zdc^_M+)(mGx0R^dtSS*372wj&4vm=v1O!C7H?zO_y(eY>g^9e*%3{=H%{vHm_i#&5dhW&#lY%e zV))Q-`@hu3g<5;5sYl>!AV4S-3U!xwFuvf{*R1X0QgSbzZwwilA7=0`N$}d{zf(f- z{#&XIj|WqE%YkrPhKx*Vl33;kAB;%GACa~xNxS943-UKxdPxf;lF!DRUWRh$_=A2- zE5IW7_IUu1)G5G28aO} zEP81f#2VCP9vQcHLzWDfYp-p>t_I%SP9SV4kw_$FSZYz|!G3XBnIGo7O6tA;i2nRk zzMWbn`TkJ~#c`!H9M=%CmFKiw*e|?4Q^MI9k?F5rA!A8aO_lHc{EW$`TeQw3)OT@Y zLIY-0Vv_UZmP?aswv6qSho7=PH*yO9p(e_C0gdS974_I1WA;pXEdTkSx?u)2h7-Tl zctv|ve5{Cy>hzYgeRf!JNrCAEAGX*Ky|LCUj-39M2%2Sj&miFRr{^vE7Q2e0E#r~v zc|=7gDq%Z^>Ou)!`1R*Bd~jzBcD3HFu|>{5Y%;T9*cY{^ZQQ-SSHgEr>B~gDtYHbJ*KaNfNs#}I8auNz8z#i0W_#6r*qk^r0GN=&P&eMm;bINSnP>vlM& zxK&9VF~oeTGaireA({9x@Tx)#yuKk@Ow=aa{_T1|9 z;w=bE373)UqdUxJE`OWxbi#hnT$FtIt9ec{G@^jLK0ybjxVO}TpCQ!EZwTw7Z^eDZV=^Uvm>Iv*FHdT~V1 zq?&tu1y@Ia^v%W}h?Cil{Mv|T4?V+)kFlDP4 zE^%CZ=$;~lXGli@!Btwiyx ze#Z|oieL;74u%~WON>A4D~=rgkKS%P*=~HANp9@uCBnLr?c>MZn~SE0o9AWwG8NH) z^gsjW?c}1$sJa^8nmJgsyl2K%xbSXCvv8*?fq`eQFl!EpXLnl1tk3q7<_2;BiOFEA zmc)Vf0iCN6C<^}&-oNg33UbqLvi)1U{NLPrAHZzo>|7L&w|0SXE(BN8Q7ye=^YniJ DhE2W$ diff --git a/umn/source/_static/images/en-us_image_0000001229959315.png b/umn/source/_static/images/en-us_image_0000001229959315.png deleted file mode 100644 index 4c0b0da4799d8df17d1f54bbe4681fb68b822d9e..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 35050 zcmb5WWmH|w)+Kx(2_!)ioFGAh2X_zd?(XjHkf6aexCM6$?!nzcaCZ;x&_(Wj?%UmO zkFUS}!C;KdIeXWxTD8_(bI#(cjFd3KYwXt$2n0b?L_iJ#f&L7EKsmpJ0as>iq6omR zS2iN5_7DhS$I}l~k9EEQ1o9ptD)33cC1roX(E(NYUE9jiemCw{f){*W+-+X|FbQ+B z4X%RvA|9enj@bU{Esk38$=Iq~3ZKvSF0Rin{fIlAw{D4a#l?JxMc&_XZ`mLw*4rO( zR3#@nANIZ=@I&T%scRP-uc}&KUl<~k8327mMu8a27y9}QMT%WhN8$oe+>8u%E2 zUvCnIG_;~(0b@j&>^9UdFQGn6MZ;#Hj`{bgc31v$XiuL(R=wa8)rn&(4Akn-%NW)V z>G{+!gLAt*aRepFf*3e65tTh4tg8GcLQZOjDo&v(S0zVo)QAL=~@vaeW=eoL_=&Gl{B z$?4>{+B3?}C;5K58JiV{{W-;*f4@RdNire2JY}wMu;HEp>4!L@`bT_m=&u<3B}*sc zsPuN`S**;mgohPHs%asy5i|O~pOZ9bWyAIbF`L-ujoPzn`eX<+&QXS6f#@&Njc6Ow z5O?@K3*5giPPj+U^j5_x(aaou;6vMsIHU+i#hNCOHMFflZHm`>KA7SRuW|RY=iQ@j zo@SjupxeNNxcm%z^82bsb*U>A9E4@ry7`+r&Fs~2X}{Ytp-z0{V2YT%0{#(X@=kE? zU(-8sF&M>r1gZ9G=am-BM9_(simJ*lo-|jzb;j6`P=d~9R6YphYtyd~ATOsC9rzKG z8iygp=>PP<&X{pYXnC63@E2~8^lB!M@QgpC6lf6R_o(?WtT|TSNC>D{lpX1OoiMMK zz`WHPzgWS|K!2fDNP!=9!u<&WxrncIt);&yzB2Fc3;*2yN<7NJ`?0Xl0=mgZMbWS{ z@$-&w10@R-#gKe5WFg|3;wY<7tP3Ir&BQ44EWebGd>Mx#itN|(RfT+yd1bcbD4)VX zB{&lE?Hn?P7ZyGrdJadUqJmdG98~>{w>}2IvPj-! zC&(ixD$1aqv!;C5So;2p9p|$d#hK(nr&yK@d-b4w4oUJo2#@+gvG=2;(eFfiG6vud z3jW@emOlLXZ3N6nG2cu1| z=WmY`zA#FQLQ@XQ@0p;!#+e|`(h~C{Li1In{|LqZ{Y9#lSnA(LlSn<&k-0+TmBqY_ zPk(znUxNC@XZKN4LpN>rMJ&>ZVt4c4`^OV`LR5d-*A8BZ=dYihmp~!8GgF8=iYx++ zZe&2j^z}WOSPu7dXx>RxGrTadNwB3Wxjmo$ZjHy95+`8G5ELvVqK}FkXQPLGNCM6hN9do>fb@C=0Pn&$;jne z4}`u)Yk`!*uchj1#--A5)IG|re2=ELO#QngE>K{;RTK*HV>NQz^iQK5tMIfK3IYBlqK+*O$e5I6Lsm;7>1fCU&DSAjXW`#@$0y5;~#6UJ4t<&)21f==1u{rvu(MGO&jBl z(%0_rYT{1X1DpA2x(8$bsyN>M9YSq746m&GA`>sLg&O3FULeRpdy62C^riX54~qDOv8Q42t;1tOPz4XPeZ!QD z$fX}jxnhQ7bAm$y@sj1VL?^1n#0bg$CZNj0u|2&(ypJv;z8pLz8IMYstw^OpeCgOa zrG04->A;`0bIVfj9vbjTee&&mK@K>qErvv9GgT zBe}mhgVyO8)(pjE`FwM}XgD4DX?kYH_WlOJ>0mLe-ZhC@{w2YpSvQ_!-bC2TmoGE4 z-u&r(k>!-f8A`V)joFIP-}vd1aIZcB_Qu8w9T|D*+kl?jAI>z?hV{*Y{U3C&piucZ zLzIegKHa-nELFrDYC4)!tF1NY_k`O%E_z}!nf$SK4f{4YP1)$BKy3o6a@2@?Lu=S6_4rnsC~MLu25r4s z)b-7erlrlkpz@2<4}w&VyE)#2lVcE32xk}gXdnZFp{7+_^(U0z;pORO>`R~m$) z6d#y+Q-jQBPz1lQtY;3zq&;zF!}l@@4UDn(d)tT3t}b0m%b|y7u(FDA?2cx6&#u?HmTPRqhz_&TEkA{9|uCFXJ^L0yUMFon?d=6g(1kwj+Jpa0rY|x z{rok7ou5X%oouz3VU5+C)VZ1B^Gn^h*k@NNTSz~v%cvKOD zf+|%`xW}(v*@>#Wj9SBTZxxPt1xL_1w|n0m_LAKxC9Kt&(0Y+GmPVO*!S46(-|Iuk zERxVKM>D**qN8I}D-CA$UMjyNsEiAJdU&WBlevz$dB;gy(bY{6jZExd^GKmgrt_%d zVP}dflwW}VvDcc=`fzG;P>{_9K5J)Qx`%`;QiL*UGkA5p0)~LlSYogw`U%O&@<$8K z*XQ2vTw7&3s3ymXca%}dHG-<&c^U239dmkMil=eblPlLyp`)KHQV<9X>vBpeDLN9< z65jH?`I}72lBDwVAMUP$H!EI5L;h7CUJjjx{7oVt9Y*s$Ws{dE#82}MF1~U-Q{xqd z{);6fB8fl$y$Okk)*B)}7hMkL1EblqL{zuD_fD~!k#&{UiT7=SRoQ&2N zOzF(m({&GC2E?b(=r(^wbyrtc$u>6xm6wKN$u(~Z4i+Lp4R(L*?9Vht6vU7$A83*f zx%n1W8Xd4RTiy9KW@du9jgR2=NdNs&e)DCECr5&+{ifYr=Mo4P!y~aP$J4IKNv4I1 zQtj6EUpow}&WHFQ#a!Q2NryT%i?}K(UKgs0cZcCh($SP{;febcO_f&Y=)NbFPUTa~ zH2AuDw!Ij}=fCJ`#>w~c7(WYD5DRQNz96a)X%U_2AX$m?bg9KA*EAJx7RK0?`_`_3 zfshSx^syXy*v&zN<*7$Y#&1~6dZ@wBC_NE|5A!qY16x9mpM75<@G^@XRq0{{bP!7(WKnqz+QdN+vV<| z@ozc;vKt>(yTtEmj-3M#a3w%`x3RU&HH+*2VHL;z8WTstM&u>#Tx}Nb=eu=#=RCs@ zBd`VI^0&81cjp=`Iq2x<;J2q>ot;_Ce&-Jd;x~;*n@{D;c^UN|fkfqp)y zEpoitwLLiz@#V#9nK~JQ7Sn}bLVvhCb*+~KX@VeD1-_97e<>?va6MUgX4AV+@|BDI1>qGwe=>EF zdx3s7Ypr6ck8JiA#kMooa2U4s_Fap^hhI;6r0*nm0xv9dc_DaR}C-e^|5eYjAk(Q-mJQJOlGo zTvD>LP(&(!pJ%_huZn|%Gu`OSlO+rC>>oJ24`)I?DZWBNG9H|^%`X(=v-q*~`PF){%_N4w=c=chBrM>he)ACB{?JAHuu@~9~kb%x4;Ia zG8&;F1ns7LqmrarwZ(8k#TqRp{PgVX$#q^jM913tQQ$gfKCx|! zn3V=UWM~7BtdD~o52rtewcZa(7kxY33#e8o(?WoN$}%3S-stsg@3*y1fA%pe2ZwPz zm$EVj9;ZvBQDTU=m?zyB-Tr)aa`XprnM@Bh2qQKEF2@fd=QPf{^Qke?U3*(65>8IS zp-K*CIcnR+#zw;e50PG6zQg$(xtw6EB^nG2AJWUAnZ#`eJd-zkL3vSF`~Xpe#pQe$ z9v(Jf#AbeYfb9x##S*T9cxhC9i=$L#u-r8Wc5~s(%H1m3*ZdkoDh<$yzJ}AmtRt#m zJ6AeKK80h_qFj8~aF$U>rX-(&xz84khf2?<= zVKP_f8Khdn&`(KCb=^w+vd?2fJ9J_`RT{(N{Qy5jsLtyi zW~x-16u`-vqiIp3*28Z4ka%kS<7mUPy}5UA_V!lub$wuO*SqeaM@I8XCecs2@GPAI z1b}E|Wfgk!09&frI_w{Uk;vi=Rc$^=3<8hQL?(h#xvT=j9o4oxY1*8&5e4`a>SQJR*&PQIm zSHFhOj`ycqaErXvIshgD`CY%Oa8jeeBasB(J7EW``%f3_Bz8tJhJcp@T1naK2E+HK zNZ?WYWmEE%2BLR)65kaHqIvuIQN_Pe!|H7Ri88GjN+w0xn|kOy-(z8Q+J7!8DypKQ z!dWXBCe*S1buEF;9C6{!Epv?Q*YROG&{=1o8PWVSEgV4@iFRTCG~T-T%BrL1A;cW7X11b5Sn5nm@Tb zTv!8GPN78Y!$i;NLW84-h=|U0aGXREeH_3=I{OK-((^r_ZNMU!=mv=0{A|zqajkdk zeG5JpeIx%Hz67#Vsh+#*Q?z;F$??J96a!v{*c$u1<4>3J+J1-_sU!K`Ck# zUC!$B13;pQ-BPVq;<7-Gz|UpjX|n*t@$ur1~Eaxc^cRM(@6V53I2_gg#LY_-mEETv47rC%VoCitXQQcc5kY*Ik?cjckDG9 zwZxwFtdTP&+v13LuKn$7*FGYDP_5R(Pc4tdQe~$=g38{6=erIKZ=j%{XmZBEH|Y%O zBzOr0jKXj~)^4^S)|P2@TCW%X{n}!2l-CUI7Z)fyHUI{x38ecgbWjcynjDTu+EM`r|q#s>pP8b>|zMBUZaYT6;@hMwNWA)-?VZiC0&* zAzUWiJ=y%;(&JW7-#k9&hB}=mOuw{g-O+YH<{H=AVtM3atM2IDS2r8{ym?nBlPS;l zcwJ&#vJbz{DRFq3B3>(|??)is*T>DC^Yq&6d*gGpbyp9J?Zs3$_X@sSYQYNU$O5JG z>Y%49<^Gn8?DfS(IOE>3@Mk_etWqL!@+kRFf%yu}!{T9*LCSpz&vOwGlGagvepF-3 zay#Gk3kaY$8AWbtrqnexP26!KBqEw=aupAV;Vn@b_*D=CmB8VQXV@Rx-P1!labTpV zqw{`oG4AUAQnIWV0KK9y0K*~F8g*^^Gxl_t@Cv2-_rENqQdmFvzuqvNEZl&r^*)^E z@$>ToX@1eoHFW`#UYEMCu+nS=zQ$UkhjeJxu%Pr=W6iSW+5$YO{5j9vmm7SqPtyxJ zMh~FxuSH8oiV)`W3v#n%0 zmseB_8KhiJ*Y6mMLU*ZmtqVirZ|(1gDiwWTW=0nm7r!`M=)w24-~);HM?UPqTy4kC zpU|np@v2oudRA7$Ao;5NFnNxywRB1~>VvdIfhx6h3-8EciclUTEKZjU6b*hni zvsQYh6D<6;w2R9Xr6e@IahcdQug)r zX*4>e67a*&dEUT(|Nb51SlR0T|sNS`Gv3HueE7BU4f& z?Bw3!doKixqZLB_EI)8T=Y|rl|8{(h_Hmd+^EPubw}gS{;D+(4_sScoEc&k6*%&=S z$;X^A09VP!<)UZ+G`YU!_vx!?(dCk@fqRjMyKCW}Vk+)4w5moU)??USvNA zYs(e5;d*IRM>3Fxe=meF`(-K6L86U<=N4EWBeblUg*Zi{{hnkODxKMSq$SlG8T{dU zm)NOcGBu4OzW-I(uPNy8SYq0^b{(C)-eE|HYV)K*I^Lo}^-{o7+i71h-rXl>|P z?@lNslfCYLvA5jpQiApV*&9V}T#(FS-TwP`0D#L+@VqG|_AmYt$;=;yYUXMzN9-EQk^%!^+uI2sR3PDX zhrN@{dLYNKC{6tABRH<8!&_jsXiBxK*>U zy)EJkbN;mELrF}YIkz7=_w0BGLp!{!vP^FeA;qff@p?G}S$iyB${X7yu*TwbW43r4 zZ=($=9TA@yc6iLNA-7IUzEh0d~g z36SRDP*=6CG@l|eQ2U48{mHe(jVqcaY(U= zgL=T_JSU$gRbf1$H8?m3a3BFE=g+!Qktjk)EQMlpLIS3q-uR-yJ>kK_RKBb}XjI&- z>igrG!$jw*w$J;zS*6msCH3?O)oZQzK~f*5zrU)nm;qg7d__4eDIML{pr9c551;wg ziQlX^W3l9Ow6m0rRZQt{if4x&rgJ}F49TPL8BckjQtkJ3+2_$~9F^?FyJDgYo%j?$ zI(xW@owefOE#Ki|41fe51nL0;gZ-g@Aodhn<3M1uwuRIfm{+XZPkHR^BGcJ z1b*(wAJQXj?n-M?^~YLfe!5%FORn(x6HM>ld*=q6_u?zxTHk|=HF&2>8^&WURUx;L zMrMC=rL9mlhb$;tUS8hWD1|LktmoKc2yNu6Z&H&dzZ!~zheID?uI`N>v-^G2SZ?8YYwo0|i z01;y(Et@YcHjrAumq79{gNcD(7ByDlOuimO^=+*_J?;elJ0(5yBi;$81={WNvx6(a zhK;knzJx?|gZhPc$~4Clt25g-IiXY!%Anfj%Qb4{uEE;S{6TDFz6a4P9SXyJfC<`2 zdYvCUd0!AK+{WNrEEc-1$_I(un(=(O50)ZBy-3VREC@Lm$x6p%H1!m zqGMv9g1)*YWU2tJth}7IXLvaL>dIv}ohRL@-WL{0HeZIIxVU)Kgpv5ehZdQ}vgpD> z95%bygE{9vT^Q-l$Zf6WY8F&BS2{@7Lc_xe01*dR>BIT@j)lg@a7NApdl5Et@=Gi= zHMO^BXy=7a;z3h~r{7Xpy*Hodh2z3xxFo*DxwEH)ARP+ZobG-IMyK&@&O*5)`souJ zNXcilKzkvH{!K|hSP(k0H4--Jk|;DQ(9M(n)$s`aJ**2RuAml%Gi3PAlX!vt>(^J$ zap(EJR+3x4kdeDB46Sj$zQg)Wl^AB-`ewa`v%2ShR}l0e7)y0adAq$?^zEAj{{2Ue-?4cN%#8tQdsSL*{BwD>rGAb%6GL1S~Q21Xg$4DnFAMvDqc>yPrE%N3q ziaa|aXuszd7Iv1r-ygN8$0KpOq(?>~-(2DcrKWxa?d8?Aqqh}KX=!OJne3O(&sqW9 z7zX{~HTK9^a}y^h0@T=HUvhHL*fskRI@8k9iZvUC>lc()z>24ETq3zOr~UMY zqca(GX649pSjT1mLG)e+3KkKk?dQ*EKvFQy+!>c{8RiSB{aWw;;-CS+ z;BY;vNxm~?6W6_*P=^B6$-2FNHsD*TyRPvOZ(^|GOqC^(JqaSIGM@1~Tob?C?vY3} zJAw+R5UJjG5@nfdrbm|_c|N9veJ3*+8oc^$NE#eR{W!0(%Y5UPV^31yd@DquP~h*n zYmzR1*yI;5uh$>c0%(4@oZs%TRO+vMD&q?2^!MKjNvX$XI&DedgxA-z$qS#eQ17wW zi6x0Q(C}rAjan{adZ{)C(cL#@OeX2-ns((4&4HDNS*q*bZBtE1Ow={BVYz!-S9K-Nicx5DTbfKcAD*yCE3hl&R_Z6BCRs>owYts(#)SADFH4wd! z(T02mv`?m732E#e8o-a1Ti4K0{(Wzq#~VKCBF3Eix)*eQWF zt5aRtD_#p9g9D-TVm4lJflN?VsDDG}f1}0eNj^uAprHS4^4QX!cz)0&CPeSqM|OVIN)Q5Jb%v}#1Vf6icZ2VXD3^jR9?);3DfwF1L*QZBe^NI zqFN~2Mbgim{?obsFAe8EgZlKJraC(6-%LN@6Jzl-PTK#_{Qoq4U+e}&mM4p*Oh&h# z&Hgyxt@>7CI+e-5Q>q%$uG8zFIahNeQl%Lv#XhWEmylD($9HIR@{4?JME>5m+^b_m zwQx_8*<;X>(!#PK_#-d9M8l7s;LH*Hj z_Y5nk#zb-gy~MTblYWcE?3dh+YNr!Pjx-vz$m7z@SlO*_3A-p0>4+Qa8XK!TOy5JC zj}{I0>t6Z!`;TS0*Gf!Q0e;_c?@C8k7pkrH+3lKaw#_#^_T$T?`8wAaJHr9!(WV_` zm90@zr|{9X_Iu(3p zPab+HHMQw)e}8{EuT@mQ6G36JU#S;cT8v&h8TYThs%xwt%TmUl^_mDcf9JK?KWXl8 zd>~Ynt1aKU=$;r%M1KN>LLy1R%KE%SNj!cSw?M0eBAMCRaIeOam7V=9Hg-T`<2&Eh zcR@-;o>r;Nw}{IFG~69|P9?FP2cwDYzA%+u9Wnjqto?IjBnJ+UEwnoahtbFxDHT;{TJvp%+Xg)# z$a-d(iYh992$W4_O`54zm@!ou-@F?s#|I4bGHCw6>PXI6t5w;ZN8H`ChB+J+W{DYE z1HKBeZKU;Q4NZUh#2%{SktkvY&Ev?&(wIr0tNPL-t+b< z3u(I2@f~-yx$Q>3A|RE!nwkI(Z0jG7Ch+z68WE9am|S!9t8}R48SMCd%d2DUacM)O zoiec5*j$MJL;*U}qPT?BjyR~d_ZI%j2^peR@@;xr<*9!e)@&HB6lB0=F}oUUKz#v} z2{Oe(Vu)2~sYZ*(3m^4b>ne{f3V4`jNO+uWJ`y-b*vCX98Q7sMJ}k`bRPV!CQi2FOHqi1 zrY0>53v7nRwH??k1pKLH3+&v3Y43O)9N;;e4p%#n7FkLuWy&ECuwz|Z-RxFYyYjr2 zEbOj6Fh?efg6rVH7_wGQtB^oRA2gvx1uv%~AmyMl;N%LS&+yjnmQ3+$*Jus?J&FdoY9H`3K8Z-2!{QziGm|vzVl*qAloHJi<^DC9!ym``A4(_ahQV=(w zOeWuOCf{n!$0>DFuupm)ccz@XJ!TGN|7&9zfICpid_FNnawuE5U2I!5)mQIKY1^%B z0!7Ixq}iA21stkQ@AA?1ob`JcUns$L7pME3Jjp+MGs$neLKut`x?zM{O(%juo>^Vp z=R4n33^N{?EK=OatKKsK)sgG&!SiP1=g%)=M1gdZ-s}MW0qK*@qBkSnL!eR`WX-Cz ziYbz_qq$`KZfS$Pivtx^wefsiezU2<2S5iGlI>`7>hIK`4t@!0Fv)$FG#6e(hVs^UQsmN1E6wrsW z6&12aQ~iUWQkX(Z zu^`?&S0Xt)&sdh*^5j_jt1R$W8MxfE283T+u(D4Z7q&Exx$)`KKO#1ySp61h#W`(8 zC%2Q+eqk-_{erw_0T9^nO6e}_f8p1NH#;Yh13NCTvnUVZsnZgY-b24St^|7e7|(gY zj%-ID7KZ{*5hlRE>4}6j5z$vwLB}NtrmpYI2@w%-Fr9;A!7<(A?v0dGI1P3ZGG8{q zeVhv}fI}o5lU*BMt>hr<4H-? zS8_a$dhz7t@c1CAV_;wq?q-@tK440t<2liXUoi!0Xp2XgJ?2hPW#E~rHA_9|zjcu( z&Ev^^@-(Cr>3`IO|8ipdW7zmV!#IgWAXc%uUuXbe>xVo7me(awt8d`DcHD&VFs;{5 z10XyPv^{u2(dJWB8I5cJL03ghZM4A<4*OS`uz~~Q)5Tu}6A(~#h}0OZzh$yRfwbEB zy{&8e9H!W^7>maV9@IFCt7{BkuKAo;j|EE0_M##Xr-o!wBQ#p<{6Ulxlaqh_j)&*L zQO*PKOZPblA3{#fFNKN}YdrcSx+^OQ$%zxq$ux>Z3e4XaFyVorfxj=hYiF!^E(CX; zW&Tf8R)Km?ATV*c?>Ig>uD_J=m&*}rIcxCWaaF%5s6XATGCtxiE-u-guXqOZN9ii9 zn}Xt)2eGCdt({PUGCt671EiB}g^PbEEQB3zJy(-Dpj=vRcl{Qxn=?CETUrd2COlXS zu-lk-3%q#T9wN6=>=f?qYa1Ka^X%3O4MV`LC6UhT5B=f<1?TOTX5VM+?d`>?wP`t@ z;VORoF!(dN0<3Z`(`T#G)VJ11q|fv8Z=HS>%cg?L58!L{56g+!ICj&}<6N2b}d+{t@jw~LJd{FUB}9v^?l z_U=>+zA|-3e}BJ<&<#0(T}$m|S{tXUU7nNEi*c$}hwImqg$kdt$UxQ|18$^?!#Ux0 z=oc_H7f@!6hD7hxS<1WI0~>7 z5YP$q0@23gSN^BmaDAyN*8!zj$9;+98r&=0JAqY{w?46JYjY*AxEy=iV?{I|IfB}= zJXOWgQ0f(m$rO;izHSk&wa#cQ&U3z%*34)&ja;G>0^lQovEXJS~Ksvd-kq zl5{#^Z*FI)bT(hDvMpT;Dj*_nS(%t5(T|PMJq2E+VZTBC@H-akx45|cAX}NvwV<40 zP(jPFuWb$`j~6wV;zJWV=C zM3QH}LHd9G%b57K=^($7?O56cpHxSPY=uAgng~-D}fSXvRB6X1eNrrv;Gs#c9`8 zdd>_9pz46Hir(VSd&uSsstnhvTvj$Vqq>EZ?LXSW`C27~$M*Mse7hymcBO&bK+C|A z#dmE7=@!=joyBoa?hvr1+23~~9L_f>ikiiQv9_-{II$$0|QKFyMmXaIB{_kBGQ3 zUw`@}fCD!Y#9?#U3y>vdv({q+KRU@SSge!Hdubk2?BI~9)7HJ5bhjOVkFCEyZNWU? za%EVg@_e{^@g*ELFI?IZ(0JEg`>fy%B|wvrH?x_3x|ObKjEj%|WWf;a>+9_4v0puk z0T?ry(wTZVg$uZCpjaenbS$M60)3fn(_bb-kP z(iX1Sn6Fm-T97Lk*=~zEo?079PDnxzzgy2#_p7h(Gr%vTaJu%ZLB)hw7f=l#x%!ucl0kUbVFxl#`{u&4x2i@FYw)zVE=8)#a)LvaDi|MoZY?@(NZ z*RZg#UTRh03*Lt-z?}d}gfcK-sK+B7%+b4S+dyLsdhZ$ri=k2eksiW!*e@m`r~8V; zCemNd2`p#4tWw`EZrS9iW?5tOLgaO>c zACUJL`Yo%OD;)76vGB<1N7^W6$H2>v!ik_0X_-cW|F&j)`sY&_$|sd3q@<({>=T|09#VS$R{#WFKWlR&{n0GC zt+!Xi)zlb~03e{|^@!=cH(0LPEmLfvXNoiYH^sHd8i;?{HQN72%Ibf1B>b=Fhp$QL ziF_;T-(fJulwDDXi67J96R~@2VwE?TlRZRj(g1Vxi<`+v#768d!>PU z^8yj^IV^0I(SqAI80t=tTiW>p?U$DcJj|x(t={3hsRDC>Dm04Q5Z`u9}IPWqo=DIl{=i5`ePAfpg#F~ z;KAg^4hv{$c9$!)nAuAE0X>+?lFsFR2}onXt#I6Y)vOzo+ml=T($&>PXE^Hs&rxOvjn5)S z7H}c|L0RZehDySE`@B?^3Z)_J?nn3kU?>X<3&_iep!dYAe%O;mP@{FW{JA43mJ-na z1-#Y=;*Sa(Q(JAK2I9*`^JSj_xOTbL;!ahF8lU9J~5658>lar&jvMPngrGIH(RlBLo+hhpVLFhn@=^A)2yA7o|OdWv> z7PPX!@|-zlhDB$`*m`%tljL=tV><_yf`pXxbYVI3%4sK5`aq2{Gz_3XI)2g;Z(O#1 zP()QKEa);bbsf(4`XVUfbqx&-sZIf=OJVm609ikKrq$;K+;M>-&}2LYfuQ=tKzxRK z_IEu>9!wFOoNB1F-v$*H0%tx;#~ii-TG)5s48fRD3aa($j=Z~`XY<^I2M98-qC%t5 zD;1cIKy7O&kjWduFS0Lhw%nh4wN@|x*Fb$+nB)qlBTNsU(gS0Ha%r` zx7wUavn4w5VM3*a5!v3}{@X|O&st^1(|@9_cG;^;K0#tg?tFkr&+yb}Flj})ZC(|! z4`im~OWt*ZnC?g3Y6``1D)(8@BEa1YC3*RSU)X|~3Vm+@m7OakMCCErJ%~|Aq=o~U(b&4wdEie(V!^jLyV(Pl3=*G6j4w> zt=b$koL>H9`mLxCO7QeZHTjd`ghtxa!4PeahZ%;wB#d&O&7q{#_4S0z`@RCiM@K(! z^az`03W>*L5agy`CF-yY_6!uUG_X22ldQnK%EN5g4S+j9H8xvT-6OyJU9e8J?6=B@ zgva*IJ4uOcfMFP5!89`G0Tuxb%W|WnbLe;7=EKUbj zF1Pa>$D&PzA~iIhbnknF|3+vJ4t)f^x9;p$Yvn(FtpDs12eIS>0-zlDl6QX}uk22m zTP)Rw%rN9-6;j}`@3_=jX#y6I4II`2%s7iy!COKGIc+%B6M(_-7amV~r)}5BHR_Nf zqje-x7_n%irMYkZ_`*-^tgcGX(a@}QU<049EeETg{noHN5LN;C^=!0&-<{cd=0@Nx zCLo!deFMjalmi2WqZs#2Hv9Npu3C++GM)KBc4h8%2SoFls)L*32V&xKz}Dd)uy?1_ zLkS2A#}rEgzrgsAa{P+t;Hxt?uA6m(wGksV2Gl3%p~7q54!!NZSA;}5wR_e7)Yiel zK=-NS-tQr*Ce&@E{(uH;Hy-GQKznYSKb*ZzjMv@$L>_`6bi|rYsMg;I10#M1C<%oy zzQ={nvpFp;mfT^|jeueIsUv?%H#DvH5o7vZI>W^~-2*Ms9B+mTaP|)pnLM#!k#LP3 zz6gQ?De0i<*sO~n0|^f6k7d6tkWM;t!>^buMj->gS{VRJSgU=s%$Dtd*?+J{0ygb6 z6B*>oqou96Py7&ChKaX0IPgBsIl<9@*}nKq`WZ|Mh^EMazOR58e&Xr?5lqC!mI(Nf zY!y11B$j*jA?C*v9&3s9@uvwF{48!Vnt=yqN9xWq`tltM5MGLK*d3-_kh<%=hhuoo zTbhL(g#_mHw}Ya#*&VY1soedyZ?LPxQ&v_^!AS*&m2i&4(5^ivjDUq1X8CMqBKD*F zY@MW=qpF(P$v}Yj5uF`U$t$T^(4XQ)vk#NMIO)B;9@cKx6 zM3d_YM5fdN3-A&nfS5{iA5UUA@|F_g2QlO1Wt9x$`+4c%lEd5L4&?gL=Av-s19lr= zMCarT<~$W(%`1{^#s)^9@Gx8@YBd>Fxar1L%HVicuEhD)?~*x?KIIz} z$ivgGlCi<5!=gOxq)Nazxy3cUmk6SJ^$Q#%1wv9K!#Ao|aBxqj8-S5Q*HV9Inl8)6 z#%4K>>CyP8rQv6Io!=3-*%brcWcV;|r= zrd#weAVW!vMs2Y7iHwF6+GWS0H5}Em>WbI3TADD3Cxq-2N#NMt-{ThXlmnXahu!~p z0e}~N=dqo)nCW-ZvCymT@arI8d+OlEpi&zIE|3H+=N4UWq5y=I2VdCdurC-KdUZ%7 z@BCa(F_2MlBmnomJzkFj5e~=6((O?8t%;da_Q;~ERV_DpCElXYead7u?PH4{k*l4) z=z{R>b4l38v^2vjmou{c{r!ZiKGxikgsjS>b50N*VoMLZL zFa(Pgt6&C{i=XW7;Dj7CWfhqMbv=Fw1gOQ!KY1{&JvKw1vry$+WL3LWn-yyu__jXE z&(FWMSzRaZkEITasgf_`QQMm=8K^nnFj;EB1y-Z=!{%FsQn^I%nxKnKuy{5M@F=Kh zHupD<{c#_~d3hm#j$5aRg8{PX8eJHe?2+H@R@R~B=* zXqIz7=s7`CifP`YOfp+)9O1k@vzAJHS>d^dM1F{pA$^o~wv%e3^$EE5r|Ix>>PBc* zyWiwyJCGxJD3MB?<_yGRv7adl(0shzT|78YsFn2{$(5EoxgJhsAFr415g1{ykl|_9 zjD(^!cdt1=~nhlmST~k z0kAlLqUs;i`?BB7ZM@l?g;7bV;K9UlI)fYZ_?yiS&qlM1=XEc7Ep%XED< zg@3CvpI|m(Vbaply1Kej$#-AP#mRQqk(()n`g^?K{A)V84EDcHG1f;i{>z(hmxv8M!=%I>M%s&HQN+MO)Xcd>eWSTdb! zs9rf9?}7tFqv444Z32ro!9c6V&&xd)8^Bk!Xfy>ixu(8CK={DQI!$E?OoSfvUQ~D= zmS_i#f$H$m{^a5!ZDnnZ2n<#YMCDph^%62VdceQvqC3}hGV>{7yhiz~8+Di4VgeG9 zfRF06$LC3t>qC3+WWFu9xVR|IdBR6tjAknvn-H%_8$z9h=kz{+kbxWVD_W{2k4$)DUd^LH+B`%xDl4CcI3&` ze!K(%>{>|uDHwlO_wR3w&WDxuw@N5!l0fhH>5|Q%k`NmcgECpz+=U^|%qo%-?6zyM;V)twSc$u|kGd2+NwEIil-2tT1ccATLw{J}lJl&L>IX|_6 ze4|$XG=x2=TCIm=Z#1-SC?K#Yo$z#?gd{*jXFixK6x( zsmvwnA6z`|I{N_pm93Zi&>f1`HIXM>Q7&@(5Q6scHSbJi8mIR~%JQ-fa1n|N2oM8u zj+mW2fYWs!677kX0kns&7nZu2j0Q^{Rh*C)3k&s*0~j*cKRN;_^xu^f7mues8JY;+ zMIP$t+Bxq1GHU<+VZOyP5U{B9hU0$E%SLYX&;j=t(3AA##Vf?u-6JD3l4ETy?5W|~ z37Ft4;@8QYgo_>Gl$4aW7BTauJDF2^P(i`LKgY%hI&Pni8dvf?y-(c7B0|PnIbtk8j)VkG_an4j!#x_f@H}lGrQV9DHt~2G2IE6$3gyzys|tO{bp0M_ zjpdT*^roN;vLrT(-e}-6l@>iT3>q!y4Edgmv%^US$=m03kIPVS=pR?EPq%>LMZcN# z_%zcUd*D!q$Hlb;9;b(h)>e~58tapJk97L-qqeruNTM*XYUXfqUK!k}>|0nOl;MMa zkKp6OYc^Tj9!(Q}%=jK+9>&xWh>!_-`hWvK;SoKsB%N#w(A!;=OQZ>&g1yMZV>Q>_ zlf@%8als!5Z?q5)26PYXRH=yW{$OTHwXs^~GJ!cSW^-nUQ%#M;odG9AzsI8!{M&`; z%iE*rnc49|LvgnY7t)z62EDWVsKGRb2247LK|;DqN?KZw zMp8PYyQI78j;-JOp6{M}e%JqG!`^GpHP@VDJT*mwbfa2=o?XG9{I*LPujsn=V+@$72u$?Yu zy=RUeC-C&9+fX;o0mRx<`SSX^ckjNaWpac)3_wVCaQOE=gRut?AMQc7<{v+pboy@l zV37(nqVHe5j>9?ripZj|xfA3F@fBJfv(qU8(Y2P$AMv|nzIMJ7mLNE)KOM+X^A-LW zwbK}xca?uS_#R*LG!BO4X_tmb5P|fvJn1;>GreTNdP6~E*kq{C@{x0Mk3OO93jn`H z(~Q^YExya$E;BK63sB`=I-F7+Qypn3P|JLF+}6FCNU!+i{?EwA;w5I*-36x`tEj=X z=gxsMn`UYpgcs(()59!Bt4j^XSgpN8e+xxEEU(^*{d7Xsg3q77s(HaU2lrBM*Jrb^*oD1}y*Nn}unj;fe|RjkCJ{j4R%E*^=-)hX^V4muDMYy}S15=E+qroE!$4$22^@$= z9-#Ht?$Et}+j@4ML`D{K&Rgla;6EesW#AzFZXrB-uzOrI2!l@jVMQm*{vE^P z9X5-}a4q+du>5lYmxBPSBuRa6Vg?YgMn1N1z^Lo)4wg$5Fa+a2)(%m#Usxv6@V8}* zM08Xp*LhKRh7i*qb_Cs{)?fl&eF6acsbJa$X;c#SeK$WB$&gGif3o;VhoZuMoqH-z zt^32J+xwv&T*)}*FjzKgPTl#m9%~s7+i&+7ycs#stK6X+cp%Dw(y!Z+pY(e?>-py; z;1??vRwdH?@AQ{|pK@dF_wTwALRP}96#Ra}4oSA4wdH=K@riLHgR{7gAFq3Qc4HNs zo(iNt^+ZwmF|o6vl#Jww?CCSq9nU8U7CAhU)3u6PT7?X@gM$N5nig3Pnur9SXvOv= zsJXJ4P?~R;zp`F?2x<}7$8wY(>m5f)(5U@lmFRmgP(O7^Yi?e!Qly5=iGp(Fmig`; z?MA_%11BdZ%4M;Xp+GQTh$5-q$f~o}C8V;e_wT~WIJ~3RSAFZd$8kg?Lu`MMla2ei znMF}xQyL{_f}$r1no5Z_DSZ^9LEn#U7|$zDL7&wYMvX%s$)NN5Q~lcT{w-BeQKd&} z4Y@I_DkYAzAmV_a2!9~!kt`R-xuE)g0ZT9x`>6cafAkk)xjFCa!!>Vdmfm}-*K+Y$ zW9-+xlQ|~fv3}cf2a%qBjAWqt_KA35nAwvS){v#&g|!4L>@@Ye+|`K{yZB7g=Z8He zw`6$Z!=cgzZk&+Q9_x5_L2qU@{mpPm%mXh0*V3usVbnQ}J!g$~w9ogPN$y4#Eb{g) z?_bpvu-+rEa99tW{stF>P-V(cOQC9)9uhh4uZ6sJuO82LE-f$OzA8xIEnU#KQ(6&n zams~~JhY4z$SK>5dFc?>;ZAyPvrVpPm1Kb!L;yoz^U(P;Bnxu7=;_jy;3Ui4NJg+N zHmIi7L&dM>L6Ql8gYl??b-x(sHH#18EF2HkxS*4vc6S%6x!hYWu5#Rthl$O$1}eIE zXS-GFlf75)aQjP*$7dOJpG&Ez5ZIXvH3O^*8jzjU#3^uCE^bu2@NVy>ip`0@aL2+6 zx&{Wqu(03Sx4denu=3**{^*~raoY=p--w{{)mL*-HzeZz>ZS!Z|Q)K_!k0mc$ zkCDEpXOW8rkxG1(syRD`MdWGWXJJ1-zXwlfqFs+QrJO05s7RdY(<{snn}zNu z99Xw}THG%R_^GkR<}bUA{AvZv(eTW}V!A2dCD7`R_iRa+X_?HW4YC|HdOlJw35R8f zF!9o$n-sR?E9f`S?^CjcCplb(E{bTwV7i^29|GsS-Fqp5M@%fSYEKg8S}Tn&F~whf zi(PtkFsCt~+feRnGLN0<5Mn#Hcd<(&Cnv{d))&3RsQFd9SGVT49mB}TsOIE^_&I9v z^V71m%X1_sTT4vG9!eeGTuE);m?rt|{@JEQS)(3+a##M<>ywUi*eA77TOwW_1sW1o zTA(AF+uX&6&EOi%oISL|Qi_VH-_h zuEbN~w^|2hhDTeVD8Y-Mt5HoMXWAl6l8kMD4N$gN#O`Sfi^0-CUhe6J=`XiKcDK`m z47;4jKBU`%!U*Bn)Dq(sRAOL3toV%X z)b9?PxVX3>vrD}pdM&Sqr(ZTctZ>VEwQDHV`#Kjy8kEUGYKLcK!A;kf2>HD@b5A4T z@!gph>kIjQDQ?c4m7J{Y|6{_8M1Yh@laz<2QOX~5KRSm6E+2yYkncaCM1>vW8ZHS* zr>B=MR0lU+W-HEsQT^<6lRdloWyIE3%Qt3kKz9WaqIi#sir2#))s=RL6oJbNm%!0d z6T^AMt9O{#Q0A1d+O`oxBZ`3m`@4ao`Pf0inbnaD#0&@rPoDqo{Z5usJ#-VG%rsgB zr)_eYk#pnHAcWfOYFI|k(!>R?clm z?YFVG6S}q>|2A+G*A*zOS@H4leXt2TzA)=KZF+f@yq?7BW--8Xm1ch<3!FHgQ^6(D zL%5&cf<^W6defG7UpLWNbe+4AzPQ-^4gC6mqnWF<^{M=K=2TH!qU?Zke!CMabF`hg zSBrxhjW-SsO3X*zP1Ih*W}F9-vWJ#xc}QI1@XvRQ6#Kkb9n<)}HBq^bMZzBn4Zhy# zC>vh_kAwb?Oa9q@W7glj)x?jTcKe|3hyJwTbCU%2*kG2%$GSSB+jNRIO#^*qoBZW+ zqx<;O(_ZNO2N7b@TYU5f5gPh5@S06AUp=JK&NQd&qgGlM6BB5%WvH+GY(_)#y?OgE zhjKEv+whY@MqHc8bKhY7rX9vx0ch>gRaI4rYLS498=N0b5s(uP1v_~)M1fPcUC4U;9)r~oQD*(d z!h&~jaIiOB3+m!+==(qGw}pgm#I z)!fq)32x~66**$FIJ2?XTzz`zbauoH94sg>J=c!S7@>q{nw&&DVA=)-P2-G)I(fZ_ zuH3aoe({W6r6GL1FAF{)uoU%CX9N{rAt=y-m{mQHHO*-L_`KPNkoZJ$bJz# zG`BFa!&A(G9g59(oF*qs=aWKeb;A*s9?IO^TX!4ur4xCjfV#v|z(s_-?F<;N4CEU` z7iA(U0)Z^7*0Qf(lMMrj;7&mpS)ha_eqvJ|m3mn&_2b8nk#0Xy`SkWJlKEtnn5-p} zR!2hjH<^dCE~gwISP&!SY_iP=&2Y9``9U(o*UM{;Xg#GLggn*ZfE~b(NE@n+AI;c` z=shaNU+;TwSh?-UtlDw|rpe^7fqzv~t=wHN8@o0jL##mN;WNY^b7Z#D>IxkwrZmKX zc_9>BeotRLE)Xd-xhLQhntXrZ#`+cC8*=ns{dd5m3esDo#@kr1V^p~wv$V|#Hqa7i z8g;N;g${lsLI}ls1TiT9n9-}d&lq1K4XQk^XJj{$|2Ka71#5i@rec=D!(zv_sCJ|` zrr3=>j#Mt=N3;Y0qW2OViTdqcmfQ`|KM{E zjQ<152^Rgu=>R$VYhU`H{^I|G=HXgcY!coN{9|wWpf2|B>nXSdWJG@>Dp#og`Ewy9 ztUtkMtxajTe-Ofu>&CN}071qsuCJSgCyb7a>YAGBg}Yr1iG%tX7njgDQjcp`W%@OJ z?G@oJJfbX$N8(9qtMUcH(&4Jr9CxHv;?k1x^02#9^JwiE-e;rX>XwNlr{+%yEPZiyS}X4g~hV9IoLUcC+D2nuBHb4p4#1cAU=fRb{I&jjB$I5)t(JfA5ETvM)& zm*r@#)sMHepfPK9=~QMj>y1U|=JtmLqeG<&j0R1}xb570?Mb*j777%cmU@?r9WI9Y8K5_hwlS-oYMMgSn2%1pChBVp|Py(Az zxNPrkXa(5639)||LoKU6nb|LpsvPW~Qe{aBZHwd4@05}Lo4AB+GXlX|%kzG1=B&o; zitx}(&xQ^K(B2~7h2VznELJ0x>RAcEnZ8*s&_Op~DANM^(jIOqfr6DT4T1ht7tWPm zS)H()M6($X-Jz@U`yLlZs6cD&A1`0PsQ&Fm+^@Xo^J610qj(4NlZti{vD2vZOax@z z1^~|WwXA+M_*l-)&$FP=0FpcfG+hJvFR#CKx_-CNZp^;1Ov~*Y`=?Sa8?XB|`G>Y7 z=~Oe{u7EfuzfYfJk(6?G5aZYpQ~s8J^Pt7_H)f)M#|@g^D){T(JQv2vb%D3L_!r39 zvuU)zeD)Vga5l?C$Lp(710Mq%%d^x%j<$-M4T_`!?vgQm>A=S_0k}Mn{W8q;Sl#Jl zk9M8gp7{+v6r^*83;=Pm^OieYZtku12S1*0{%UcFj8L=~|0=?!mQHMdkFT`bYziK; zCz!N37@yj^oPIvJF&PF3>rGEEZp4o%gx8T_;~3yfFQBGktGWhc@ElV zTKP04D95E74TYp56;|xVIPzZieZ!56j8x23K|bYma=e(WxY`}?!rvCd=s6fcIZIg!t{| zkQwyaNn{*(MrXs!l9y{XpHowhZFhtKSv+=H;#lmAiJ0G3-w{WZotKn~V_Q5z>|STj zE0v955EfPoT!DyES!7iIv5U|6wXE;~2S;S>1$URffrLucYkq#MJStGMLaI}S^kqPA zs>se9P8>wO=mQW0Hy3)s*xgB&^CS2q$ZrUpwbIko#dIV>v?{D&b}71Cd78f7zQsCo zhW>ZxMPA8tcNl7=g|VR&XKm}X^n7+=ZI+4eIJz3Py?ZFre+uB=vsc|L&>8iYN*E#P zO{D7**JC+N1xJe7g_UYtxk&k)QR`9!ZtO~z=L4Mr!7?9|R$FU_^5ZDA1oiQ$Bx>r5 z(mx(8%~ClZZ2Zhma+lt9`EIxV&a0XaEKZ+QdOxd!WlG}ubtJ@&E0UVxSf~r{15G&> zB!me2-_9@@qyrSQuT07`DCtSe2Ajo1S%S&nH)wCxNyreSu`< zW=md&Q;mI)DzNxa52ctEQc@@>jLj7rGLQulww!F%NDuLss4_5W)kyBJ1JnW- zEfS{dK|n-K^|47_(dCB^m_U)SL?J)0e#1Pxq7^|61SKjd^i-1*$RmLHM$H8oZqv$Je_ z!D;;jplNAkZsBG}7nkm>?d=c|ZF?gqE|PIDzM7rh02bh>o`Lsc4l@VK+$g=2-MUfk}+!f_=wp{@JoVG3=5+8g(opZdR_H*pH);^QWBXtntV+cEG&+@ojV;# ztUSG@ca5JkXDMX9TCeswwlPW_h1B^8d`gJz@7Gf7yuu|40Xc+=ic!QPhmii|EUbMkIc{F;P$}nY>YV!oqN1V6LBg3~XS`>r$n!Xk zyyM+gxs$4~q@u*c67#`O{BA8I*$i9bAW}Y&sPgY1BGJR(F0qJO*+$2{R|l|pZ>oa; zkc^1OV2L#YhP^LG83)}7JN3nkV6MiTS%dm@9Zg2fD(%K*DJWUV0Col|iU3A%(>c~oA5O%I`lVtNw1m{ z5=x$!h9!}`zziu#{&e%*yRgL4DQH}{yq(HJXYuhqdc5w_c)FoVKYlNr_38YhixloN z!BC6n7u9#U3_<=D5J|7ZcADN(0|dI9REfBDP@ub74YRuiEw z{v>t%Wg77y^;EYvl(CqbQ1HuW&kTjr!P+Y&>gSlLq0VOfeVA-107A@Fg~x2_Qre`z-cCCjLpfq;&SsF4zuj-7=~3#_Y9M_PQ~zUX?1TO>&=< zf*mo8H}Yni-~YRqN%XjwMVq6R%#b>jt`e}ki4O>Y<9chaUe%Zf5`${FUhCJ8@v4Qm z`I;+Nl9;V_GD}`3IL4;48g=ia49Sj`Z2rI?yRkTBI)wDi;gTOn?F@~U$9qoY0ti&= zux2jZo}tDOS14E77u?_Fo8vn3UzkhY^e0ZbP0ax%fw#^`&Jv3FPuymW%t17{ORL{L zcixnid_l4AH)G^<+}CtKMd_XxCG7$peKoPx>1Wgey%Mv_B39WO)$Zz39F=k%3M7wv z7h!l*{>5`GWGdCVgcvtSX6x#o`yEv4^c%XL92@ce442-6hVJ8spddpa4Mr-RymX3w z7aMgW$}W|;>QIugGRR)*%;;3ZtM(Z2e+lSTq3IF_V3S>Ygsgr+rfJRJfdqp%!nxh< zjP1r|JN0Vkh=j{mNju|HOIZg>FJbv=0T|%bYO%kW8s{x|Gm|9tt7X`jnA$&onHfLH z5u{{;n(dvJmz7mp-1M>c$H?iG*eH#$a+WQxLs-MvfcOBd$U>CXA(Pq4?Sr*R;c92Q zXnsAz&*whAzO4F3m|(n0{9QWcu(8z?e;h!-{a(vqQ}-lOp*4w-3~6_fF%4GiwF_g6 zB;6*(!kag>=!q~JO}-Oa4Jhb3Mvt%-;FrKP^}=r>Lgmr zUtL&Socbc9VIWVz7h+l;jykj)tRGn~>yD3)QI>%4yC8B5MC|xjQ178Y^twDKt4A{g2nQvan1l>DFSQ{2QF5>&rc>(Ut zkXVu)_t?7M>yHk+z)`NISX5U69*GU$V^zCdV-N|62GxdmIE^#}2q07WZ!3-OCK|MB zLtNZ%QAP37pr}aG?H^)Pqc@nG2VOupH~2+TfVqRXU;+d(Yj#;}A2?QS(f{??xox~g z$VmPpBR;PD}(p$0|=|c4$UXeo7Yy-RVMdQ2S=RIUz_cO}+3!Hnr z@8O9CC{o(m<$?TcD5u5eC4h>V3kzRseZOdr+@C*481pN0J3I25!H`frz_wi8F@O?i zi-`LjP(aK!zwn_$MCpN!WRX#&1KJuUqe+y?>It+=%7DCM@d(Ict_6%|| zSDpfyge-G~Myccr$TJwDSPl2S+zzHK3XWGT(25%PGg_kLo`y<=vvKiHto%V;0E^#( zZ=L{3`!}B<4FE?VbFS~R@QUeWGb8{n!nm=S55FbjFhf8<9r62Uy}iANnF;p2e2wqT zIBI3O#>RfqNtXAfAdj(4&mw6W4o+}sED|iRFuEMIKX6)u#gv7Y-)i=@oynkhcuh}_ zY}xv-SV1Bm*7C$&<6R#|Y;hY>?-zl<=`XZLE@V#B-h?cB&?Y@O7_x$5QgBb;%jr+8aa3K z)JhQ+%x{(7da@0!L*fsfx}r?t5wlAdZ-z|5yM#Qm*h4c@QwhN6vR+E~HLx3xe-M_a zLFmfvaXE)a;o?5hd_wkipO}N$^gtbOC|$=|rPb&!r}x<&b$s1&e7CMCLRldtq)&Mv zb55(tJHuE9S~Ns=fiNIchGQT>i#YFfu{on{A(Ixcd{czYeT`tTBd%LUU_C>(>Dq02 z)!Uhuk1EOy*N31}$Q)*fyRAm7Ho4J92>ux)sArl%41sz5x?aN%T0}A^x$w2!wGq}T zpTJ~LkeMhJB_G9tz}5$_@hwY)ICPkWzi5QF=l#f%B;z}xds7iypT;QzsM;J*PsoGds7#3MP$1?fRIxI+>JqpkOLB-JW0WubL>ed3OlujIo20rqKcp9IAOcsn%e-Rj;y* zfg~B~VUAQM{8#kfhgJvv4iO+qF~Y*aR)Cs3t?<+xTw&i^+rEJWVHNu0@BPj!<}I@o z^M&5L$<hj zZywcd90&SaaR&a_9Q*Yv@&rnLn9UIAIK1EA4TgPL03RWQcWGFw1^M-82{RNJjYEeV z-AMvQrw0kZaHGhYyJl&u4m#FBv-ME&A{-3U{W+ozfUm-?+B7;E+lX;Ue6fDCje&H7 zY#ff22{DGDx=&924(Mk0;T;OFR{J04zbT@r~iAIv&Q%LF^n_#B?r(rbltDca``(YkqvRd>}; z;=MMkfAHXuTE#WkES_)~FHaQv>JZ^?vTIp^%mhq?7Q;2#&m7!`za>r`tY_wCQUkLb zI#HhPjaJMb*M)C`zjb~Rc$-1~J)wdCns(jkW+7-eo%c2{ocSW?Ug|e|D@3|_z^6NW z)3EF09n`P#RVs2B(ut^bQ}~Z9VS8K|%8_W}oJ9O3v-8>$Xl-Fr#s;84sf@?NQ>W2~ zpl=U|Q83QmgRj|W)T!FItHzPnGBGjn!sz9P_ZP=Yc(K`>=|5ra?X_L&Ni>v-1D|1i zfN@fhbp&UU8~=6ilkxw)B(lZE;<`N|1B2Y==3zGaReHsa!|+>^Ep#W&fQQ;{-luu;KKaup z)NU>wV=L)}t_Lan4jYpO$Nn!NDV;heEL0E8`#tD`L+4GqR2jOYm%rzq3F>a+3{oA( ze*bliQ?!EfQDzK>-a|xuNkg24p`Coudyg+SYCi#<8ReY7DpoCBp?T#Sm+EYODNFk{ z&@<4m7k;7_Cg^Mn%gjpnk*xXPy%mrIa8$!H5FrMgD1#=>G;`%?slF^*Oc*&t{?x=-UZ))C*ueKK0TfcrWbfh5e1|sW9il zW&GNR#8C@Q;(I!$;&OB&9-8%Q>FRZKzMQ**>h=hbUrFAKV#@$)?b|h;f`+`MHVfr; zH0~&`{DlZ~Md@S=_gb_##``rmP!)xNHw3)ItBY$vx?-bnM3k&R>V`Dt@ z{km)}77d^0Zr;r2Eh~C|4J}!c-?GSi`o%X~%%~)~zyRTvnbYe`8IMaICzKk?bT(>7 zUtq+$lTpPsW`3NDKMZV&>~ac)i>TzNM9`ai9K+yB5<(2bIEd* z5LNi8V@YW3yCB&SzEdr=EIFHznAq6vgguU|xNLGyXYDpCmCN9r;XXmX+t^vi$LqH& z$Zp=q>8{K7h^VC|c`I?jltHQz&Awo4(?%w;?un0^wIr44Tf5OXv^4#WY^^q3y;WlL ztr7ojCLg;ABM-ZR%ltv8z?*6;3=4Yf+Id9=%xXG1fp6B=N~02JvyR8bEW*gCBQ=}} zYZ$?iklX!&lIg!E@h=nBq)J;=t7|nEYR6-&WF00qNFQg_ZvL`~wnoawpbN&RLTfaQ zd7MCKwS?ySRl)ClI<7(wW;mLxnXwp+q$?F5|6vzZ2^Spy zkt=85I-Weh8p%7;=tKKuD^J90yw8imKc3E3hNNWoR#iA4sVkrdw3fl*oQfhl=wHw2 zIxZB9F(a)#u{Yn^aa^6tsaWfy&tyYky;U)|9If0 zsn0T-!-aa4hj@g9!upDe@0OsGDJ(ASbj9n}8F$CTQg%=A7`(beCHIB4Emf{z^wcfF z3VGzKBJ7{%n(iN|hMBjR&4bZ$fD=~Z@`}1)%dFtm60RiGW zr2*>7I&#hppZCOS7GInCc}X?%cPS;l+k8yp;j*YeG@0;|YRW*@0y|LrsSVDzEmRb( z24Rm6y#}@Dr|0(x&cb%6v_0{Vqx%TNpU@9U$zR0P`aTdpwCd-)Z^7;HHAYpM@q73R zn|{7#=EKaS@8J->ttmj?yIwNi*?{8D^E}g9T=DG36)JJZ9{kuy#b#_n>XGU-`J5r7 z8yt6^j1sM5bj=X58lHtn={}3G;k%iSM&se3j&n`llF0}e{Zb6qxT z`&3LDG0j}W%I%jIlUp(kvhGUoOl1u&`xaDgNL1Ff-!NXS#GtxXU38@?MA_+Vf68(t z#kem9x0n0K(PA8jO52*^w;I=a?U`1$mL+At)Fqw&Cz3A}Ym!o(OVXLjD<+ouC%cB8 z)`5~HX=mrWf)zfW!#3Ww;+Z`D-qGGm?<2H2y{5OtmBagZBUk7>OKOF05!qYzrSNkj zVS}LVu_fOKni%FC^ewR~Ukl~Yzj;`pUbyF;6)|(NMy~3XcCQk9;|5c9kkx@ec2H66^YVyu&T|ni z&9i7$g%gWO_wQL}l`C38!%`!hL_W78Z&7w_FV zVnK)V;f#G}H^zIPqjCOLx%-fVW%B+S=Z@ejkZ)&xH$L=qSCUIydPzo-`%xDqGt_`4(_GZbFb=dD1AyLUsEEr*uvJd zv}yIlI&h&gjQv|M=>oQn3=WP-;he=H*0MEwhphzsugm0T z&U1tJoZ!yYAhS79Xo!jRkvV8j_A1N$<|TT)d9|9pn#fC!&RwT{PmJf{r8x}>l^}na z`{L)f1!Gos44Wn*a27k0RDX8ebHK>iAAi>8RQ&WRhb^s9yxyA{)ayaj*@rhcdP?u@ zW#z_;Dzs-AP%HdMn_grks8ow7&w&;87o};<4>Huo0D8&T;-?iAkg` z-gkbr^v27oq#11OXYiv7NjdwBPZ~s?jC$b}#2(+$&X~TI$ddmk{Yckqtmppe)SFiB zcNored%tqasvNS&fD*rc;5yvzn;$+9ET}A8r*S|jqcuA_IliyrM|!WqH1RB}dQEZ! zQ*pOK;;{v`l=|jnRqDJUE=lot#n20vZJBpMk4uf`Yj&vOng&ut!2h9NK z<-W7^hqr$qMV!0)th!r*w0cK(;|Swx=jkoAq}b2roR7^6PaJ9B?BorA@p@$2!icxr#+ zvZ&=gt&pMR&9c%67V~6RWSUUH9Xsdrh6Kmt_fhy|UBlbpx|1c6S5Bgf;N@O$4t=B+ z7+N0dt-${)$w6n&qJ3@o`zcMzSpYn-G2%*`D1)RG2~H|84y;Lh9p;I4HU`-h%Jl{L8Kgk82Jn zoOCH?*Mk(BB@AGvkj{HYq0?c}?rR*^*Y2yLeoqW(#MoDO5Z!K-_a>uaE^DK%k ztA0NH1^wmbuB6eQUEu?8kqVPfD;AX;6!Yszlp{1_I$EWVe;V)eLkW2+V3;Y|9vupEf5)3DjTa<7fO>*S>z`8%F`!P@p^0UyLQ^It0XJsG0C#u{hfrmw1( zl{P2*99}%a!D$ zYu%BUum^Yq_(YP2x0y4nXRZo03GO$vSH5qn!2OcjZ5$x-gZeb0cB$lTWP12MP60ZN z@eBW7=-HL@^a^L^1S|M5V}*UOgdk%B4`tw)Q34N=oB2o8Ig?0X!CYEXclvYLO5&{njfh$A%*+hR>i7EA(Vo8NF?0)i&lkqiDQoHpLc2DQVG}265;f1c z&8DSa`O}cfnRqJtwY%bjpj^s`;dvxvYw{4u&xfl!RHL z7g=u4@OuTnvxqw$jQs2%DK?-@ueY7?!)xDAPdezx*@W`r_sM75ny50sN= zC@&{%?oyOI#yQM(M67E7%BZ%!dK`4yE52>V)a_>m zv~4f+Ro4xS#Fv)~kM@#7hdOLynh#aNt=ZkGU&vU5F|Rg-e81`vhn~5^^(JUCBVNgV zF%lMmL@S2P-C%`H8HW-%bj>c4i%2w~3I)Bnh`6C3BPf&zIW{QL_=vP>Ylg z;yQkdhbzs%LUP#@IoWFFdLjRv_3H;EzfT4HVKwKMQN;;(cHOV_x%q}X|17xUdJn3l z{Nq&+SGjcc(JU%ee1z;qjan8X&>tz|S7XN~k~6*@hq8RC5}F*KKV4PdtyA+3-?ofn zr0xAWaNAb0x`D92M(t*vgvZ~3{(CKrsXCidTOCPdrgiZl%Q*IQIXLFgOa$ebvD1}YzD%|kMPWRQ;ojNEsuALsr{9~|130wg4N&> z5dI|o@_lXKA-}chMr(-#DHTdQ2}M7JiNVH@iwH%3D0B=IXAKH0nLtA zF~9qwA3dt$k6FBo{8{i>pRn`KcctOCrVlaRb>U-47>#-*KcH!!5w5TTi#b&W6noT- z>O+4RY!zn8KP~tBZ9^k!hA!1PcDGEDcN0SqwWrE2YpN8kH^nw2;EUg;t-o0w-HGZ(~oDf?waJ@B_^y86pNUu#M z#>u8ER4du|ujDp6?WCS}(S9FTVSgK!O0}VyD(r0t0I6j6uaG*&Fydz}G7FoVUC$30 zw#KABv`!0x>VgLKE{SiV+AR+9hnXx4f~supR~E|@(Q_u9^Y7`&sXOFy3H_j1DmsmP z56YBz>;VmXlO5-Ij`Y@&iWpY-CSOihLyUO>Svtj?iQgt){4-y}ju+AU7NTUD z#EA-j{qihc(4J`F2ET*of_cjPFPe@ID%C~dft$O^UOY1|n^s@-I<}xt$+O?~VIM?7 z!h9np^h|LM=cq-->5V6guYwrqidZvp{ZX4; z_z)AI--(aK%ozE)Dy;w}>+^L3{O)M@?jwboZ}<y;a-0#zUTh5!=<(^^vtA#m#V$ zA3h%8^~nyMPr6csG}A3=Ee!h0)`G{qrSNCg^cEJ;Y?zcMVKOy;8Vs!aqH=U5b40cA z{H0zNTdd1VNjG~}y$>He1vY4G_M2qLaLFn*9ZdIHO?uKML%~$rl;$@_6c7x z{}>Of8{)%~`-P5$sr-;4kX<*mtzACGlC`$l+NHc=bK~mAch}v;h3N0AYdBr8i_$RE zx1(U1^q?rmi|P6{Pu?Ff5pf42fFwfBWhCY^E&(IY0PNH4(eax02zXIHPUQX<0qeLs z$NegFUJEYD?|i5v9qz$%NlWaRykUa@HTkvXRxKrVl;V9}I7%}&wN$S1rO$w@(fqIY z2M`@6R zALf%FfnqeNbjtN7h%w<=4YnHtA<`r~mY4NcYShc#fm`E4X&^gL$xQYgqPHKb zKcO!Q{Sdp0zS0c=yqF;x#`05?MhHLBP?7@?shSGivo7!>fKK2AcbSE6clI5iO=eeJ z;(%vI>WJq02su(a%OE}1wF83ZDjb;fsO`D+Ks=|c#{~ieUZXTuty|7EMnxGO9;S5e z8e5_#V$bdFdEkZJ4X%>jt;1AbaPnCqNvkp-0a?!JCdm4<)9K3ok_^KDX~j#M3wSRD zh207To5`o=$3GvvWJkG_$n3Y;nWtUsib+`Gu&ABzKK^)jw-&cCORJU?jsP%})M?J* zvPix-ThKQN9?$;wR{s5=fzN*o|(XyHU>f8Ee@Np61l);8ZfCzwGJLSK(g=`T{ zQx8^N14ypHB6@aDQI zbRNT(|ARRF85qVq#ePgle^7cgU9%{aX>c^n3C~D9se1twpohu?Mwb7 zKHur-Pi(^G)#z@m@LkenY7gPm?@xpZ3HBykNwK?z2+YW&i};IxM@&jKvnN7uxb*~1 zt-;zR`XQ><3@H*XmbysboZ_ab?j*IE8ieI40en<&BpN~#z~iuK1!C8#u>zU93-_J= zzLSYA95}w|;vu!AZYvq^z*_CI(6;{67)Un}OsiIl%+~Q57p(O?xyH9{Wj=8mh!KuSh@$ckeX&4)G@d3w&Gm$6Up%UY%wyj~+RGrI7tt^!k6!0)CoZ78!1M?rns3m{j z!<~rji_E#RT?L4FAfOa)iw$Y1$_YWufF`WFA)fN@J&Pi)BCW_%Efvomt0k@Iyh`@v ze-D9iy1$4v96ZP6YUxo_5VilP5sZ+bu4Ze|!IBY=Qf2?lLk0R$QS-t7eaY}F0D;jV zx*np&z9iG>#LCW|#KXRXJ&;t}!6ccRF|?W)<|*=T_J)mp-|RgHiPD?o>+b{wF|XYa z+hP9`wXvt6?Eawe$ae+6a1B%MxYX=T>|1p6WZ8|3lpG^N>6#zoX-b{3rx#!QegD-? z)3Up>)6mk=BA9>sKg7#_EAGpq|3qE9Z$OW+T!~+h?nURVZps8Y1F%h<+eVf2V80(dLpzL1Owq_8bWbofQ=Y3CkA8(}f)q zsqS(F@jrb`R3w7m!@eC=m8SuY{P?@}FLV2sZMhSqGf$P2U*5qjMCw`Mea?-)oPz}a N#Dt}V@&&cu{XaV3;j{n% diff --git a/umn/source/_static/images/en-us_image_0000001267230305.png b/umn/source/_static/images/en-us_image_0000001267230305.png deleted file mode 100644 index 806c94cdcfdd3d6eef2a9668455fd0cb2b38a553..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 391 zcmV;20eJq2P)P000*V1^@s6{^R5m0003_Nkl+b=R9w{BQfMRuqhMqhKR3j zla89`sz%*4(gk#y>$xmy*@v`{AmR$K1Tq|58%Qf#tS?Vn4)2e+1o|Tb0PK-BjpG3T zwn#I7N0kJMOTY$cQ`9RkJI9Pm0KnI~xkRN1lL>gdI-&4Tp!$L%zy=8t2*T_A1-a32 zr05c|l43D7B@BSw+to5@w*7?1EY=~A?ipGoZZ27;$)uCLkFp2yPUE>qxg~~# lCsLMu&YpU~{PCYrAm3NvqhNmXJSPAE002ovPDHLkV1oR%sHXq` diff --git a/umn/source/_static/images/en-us_image_0000001267350317.png b/umn/source/_static/images/en-us_image_0000001267350317.png deleted file mode 100644 index 806c94cdcfdd3d6eef2a9668455fd0cb2b38a553..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 391 zcmV;20eJq2P)P000*V1^@s6{^R5m0003_Nkl+b=R9w{BQfMRuqhMqhKR3j zla89`sz%*4(gk#y>$xmy*@v`{AmR$K1Tq|58%Qf#tS?Vn4)2e+1o|Tb0PK-BjpG3T zwn#I7N0kJMOTY$cQ`9RkJI9Pm0KnI~xkRN1lL>gdI-&4Tp!$L%zy=8t2*T_A1-a32 zr05c|l43D7B@BSw+to5@w*7?1EY=~A?ipGoZZ27;$)uCLkFp2yPUE>qxg~~# lCsLMu&YpU~{PCYrAm3NvqhNmXJSPAE002ovPDHLkV1oR%sHXq` diff --git a/umn/source/_static/images/en-us_image_0000001500905066.png b/umn/source/_static/images/en-us_image_0000001572300492.png similarity index 100% rename from umn/source/_static/images/en-us_image_0000001500905066.png rename to umn/source/_static/images/en-us_image_0000001572300492.png diff --git a/umn/source/_static/images/en-us_image_0000001503011070.png b/umn/source/_static/images/en-us_image_0000001626574358.png similarity index 100% rename from umn/source/_static/images/en-us_image_0000001503011070.png rename to umn/source/_static/images/en-us_image_0000001626574358.png diff --git a/umn/source/_static/images/en-us_image_0000001503011074.png b/umn/source/_static/images/en-us_image_0000001626574362.png similarity index 100% rename from umn/source/_static/images/en-us_image_0000001503011074.png rename to umn/source/_static/images/en-us_image_0000001626574362.png diff --git a/umn/source/_static/images/en-us_image_0000001503159042.png b/umn/source/_static/images/en-us_image_0000001626574366.png similarity index 100% rename from umn/source/_static/images/en-us_image_0000001503159042.png rename to umn/source/_static/images/en-us_image_0000001626574366.png diff --git a/umn/source/_static/images/en-us_image_0000001503170970.png b/umn/source/_static/images/en-us_image_0000001626574370.png similarity index 100% rename from umn/source/_static/images/en-us_image_0000001503170970.png rename to umn/source/_static/images/en-us_image_0000001626574370.png diff --git a/umn/source/_static/images/en-us_image_0000001503170974.png b/umn/source/_static/images/en-us_image_0000001626575750.png similarity index 100% rename from umn/source/_static/images/en-us_image_0000001503170974.png rename to umn/source/_static/images/en-us_image_0000001626575750.png diff --git a/umn/source/_static/images/en-us_image_0000001503318922.png b/umn/source/_static/images/en-us_image_0000001626576382.png similarity index 100% rename from umn/source/_static/images/en-us_image_0000001503318922.png rename to umn/source/_static/images/en-us_image_0000001626576382.png diff --git a/umn/source/_static/images/en-us_image_0000001503330854.png b/umn/source/_static/images/en-us_image_0000001626576858.png similarity index 100% rename from umn/source/_static/images/en-us_image_0000001503330854.png rename to umn/source/_static/images/en-us_image_0000001626576858.png diff --git a/umn/source/_static/images/en-us_image_0000001503330858.png b/umn/source/_static/images/en-us_image_0000001626578706.png similarity index 100% rename from umn/source/_static/images/en-us_image_0000001503330858.png rename to umn/source/_static/images/en-us_image_0000001626578706.png diff --git a/umn/source/_static/images/en-us_image_0000001503478818.png b/umn/source/_static/images/en-us_image_0000001626734158.png similarity index 100% rename from umn/source/_static/images/en-us_image_0000001503478818.png rename to umn/source/_static/images/en-us_image_0000001626734158.png diff --git a/umn/source/_static/images/en-us_image_0000001503490746.png b/umn/source/_static/images/en-us_image_0000001626734162.png similarity index 100% rename from umn/source/_static/images/en-us_image_0000001503490746.png rename to umn/source/_static/images/en-us_image_0000001626734162.png diff --git a/umn/source/_static/images/en-us_image_0000001503490750.png b/umn/source/_static/images/en-us_image_0000001626734166.png similarity index 100% rename from umn/source/_static/images/en-us_image_0000001503490750.png rename to umn/source/_static/images/en-us_image_0000001626734166.png diff --git a/umn/source/_static/images/en-us_image_0000001553650753.png b/umn/source/_static/images/en-us_image_0000001626734174.png similarity index 100% rename from umn/source/_static/images/en-us_image_0000001553650753.png rename to umn/source/_static/images/en-us_image_0000001626734174.png diff --git a/umn/source/_static/images/en-us_image_0000001553650757.png b/umn/source/_static/images/en-us_image_0000001626735566.png similarity index 100% rename from umn/source/_static/images/en-us_image_0000001553650757.png rename to umn/source/_static/images/en-us_image_0000001626735566.png diff --git a/umn/source/_static/images/en-us_image_0000001553770733.png b/umn/source/_static/images/en-us_image_0000001626735570.png similarity index 100% rename from umn/source/_static/images/en-us_image_0000001553770733.png rename to umn/source/_static/images/en-us_image_0000001626735570.png diff --git a/umn/source/_static/images/en-us_image_0000001553770737.png b/umn/source/_static/images/en-us_image_0000001626736198.png similarity index 100% rename from umn/source/_static/images/en-us_image_0000001553770737.png rename to umn/source/_static/images/en-us_image_0000001626736198.png diff --git a/umn/source/_static/images/en-us_image_0000001553930581.png b/umn/source/_static/images/en-us_image_0000001626736678.png similarity index 100% rename from umn/source/_static/images/en-us_image_0000001553930581.png rename to umn/source/_static/images/en-us_image_0000001626736678.png diff --git a/umn/source/_static/images/en-us_image_0000001554010645.png b/umn/source/_static/images/en-us_image_0000001626736794.png similarity index 100% rename from umn/source/_static/images/en-us_image_0000001554010645.png rename to umn/source/_static/images/en-us_image_0000001626736794.png diff --git a/umn/source/_static/images/en-us_image_0000001554010649.png b/umn/source/_static/images/en-us_image_0000001626738526.png similarity index 100% rename from umn/source/_static/images/en-us_image_0000001554010649.png rename to umn/source/_static/images/en-us_image_0000001626738526.png diff --git a/umn/source/_static/images/en-us_image_0000001626894086.png b/umn/source/_static/images/en-us_image_0000001626894086.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001626894090.png b/umn/source/_static/images/en-us_image_0000001626894090.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001626894094.png b/umn/source/_static/images/en-us_image_0000001626894094.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001626894098.png b/umn/source/_static/images/en-us_image_0000001626894098.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001626894106.png b/umn/source/_static/images/en-us_image_0000001626894106.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001626894110.png b/umn/source/_static/images/en-us_image_0000001626894110.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001626895486.png b/umn/source/_static/images/en-us_image_0000001626895486.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001626896590.png b/umn/source/_static/images/en-us_image_0000001626896590.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001626897562.png b/umn/source/_static/images/en-us_image_0000001626897562.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001627052380.png b/umn/source/_static/images/en-us_image_0000001627052380.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001627054054.png b/umn/source/_static/images/en-us_image_0000001627054054.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001627054058.png b/umn/source/_static/images/en-us_image_0000001627054058.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001627054062.png b/umn/source/_static/images/en-us_image_0000001627054062.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001627054082.png b/umn/source/_static/images/en-us_image_0000001627054082.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001627055450.png b/umn/source/_static/images/en-us_image_0000001627055450.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001627055454.png b/umn/source/_static/images/en-us_image_0000001627055454.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001627056086.png b/umn/source/_static/images/en-us_image_0000001627056086.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001627056574.png b/umn/source/_static/images/en-us_image_0000001627056574.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001627056686.png b/umn/source/_static/images/en-us_image_0000001627056686.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001627174280.png b/umn/source/_static/images/en-us_image_0000001627174280.png new file mode 100644 index 0000000000000000000000000000000000000000..39fad0065dcfc9aafd50ee82937d09a913802d1e GIT binary patch literal 356 zcmV-q0h|7bP)=pun&2Bk>n5L~(lVh5pJg5Y97JNW|}AqZcI z^oZ$QN-i{TF-Q{73fM zz5h$DuKr(i_s;(>C`zClJcfW&Ai3zz{}&H8{|~)_#V`Vfpcw?>Vlj*eL$DZxZrGLo z2f+c0873f=$NsIh}=9Won_LCDGovj?9+ Y0I~tk(id%VrT_o{07*qoM6N<$f*lE7ApigX literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001627493158.png b/umn/source/_static/images/en-us_image_0000001627493158.png new file mode 100644 index 0000000000000000000000000000000000000000..29a2351277718c1b8e42f9cce3ed9cb6ce174dc5 GIT binary patch literal 8699 zcmdU#WmKD8*XL6x(4uW|DA1N-rMP>cE!;qHcc*A6MFPPZ+-Y%l*Ww!7A-D%Zu?BYt z&Rl(-=bd*x&3v0RlMh*0>pJIT=bZiD=ePGxh_a##0WK9T2m~UK{pW)!2!!zj_?+_y z19(@@`SlhAdf6%aK~mjqVQI`i8esc~D--?rkHVM}&fX zE)FH}L7?Al!StLU(D%m=u|XhC-*ynlidjxh&cZyGfq~&Nzj}W6_!!sSy)l_w#uxHl(0*IRc%<|2sxmy^XQ> z%0-Ru-M`GWu-JHjqvS8K(#E)*G5pKQjK@B;wDc2!?Y|$BP)HWAj~RECMzAbbn3@t> z&vAJVfBm}^o>-57-7$U$tO*K#@pp%w{?8o(Nk5?gf!h1)@$ey8!TpJ4ch@AOr23j{ z(_c#CjFb~oZ-(15lbVukXf(Ce)l+Z9WmKi43=ASX{7idf;-aIY`HU3wD~gMY_ZJDy zmPw86<~qH5Fi1%^n#zLCm40Vs+6wHCR3?eeHA!f^DGddIx*y_)A0LN)Z#Qez1D_~p zsaRfq`MNU?t8Qoz1iylfm5HDeDx7VnC)~OqR>p8SP`^*=5e>rAaZHqOiW6O zhKh~7_s1ay8l>b26mA#Yjd(8?L()X*GVFPZ)NsPy%P38pe@Z_*8Qj2Q=D*;tC@NR< zz&rV3ATm~`V(L|dt45qNlJ*vxVAs~#gprNSz>E5u(}}(q|DF4WFp5Q9w#Y2V_4dk{ z&U`wdGpdgBV$p&r!DU9%%Rs9_Swo`;vG0`;v$Oig>GsdEt=MxJd}@EdQ&x%-+Q(*R z5l!QMzEH3!9Qu-;ZEvl4?KCNDrzI6z?=0>@%IPgDE0MU*yvN$PZ>JPQuEeyuBsyAc z^Jq~>4K?>k2y)|00PUFmq%_;{MP(Vel$)E|s*V-mFKVzS;bApOPNA{*&8CQBdoy4Ix@c7;o-Lm3Iw=Oot@dWNN;iugR+;LRs=*+U7CUoZ9{{! z60TDf)%jz=P;9QLRtIFGgSnNloz>xW$J#We--)`MT(mT&bp6ZCw5IFK^T_HzgJ~reRdEl2zA`3NJ;-fm?N!?A}29ya|frP z`573nB#bzCs^bCIdm?s5O<~7>Eo;6zf09tK+)$FAUz}U`gX?IgM!OpVP)%%$?LVH7M@7hs-pPEmw%$6-(u6^rvoHc~ z?;d=|&ZWi7$L7*BY(j}12O;9#+r#9D;nRb zfovb)o_?AZ1vRB|X?oj5!nN*lcDCuh!}Zx#rRltbUj5!J6K9~V%4LZG%xv`;YBY_j z&$22z+m{o`2^#zAmDX-$i-cT^LAkl7skJKzHn*8lGGKV9r%UDYz zt?jEt+z@#ijLsk3~IwEprsOd2A`k6F#)%x%b|3e+$@a z8BK>??8-V2n{{0}6%cLC%FF473UD$@TL1dCFBNwo&YZc-eFXacV%ye#yxg9;jpmw=PV5X( zF}W42t*I&9-dLpR{Lu5k5fKhMiVgnG)b?ReKkK; zR87z3D6p!H2!%^xUVlmxJzqEziKUAt`vU}PJqq4?yOn7rh?A0sHo@lFcGc=g8qQ*S z{}6|^O+9cKc*R87R?r#j}2DXKGc} z>j_%ljJ9N9fDYkPTE?-lu~&8r-s=}zSSOYvDLe{?PXp%)a*pF7X;+l8(`f9OBCm_C z*j(^2{W^!iL*+S=pP64S&X%gHs;{T932-d;ETLxhu8DhZYZhJ8L%B-|7zuM2?E+dx&>vq1~ z4b3j{;_%`QQwCV41(tesx~-`*@Fz_{QSn@5j<`7r?9l?&sdWaVHXTz0F&>L0NCDqD zZr>>H+?Axot00w)@w3~%8cMRBB3d&H9WRtirX%I2r_{v_$VjUe;6biE!ciLF12N~5 z#Sdmw9AF$IYl!I#4#j;GHtn3Qre!aijD9;qK36K%O386;+qKE+$0XerZ+FyCD)>W>nKmuqw-sv zjJ~I;8Jhwwsl7csG4UZ)5k9r>nAx7?z83}Wb4S-R?R{YI*e^;LRs%lvjJr#=%nxiuPFe@M z+;1<##vIY1s1)r#RAnQLSJACd?5(E?VV6@R^g%!rd&wa9|Z%8OQ z$jeXn=cnO4iuED<2UOx7aU^hA#8{3V6V*>qk2_!NCnSoYp}0uH5zMPI&qK~dclgz5 zxIk)>wQ|+4D>633Oc4DT*?b?2P02Ai(P*2Ko5W>*6R3c2cUZ*pqG;_L7Zcfm<=n20 zdb8kwlzkrJ;_LFC?1>0(7reJaZcX(kZ*Pws@xc#8&n(Qw;g8#gs!4OZ)`7r-qqt5?8KfxEvGMUL&{TrV*}OOs5|Y7z0sd)w-|A)1A=}D*7YOtp zdVd5Y4 z|Ll1X(FRVM4F=XC^;lGDYHRB*4uA}c?;Q0seWxCOceX@pls%RK8l>dbv`|vWjMvNv zB(D#tOconlB*c%l7Ik8P9Cp)M({*G77UYv6CUooaXXA%n9iIK`*WE<4VmU=w{NEa; zuhESuw`e`0-N_t1oMa&Z0V8QmX%$JsIgjr}H@;FbsM;{{xx{3OakcGPRaI335xxEU z+r;wn^Q7PMgKrrG$VHs0H8(a$Wg;`gzwMG>b#1D=|E!qtg5_n0K}c8$IvcAR(16-1 zq!htz(@-1Ow4h5T;lS~kk1uY$U^EIl%~8AZN8pRfqmUu8QBrd9sPIq`M{c*P*dyxt z-Sy#KgLs~I4?q{#4{^f<9FX=1(grJ}v%S3nrVVBkWtx8U(hh5pP)nuvp)-SK3>oW~2pA`ljnQ0-Utv6&xyM=0iX zuEZe_BvGO7akM&}eOaBGmp5m}5AQN~Z(~CxK)t!u3l}*%JCi1?KG$vQ>2Bx&c-;dt zQh8ll?`)~c-eEFd_*9oy51`aD>RZ&kuvcIDJGzSLREtJx`dt_Xh#=q{w8K(s59yPu zU>hSY);zX$3zghM)b3AZ(FnX|=6sdjjclS8_W0w!*GxoMz5jWpSAC9QmWF1FPQ=kN z;^a6yT!8o2SJxV^TgDh&p@I<9`g)o3v38ZQ>$~4a^E^zoUo2F;2vTQ8?XQ51$j?YT zjrC=cXv@qi`WbWk%)o$VzoJ3D%vJvnY}^N#S`^EyGk*Y^ao8J&5d(3cl~Pg(GFiBa z^g9Ho@z2Jed+&>Nz5phU2njZ4bK;7|8QWmI7goqmT7Y#1-jZ1*ebR`J zPT6LwPAA7qN*752AVDbC{Vb)(`SY*Zm198u#ipvMx!>%frQO{($zKi7u*rwB_Fpxe z=#ypCy0JWcU^AMQ7Eic(#Eg`H?*hXw9&&yYP=d-24Gl$#HItE$xo+8AP6l^$B3Xgz z#v>|J?j@j*pOHE1!26569UD#-#EI@n)XS;jQ6?A%^B|~AF z(fVj&-1<3nilF7GvKlcxvc2CsV{N@^#Pw)#PXv>UBhlW@T-ocWrNvVw!G$$pq=55x zdXU@Qs)e^96doSJ`(9RdOP8*VQmyY}A7gHQzKURo7u9^KAm#3AP3k$*XEBDny!4$q zWm7NL=a?X6x`zb#x;IwJU+D?XatlUr&hG`IGecU8WRFIqiM%(R0E-~?%jaGS$yOo@ zY^usXP}qUR#m8IKKGGli%BqZ>J#h=~H123gdiLy@CyLWb!c!QXc{H?XGN6=kFz59* zRqI}lHIw`-HUnUw>L)qxI{Q9vC9Uh08;lGEgn=g8DuDEQNVpRaqgWJSZuxA$F#Ao4ZyeS>^F5 zDfM2n&>tlNd3kvS3X~%D$J$7~v3LI1IDoz(O$zbsNwzZ!u~Hj1JwI-7BIV`fRZiIr z1ydL&mN!)UBkU3ANx$)&z)u;%imFnk=+>^!qXyZqg&aK;;F%@G#g9CEK<_Y*NilL7 z8qB-?hyfy^6o?FgLJxVpq2_VWHmY^<_|No6dF zGM>#Pp{@H7w-_UPQE93E+(%EWsw!@PQIiEGNzVfxQDWqfO-%5_>4Z+GMt35A_^7K_ zo#2I@I#cJ6O&!zBd^naavl`@?5umV@#C1dD+PmtIQqO8q~zbdzw zZKa1a33mmaqSBa6X*9bBi>Mz;v)yFUSx))tZr76WHxF8-FU1qE+Z5k7y^!k`E)9-T z6L=J^d+}6axDcy$3d{z;ek=Ng-9}ZT=j6xIuF!uQ8bEjS*8q91+10h?W{fa;AbfUY^0|gQf zs@?o)kRmDTzgKY-w?GbC>B+ z@l7aS6WSJ)S4Gp1#vF<>p}TM#ml$=`!x|bIUa;B;)~>Iw&zCzB&27-L4ER*P>>^Bw zyY;><$8>ZIX}<9i1YeF{qxNAzcOn>@G1-ML4pwX&Oc$koJZr^$7)XJUqiJ(yl5ZCr zsi3Z5VeuJNXNw3;e!I8bx5CBEJ@Lo>6Vd_}rSy;W(xA4Klqjo6P^TYRNO)vH2F*eW z*K)4IWMc8`u{FV#b%mi`VtuxM&RogWVOC4as;qiyQ6<#X4Bowt5)x{RWuLwd{%U(! z+TdRRl=W!X5I}fVspsRjD@T0L`$5W|s(aVs>4(I2`m9uZ$I3{M+OhHZ(s+KBik{N?rY~t;4N|57uWXXM4_f`Tg+*Djw)WtIQTIw#px`}3%yeGdq_v; zATCbF5Bv1S+W%~N2RzAx98TsE=cs76-$o$U5T5yOu* zNFs#q(#W`*Ni>heKv?JN=g0^p_P1~H+l}vNqzLFNnPwwSCx=`Mvf3b(9`wQ7ouC2?U*wwlX!*Z1Ux(di~paU0#&mj;j<{gCN-9UmKecxSMk37v|* zT8*n%7H?B1&$zW;!tg^{vX>+O{3*L@f?S`a3}^Y_uqQjbUwZ%JS@Fs7d4VJky2zbc zjp;gokHfe92{9+9)jX?~gG5MpiiqvA+dS4ctjleqc{z%54quGzju9fZR~LWa&Mdn7 zLDH$h9@YcCNmuX`Ra#|%dIPKXGMVW2T?dOE=FRPa0@!Y!1)X>C`Eq2}r0>R{9YR;O zx#gCocFMY%w3MVujqSIbldYlQAp$nzEg_0*cUb}^SlD9uIkSuly6SilE3^SJMa-uaDX)!4p>I*th9XLJ|;IzWt$92c_i(f!{ zJh>g%Qs6)E!6Zp;5cn+!LlqXW-Pl8h3;Z78;tP{3)S~-agknmTqXtvIE5uj#trDv; zi&$R^CCxUPiCpQZs$RW*qo|@X-Vz~Orl^9u!^)y)W@BwyxYY1-?p|6Re(D^frn+UU zpb>D!yJ69rGE7Kj9~+yP-bFq$E4bV+5UR=+me9W%iH|V+W++073ZbYP8scKA;8iWwwqF*oIA*eIGPwvUehd z?x6&CreIofmB0T(REnI|xPNAY6>!*Lk9eM0G;ak_JxkIjLJjO498#XaM&V4cU*3>j6R9+4U#&6!R3VSXL ztMe?yfy^BMddB z+zu$6RAZxM@rH7;_k3?U;GjR*gD|JC!T;E25cq-cZUTH^TB5MvbP?OC+}sa3?w55m z&{$?(Ch#k;d}wG`Mqd6n)dfZo;X|TupenDUqqERL&cQQbXi>vwE9+M*To90Wi1B`R za$0cyz)8frDSyY&Ej%(Z-@m~PBAsvH!SfO85(q*{88EBma)O;^I+NhrgWabeX{ITN z6F$&0u_?GnYR)~enTH)P)1U}$kA0r1)VF6AB$Vp|Q4~p45T&xd-DrK<-?7x>N|Nhe zfdPHVXl(pJGz11&`%)%NvH0=XGc_xI$P-U-e?l#$2)drV9~|vg1bvFBF+ZMU2zpOtK7c)3)bSOVFHGznuGgtSY?$Zi zc{M3OBjH9CEh{4&EG)9~y_e}hk6&VAqaZ$m_;M>iQz!KVaTLOmp6ZYc3bO~$T`mD;%s(t7EG^c+vVOM~=o zeKNQmYbt+=AIP}@&!LTg{)u}dGq+OP-42;w@w12UBo-EyE>>QTeQ#Z=cKQ|*oeobI zf?hw);u{;+M3=|kiD07ONfVzcLSBgM$h6>*|0SlvjgjT3{h&atd(=C(kbe`EbY?pM zjFH$_lMjwllZZEslQiSv(sIi4k7sL}r!jL%TW%&cQU*p<$w$%{IXL=KaO(H{#oZ_* zJGwkP2oLaqa~A}9*?rC|Z^S)scB8R)wm5CVeAglVl*586q z!~6$A;T?Wg{`$?tG%>%vBAx%#3#y}YJQG#I#zH*V#9N!2!FyxX9tz7O|7GCV^8h>|i1Dx2G(J?8XZBewpY%!N-`#nGW zn;TF3mbTdRCAxtzobC^E`xG&{flwK@^Zfes14R00{)J`aD(iBjtfCLc{5D<|j5W0YXARXyaq(gvE10hNk6;XNzrFW!v1f&ys z@1eIqfIw)0v)p^1J@y!9?>o-@bnlmpWUe{pdNS8je*b5#P<1s$axz9T5C}xB^y0ZD z2y~SO_?|&>75J1^y|)7bvCb(ym(li`!pwR@w9hVyv0Z8&ybm;=-{769;2Ub3amuI5 zb<$K~eSY7NMrmp(%eYFlr*P(|R`~`OjiW(%EJEb8!F~tY2>Z6x`!Z$^elcjV`fRP& zJN4wazHg1k4tuzzM+e-En*0_R1o}nOat#E!Bj*K-SddVHKyPlMuYf?GSs@_MJN`go z5a>xT7P!{_x5;;a$!U_^{d`{|B53I8`2>A{fjnDpEo9pW9+dG;bku@AP zZ!fMFl?g4i??=<~4IAC1f5h3TS4spdDUHD0Lu+7ToR_{}YEGJ!zDyiHPrP3C`R4RL zR!LbzQNj%mm*4!cVpBlPuY3?HU(AvT$v1Z``D4hT(K#U_?dub`SzTwTMTm!v5gA~$ zI?|;G_PpcwkbNY${cTaI-qk;Yul7t>v#b96r1jMmozxMYTH%menD?W%gA4{ckVGoc(^G5d z=%6L<=%1^GR#$ticyeEAXJ%%O7j*(O6DhwBzY4Ke{lGoiTedPTD(hC73ms#_KI zGd3w{Vd5T`&^uBd$7CJsxEMGAhkMDO&(NlP$<6IyYpbd0dORn`p(gLb;jugAU9?i} zWGsf6M8;Ki_;&O4VCXahqbBQD6Bv`l84fomgDS&@wiI>ltZ%vRj@hn%z0#h1lbxNt z2P&takX5%DR?WIaOlyTSIgTDbKbRSM9CDejzd&N=vDbb$Atc zaAL@1TMzQgODr5LN&`Fsp{?wYkS|}xg56VSsOqV?DJi*>lrDdv6vLB`4m}vG#H6>0 zncte3X)Je@`E3cmU0WV7G@wm1PS`)@YDkfSwnKV0&M3i!4v(a<4TRWft$Qp)uHS7CJ45pQ~YdWn4M^ zF>|F~+@)n{#x%A8lGOf1xTm|X#_OcEcwWKVyJkTeD%UCu#Of`HQF^e0@R^D4;$EaR zpGj@ej~_hq>W`1+0#atf2)??)np&bv?i)kV>n0L)2^5>25@J@06OAF^V6F1?@_`>0 z@G)FyZK0djxB{XapO9wp&H5ohtlezGe;)yl$8b@DXHY$SoD&t|<_N6EQXli!X_3QJ zhD-e9L}n(3S_(|RBFk`G?Lx9hP%fTwkv!bRB1Eg|;<)P|lOkUdc|mn|eYB=*u&V8n z8C>qjUu6-V`b>pi&OMAl$gO%ZtvzhyVp1bBlaeLtZrHiN<~gl_Axq?rl^pSAmD9=! z({FOhpG4$Tkr9*^xAoQ4pV$T3&d*8Y{7P_A0jY;;Yk2`F=+XrjH9vK0v%otW)*`2> z^Hy_CDsH?I;T+}z5&=zXKkf4BDuiE!{a7b@b5lD+tH zw5uhg$S5O{_ANt`r-9fUKdFhwZMTb?e4kWSR;GA<7mqWRGM{)89(@!Y4&j7Muy40^ zsA(w97ZqNJnTqf_qMou*GU{mvI!%K6>LQAa#cJ!Os>bY?k?f+k%flWs?#rLa~dLvnJbA;>+J1qbxS2K8Ne)(zCWsK8DQf+6$efu=!Q@$uq+0IkNS74FCizZ}H*So|+doMadtWJ|rY6j~_w9#& zeNoYu5IqnFWQuX!+lv@*dZ;abbW8fa4^S8Vf>ZsPeQ}-Nx$ipmrPRG3%%)vwkeFr8 zwcv%J0z@D&JSi%~vm*@`%!o6^amXJ>e3fj7K5Erc;(3VP+Z(o~uM&zaR?u3L^y|f9 z8$xV^rycM4NPn@Np-Qb;29=d*^aQ$Hpi5Fg8TWWV{WzpSu zd7zHVXm@m`TZ9}nCwlJ8A}yPtW$Q2W4GffjVL5quC15*0BJ(}ZJRGl%RomLxY5(mp z*xEudNxD+Lak4BTImlh(c|~x2eu4z7bhKXo(IZ;V;Th~}2gk`KXz{DmVT+|5#q--r zObaV$8)3JF++n0kD_c|ASAmkWUZ$rxENc!-XV=_;WGqk}tQ8J9N?Lg^oyr1S9aSS~MZ%;dfOM0SG@ z*_`AP|J%(O=_zt%Kknq($|k_=liQl7S3Gp}eD>^UrQ~-4GbwO1cTLZFIybUC8tGg75iQe9ccCBuo=>z=EsOrrs%vI@%{4dxAa43Fz zu+6#x22%|i8X79oh)ps^0B93K8Sa06b@NO5W1|&}Sr6yq$5~)x*k$`eRYo9kz>u8c zg5Jyhd*a-NI;zq5AZeNxF=X3`h5==x9eZ z&YRFy47H|u1QoA++#0Nc)L*qJSZbIG#qU_otwD&61V|_MeEN+37-O!aFYdT^@>7=F zspu51nCrRQ33kB=92VjjIWLN&8F(7(PuJ0yK$!EcSv$lY}>OX7{Bd&~N_tn1gWmvh^Q=L$ah zY9)zSt$%%upE33`gAi_`jJ`+D>!HL;+o=rx>z`}kOM!ukg8mGm<{z^A;X5#};7b>G zd>sP}uNYnf0-bA15uCU;3j(e}>fD5XeEZA2bYyhsIVmaWX3)|S_4J+f>!)=hPBR}w zAQ_n%J2PRPZhP?LqZq5KK15h-k8_#KN`L>r-to~uLmmD?CV*+@`KCwqtHdWj(n|k^ zyjV-+U>N9Mt`Z%tvDHH#he`&uuW0Ql2ANrbDZJNqrQA8n zd8M2_z3`)AemHzACnJ+G>|-YceaOzU?j>nmjDaSj;nL zc{kb8%1Qzeb9yvO%-AhxJCu{I;X_NyKJ_`4Z+NcJr#LI?$Fy?Dn7-A44XF9#*_@(C zwGQW_&U|~pl@$JTE*43@4EiY8+lw8(L{!$-^zf{=8(KEvwx4AK;+`7bp-+`QxZ}B# zHiw%IYlF@;hKJRqMkaD_aSe{82?cTPTB&2IcH4(F$yb)e?o^HrjhzE&IaO0#{l#@x z;dhd;x)I6AY;0_^Mr8~|N!O&^TQ1lB&noCYG5^1nO#k0cR#ffo>6xz<-5!c=dTW`X zC&q^{pLzdqF05g<&cnjY?3!T(So2kn;pZ6=q%?ot0nY;?YsGFjrS% z+?J@zIf=eLLjsx*^6HH3{_bzdv~hT$L2rtvMz;Jx!W`4+M~^`uN&rzNfZ~w!PS~t^ z{CgZ06qpg1UzgfCbe)C>sP^;qv?|419KPqm>a{ufBBW%K-{;D^ew!-z6p}JNErHHU zN^t76;KBQ@p4yt41se&Vw8mRgol8T}Oq7wSy{Q(DA3s)rN+HzdOD%T&YgTQc^QmFA z=5?K#FAJJ?2px?1xt|%{p0230pMF&@Vh1Uw1_Jwj0L?I9~zf5Xs&Eimas53}fSjT}&<90`7C>lg*)1zILS{+9K8;HWsUqLCe0ZHezw|Hp2B^nVyK(wZ#Z=!UY08ur+}F(8oOOzBTlX=?)Fp1y5CM6do_`)1Bp5rWc9l7}A>yL5VVZvinWz#~s!k zhsXgzI;s#y-)mcb8zC?TzxdqyxnLd-PLZ-s_~8!`fvl4t4vr)Oh>x7?)97#22N1FI zmJ8X}`d++!yH@Q}RAvm>m1$}H+{<&o)r1Yc!T~8jmQB_=HvnWj>(m_wl=~k zuD7piV{q1MX5CDvLGO=yTY0IoFxGE)GQO^d6OOuuwfpqB$ijix)6t2xUFLV4_$B#p zHiwd&jFd^pS3Mc*UDBA!Gc;h65ElnAJ14n@keI_BpR>=lp~lCoF0y#dgm0`>j@j$` z?e+HZSc}ZBs1$PDsUGJ|Y4VDXj&}qQ-s%sj?NL_7@o&g1rjLy1(P$U!vZcs{0EuOYcjWA)s>sJWtL$bOtCoYHDsk92~Xc?P=|rzObAC z!GfCh@GdBS<#&#g{_WDQ(*x+qEQnvF3oIwL&caH!68Y<46>ZPRh_=5-P$mBWlaug= zQbnMejls}E75U>9y3eLMyE{j4kFUHtmF?{Jejw?4w-H|gA8x;~s=784VJHdd?9qdc zIZp7qoI6LR82@f-19YCU@`SQ7nNWjB+;^0Rv&rmqhB)(KS!1etslhTQJG)Zxq2X4o z*mPcQo~5Ow(^M_@=J{JCrLOp4jy}QE&N?E-w1G6%J+smntFla$Ri;XTw0EN3VvpR$ zWt5aiKbj@V!))&(6s>-= zTmc<^_}a?G$A`q6Vv@xxnFP9{1TtH&_n`BLi3RE!e=CfqM{8+J&?i33-s>LNG=$KN*`L0{Q^?cP+vHclB*y_*1McsS+2^#uI8_ zz5E&z^VA`GUe>TIWjrD|GWJ_M$|`ou?e^s@dU`EgP4%y_`D+y;mBJ56WTvt?WxTK( zxJi|V5}yGmwu8%Ed`n4TV5SxaA_H#HlV6ViNJh@i{@cFx1Cl1Tq^uNHA(%LJU|?s+ zL>+h!qZM@za_lC!Kf`B%vV(I6mMQ(vR@v;SQf1^C$E{xWguG%9n_@hyk1?2N|BKap z1xt)>&Ni5U-vaXtZaT~7{@;yn+3@D_nQWEYm{^(fI#~GM`ssQcfL+kyb&w#T)J?|x zS+GzXZ)0frZDm2ev?x{UXbIv-2 z>C$y~-vsC7Rbn|!Z&dsMM2W0$$ja)9NL1vZo9760cGGDaF<-%Sg@Idn`^$u0-vG$Lj1(Eb|AN)_lS2-^%uf2AFJGNb$7(>r(T@Bp?+*TX_r}blh z)zt8$o7O0Hy&}SG$$ttAV#%04s42@PWT;Y^^9t?({kIfCh@RNA=9I=hf|rm0WVy|q zwGuZO6=qD2UOIH{W9InE8O`_c`(7c5xOF8fD_y-Mib>I$kprMj*vxsrS-W$}&iiR~dX zxw9K9!zVTpZbk~M=uJzNCR!XfW_@v`q}QM-nu74b|G9BPSM^|PwZMEWHT_-(DIcYx zeth0Vp7xq8_ng6m!_m~CArbldY=gb^&duE1V&C%sLcOtVaL22Z-SB6tmQ6Vy=cDdb zkW8TI=woMUnTiL?UGih5a7Sv}*BESVTaQkCi@)l?&>Dn_YWQC-Pv2S+rwgwjwGa7l zQi(CngvPaS7}A(mV6eA*ew%@sTb~TwOy%S?Ac8nNEoA#`DaDpviA-(+q|4du)?l8> z%BZhjvHuD;3=EY*0?hZKW(~c0uXxLkXv%ue`LR+`Mb<#WrkJXqJED6aRzxCKM-BbdNfQb3xm%CDBmS~4$IusXE zj&+r>B^NupH`~J_1DxY@P)z-|U*fGP*E(`65`=AECR2njE}FlZPXi<+1$ZJmE$xYy zR!(*G9T5m{9^r{Ms+xdPqz~5#(SmXCJVltO%$%0uesr&R`DLVuID0T3mc2WMd zbyK*iVvdQE2M)UO3Gi>(n}7O3!49*IglU`=g=rO3J=)wWQN6%vm^$H|xOz zc3A0q^LvLYTXG?<_(~JHe0-b9DHGn;$st0~En-S*{xE^)# z89d=epEX|(B4)l1@NK_ciucLdn|!rj6tQ!XuMjoeu-Q61%T$%nz}Qg6?O@EJx1a=2 zF@c8nrZbX3#D8!Fl_2IQU(9S=ugg<4I5=odxa9mOEcwhb`%|Q2xE{ zStX@C>v7F0F(ZwhUP+|e1sT7#S(aI%gv(e^FnXV_os&=khc*GH z_?!bhN4mb4nA7oRX%SejeL;8R^W{?ZgA_@h=C0s~hzLT6n)*0YID-Y+)J0CY`MN5E z`Ht08F>vfPgH1!9w4>^*`jcLe<2Aa6fnAw=-T#r1D z#=mUI$##VE3+z~OzG(0dA*M%Mf8RV^>$dYGEmcWFV{eQZ&B(Y(-5!?acrlsyAj-go zW@U*U0v}Nqdz8V#EafdMbf|N%%BUYd8AGRKtL*3ZJ{(!n_E{+j<|b7^cSYQ2>XP4c zu|jZEH2F<(ltjd zr__eiOuz}O7rCPgNWXGXFjWB}%H#JML5>e5;U33*lNRE(B7uK9_rGVLv0F8ViN z-{_2#!wr7wH7G!Gp0AbKEGJ5K`|Jo_Mzu5=1 zbP*83(QjmA?zqP;5lIb>Et*+C6%H8RPCC2Y6Ub1A{`H;O+?+g14J_{FY9!qmGVU~M`LTc?{MBJ`MeZmO91Os@y#f)FtY506yRW?j^ISC6hhC6k#zL&3DkTLgL(rC|4{d*z#X)H(y+MngxNEb4Qz zS2iMlVBOu_jkRixw&xdtwrP;;Ns|2*Zv{@&JTRi?ytb|fM_@=JkXOa($;e0(C15{H z^6C1uOfjE6WQ?w^tPw+}+G-y4`JgN&1}-${i-1#s@=iP5Q5JE|;=l9Kj@#dPNf?j` zr*YaI!T?A8ovCiG!oYz4((}zf^LzA>C}l`fQ^LosGVX#qNakb>Vk0f)CB6HtmAI?> zMcG9%dDLHm{u`4Gu**h?YWr1_gR~bm1zBRlzW#n&F#rN5R_y}k@A{RNbBQ9mt$60H z-d;^Do$rIex-jy*Eg)KE&%S7?=jL$^cQ5U*mo|nF^WG^Hn&~VFyT?&%XSOBdRkEoT z!u_-&!`gC6tbk&=wz4;O^{Jg10K6ZfTT{i(1HDoI;6%2+apGxjo1QJSa5X`%@y)+5 z;6JdGdBa)0AcpL6>(@WmUPe*JYHl0>S4Ds8QH!o0PRy_0JOh2 mqhbGFy%X`j7C;l1SE_aouDOSbp8+pbfRyCbo)^i!@&7Np{wK}= literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001627744152.png b/umn/source/_static/images/en-us_image_0000001627744152.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001650535960.png b/umn/source/_static/images/en-us_image_0000001650535960.png new file mode 100644 index 0000000000000000000000000000000000000000..6306214db506a44b907362c4a860b77263f601f4 GIT binary patch literal 36622 zcmaHS1yogA8|_g91f)Z{lr9CNLrIbD2Bo{Z6%Zr^q#LBWn?rYZcXvt0TX_HbzwvU6 zdxv`*&OUpuwZ5Elem`WSM3E8k5g`x=ve-uZ7VH z1cK7~`2Ukm%WORegcKqs^g+QXVQ=110n6}Z)AHgTqhcH^nycU*k(sP+D8q2u6dleU zL&rjJT$>g;E57SqPI3c5$rq-#=Ww(stQq?UZk{Ow>?z;UglYyk6IuuAZ8rysZ)`3S z;RK$O`Jj=v%8W3p&}fefr^~2* zoK;Ua18WIkE2&a7OL^NhGwWnYa)Jrm@SIF;vmy|B;$b4Jxb8?gJNiCLArgVg<%lI9 zjdFBBQV|c;2}W(H5>Zm>Tt*6Nf%4Bg+iT@r(j8{u$SR^diT!G%P@AyTe7zRX=t;L< zgfoe+3j0fh;@K-jsWYX*dMV=n+#{!X>s})@uI1iElk&_;TGj|_D?Q<(WKgNNf+0oH z-FtM{flhk(zi5z;7rPTWij>eBBjj5JD__%=akI|B(b zbH&@g%MjYhFj*@avw0VBfS?R{seqrfm1E`_5gGkQ5h{bl1{qf3I)SrOByJSrdEBVy z$2K(hS9Fb174*AB6U9y~@rAc~()zEg@QMRR%Tnf^R;W4ikFQ9s{HohsI)E?sCah9S~R4Kbfeu&)Or zN&NG`P`yBCmY*Zl6L&E}BG#v!GE;t^@S5!-9}!>BjwVnLmZcW zPa4Gq>54b_SF*B3>D1-OXR=CADZ;-y8rEf3VVUs66Z-^aR(c`pE)Wr#^;C?fFFwDt z(Zp4_H4&5d7hjS3<&$UE)Cg3Eqr_8%xqW#YqV`VnD*wEU@v(BVazQ}P%l9!-((%ek z+F2Oc&L57I9a7aa(|_*zgfjCdhFrO80;Zmq2IA=r= zT-W6gzrN4#lx8fGv4{Tze=d{xTR&X%hWblD3l?l`hQ7vM*9;PocWX3(AA`m4YNt{C zC`l^gt0T>H0BJH!ic?Hqu`l&wzA%4nQoIJA^4VDX-R7+SUk43CH_B&KfX!F9WEm3u z@v&Qg>W2116EDW$spzqNZibflHYRVRq9xt1d}5@P0*Y~DoBcnwIyMS%hWu*l%+C-> zK}?2G@%_0eB(3kLMs;CHtD%HJ!bJ7gakRWgY!133q8WOAZEN6MJ7t)q`n`Q)2LBAM zbqjx}ylYnSBv#e0St*ao%KGs2>Fw=pALEvu!^kdLm5&Yea zWs4O2l**e-DY?{_Fdsv7u{O#(ZNQSf+0a2#yl;?qw@x+r(No&|)~3n61T&I_ms+5u z`!%qSaOOp;I1-<5eUQ328xZ>Ydv_U6jLy%#1^afAEw2xre|)LV*cy8yQ}o%zko<4B z@EEG1RwF9mA4gbd;q8g7x=XITw4COmT*oJf+QRGbyr5v))H{$=j~aFXv#4>d*`M zzjgSgW@xO_`8fIVqrx8P=doqyny}qn{~=(#&&NY>;Z3ZsldaQ&*uu!A~T4!?34{*R(hU>ZSZcFs(1mRHI(yhJ-w6;`RE$g_LhoA}6V{?&^ zB$s%2cw{0}oCtpHd*flbB8-E1(OdYE=@7jJhrsB$D=Ecg&N>}VFc(8RX^9^XxMH*z{8-3fqD!|rp zGcnvJb?YH0u66mLt?#!B@rp?y2y;7+Hu&TvFp)L)v%ZbtVPeXhiO=);@;UkoX<{Jx6=*+4el<%a?`*gR#;_4X#tOv+{*z zc)7|q&j|?PtD^J40tEwdb60S+|~)t+sKbb^qCghY6CSXkH#BEIlzWc<;_baunR zM9=1H#}nbe309+9yitR`79&>A^Y!Ic(HwOSXHeups2D~ z{L-E~4tX?%dgs$(=TflRNq6uNdpk4(tR4pqwQ(+ujQSpw`b|b|m^&WiURo;kkr{hDKke-*;c@JttC_ zn+pnXr;4hoY^jhnq~#TPR|FONbg6-G)~M`nfB4X39yWEp4@HKH_b}y_lW?YVbolSg zywZlP4(2$^9O^FiGUPG>uo&c?!NbGHy)*AwXtk$%vAVKG)ouv%OhD@XXggyMgOjk77O*l$y&Tq#TLlI0aym-b5}GAT3{D*46808 z9)r?=;@L@>M?l+2L^x8E6F;glAQpo`iEwBm?Tdyc3?+47BU0u0#banePh50>#($jTE z9Nw06SN;eNT>a1mbFwDJr4y^s_|9~KR61!6Bn5nSldhW6mvZ$D0?)(L9%Ijl@P&ou zrTr~s(4-ra&j;;L!_AE+n(+?#wHEGjofSHRIxGCr zKw_O6uNlYP^?4@93Mi~@Bh+!&e-Dyi%eL~`KY6?+pPD9 zH9v)&YSe`X2MF%CuhOTZNYZ+7LSGpfiLIEY^ksY}**`RNGg{lTb$}6*nAo?*ewWRY z7!i_U(2q~ZaY+So%I0vosM*XJ%b%TzCm2jdIa}*jEriL+SxS;9B%D3lEQUV<19k7d z2P@>rasJ^}1YPLI=mi82^pm=>sW%vp)@Leq!Mlyt>LZQrtAMDvF;Ou40-vXCjL+3U z8APD&iGA)PYK@q0uv%{K@0G>BbH7{*C1*H#V8io7Mj$xJ_U^Lik)ZYq;2Sjn}l=WIj%lN%ITR zC^z6V@m(Aa($EBMmAkwCRu<{-29~e~h%29T|<_rKpC6o7x(A8+>z54+ik8 zs@jmwW7=Wsj;dM|aKi(#gAzWoDy=2q=Jx(wM}zh8%a<>ug%rjJs9v}EwV>ZrY26BU z;yI%+w1WlcVa3u{7~_Z!T>S+xy56rLko>KI@%;anO#a`L{&)fT?_xd%@c(C3Nk@+t z&%?fU{ktzmd*>eiUH*SB{(I~HXCENWEq;$%Dg^iX@f{y8(pKVUIATy*GP2gOH&x+IMDwBwK1Ayymr`PsS0>RNHpKaV8;_u2oK1OA_f z^Y1DBUyeM^P|)k|UaquKz4H8LSDVUaZ^VxOc6MQ3KR#ZpBqG+3wB@9GQpVnMaE0@; z<$v@G^665s;`bJDK;ug!zUSxgJ z^`XZ}@m>7=nl)=D%6^9I={b#B^01L!XVLESDJYCWgrs>R}TAPS$@$f(kiwuuJ=YCUuXyU z`N3<}xj>8O6F6;aY}OH#l$6>!sbo^#d&IFnd;=dgvfh{IcB+=>P%ttw1`%=+3d_nR z5H#K2!DlPxQN}Xse>%QL7r0G-$Ud~P>gfxEsZ+T~XVMOizgM$n)aK~DTjI{4wb3$+ zWlzl&v5SfdO4{)Q8Od)tg0uJ()#RN~)NgY;h1a%}$g8Ig^VG^YT#%|lO)14?_(Kl@ zUnc@)vtxLflC+nJ+>YdYd`WM0J7nvftUpD$HK3l=+V38p<^RlGu{>OGS18oDO2lSg zUS7^uuX=3GghWIdO5Nkx3UU;3FmiKkmYO~^UKucBQiV{dSDG1|fT#X3t4%<~YIL+hH@R}FI{Fq+6>YkK5 z^uK0;8$Zu7nSv<3JW>;3cfb;KB$|3#>wpJQP1H0#WO-h2knBkowj3HxZ_9s)GV7`7 zmzzr+AmEqe-MtY`k_uIKSnWJ5(^Kfl@+Hn3^u)gh!B*VcZ;iAb126Z-< z^S!SJ#+$XS7Z!|~*YQ-+NlW|lKUUfUQkIShzg9L!HaJ^4NF?0=-Be7?Wl zW!f3f3rt=lKXc&)J?}<8f0o_$h}nE?u)qIvwMw%mO?|OtSC^~!zZldvGHyhlhcO>p zm+alT!$jszK3N)^SAXtml`Ol+^qPz;X;#h69k++!#RJ=Lnmm(y2rpb{ zd(X^wXL%8;y(MBqoU1JDI@?v+uYTumjrQzh6e&>;C8q;O!p1pokg9I>ex$P+O>j*+ zJ6dS9raNsb>je;ZUgE^+)^ zi6MTe7c^QO5#N)m^j8r*E6ubd2gxvpjO~N=Mw6~3F;Pd6jtd`wpo@!(=oQqZA}FKv zg#}v1r^vR?Z{E0`Yg}I(ir(K|aoACN`6Aunay#@PMO)5QqeJh`33NMxT3TAZ#j{&t zprJLzyiEtCUf3(q)%A7XvQz$7Diq>TDOO)l%XCVuS4CLOukj#{g?rl%OebdwhlH!s z%`DBjO3*rn2?ye^*k)d(Cg}Gn$v{1Ldw$XMrwTqXn<IFik_3b4Bu)g=lEA4ObgI^G^Jp*nrU*{Oh?Z}rQo|S(p zY4Px!Ow0V>7rKw{T$V|{boPbnN)G*|6mf=Ja4mJfw~P$zN5`4V(N!pvWfFdSI9K1Z zx<##Y*$*K-@768Vvvpp#A-nLNI`35r5`h_(4O3B5i{0Qf9Q+z=zEacB-s@t0(}7*K za#&29xE@Kop?s5a2O7T{qC=c5H%jJaa>`m*&uan6wqjNigJVH?fTW7R1b>? zv-FFCE^1;T(|u{_mv6SesNC%jyRg(iXu4>q^}(DoXaw*$ZJvRiO#|vdq^?eIvN;I< ze!VABrT!8=EuAEbGF0L@saqWT_dZY=sG|CrSU|9tJcB-@biAKt^Wi z?@i|ChqMP^Qvj4uA}b0C6%!g+hHM!t0a1sw0h zgwkBSbKusN(d{kH6Ew_IpM2FaN@EgC%+~M7@xcE?vqsVJ<8GI6$%JOMx!stRnG$t7 zEqC7nbGGMt0S6=E-8?3eH=dUAyBdcXKUi-dJa|EnDw8&vWK%lB+3%qGB}03LE!Ff@ zXQtjP-kFQtL+!^_BUZVzd@5~+y{n!-gfnHq;+s;#=1tU)J)%V1tHdHzf~o}PYL{)d z6WBu}2ch!>XIz&4N9S-zDNAeg~VdQsP8O8{5}nCGX~EW=EnKOJAHJkm!zb zhn+30uZw}Q0+-$5spH`Sg(wR93%FC%(llz&AY%Dqd8P!5M1mwbnkv{+r~>036r|T3 zP7=#=MX#Q{UW-TNzrbU@%-CnQyvGBL9hZYyC!KdGcKQE1y2!f!2@9NhFvW%djA~4x#rlfa?5r)S4k_vhp5YAH^(pyabN|Q*lOwAMLS)4JHb{db{*O<>#^LUy}89_RX)w>|DbfW>LP(R?6>N7F4t&- zj3rD)zs83W5^HVM*O%@`2GM}Jg}B(iK_Usv_;w#6i+Cgkzc;U4$?c=CdvmFR83_p@Q>U0eIz=`v`l$(fnMfjPyxH!_@-kyJO@cKxG_+zal*7)R!Uw1q^)5OFCIP+0X576F! z=?qC^HJ!ln>I@~xn%dQ2Ena`JC=j)y0E+()OgXSbjl`#lhy=yI~}&xb`L z8xp$f`Khacv;$=;D6#@MNzqg;-wqb?DJrik=-9h^XD^^Ekl^^(8iK{N+I{d~ZZI;G z#Co_SxXCA|T4%=>kd`vOeOWK5jQFriSnJ7jDpoep7sv4|i+%u$N&boV2UIWlC^Met zjjd-T-u^$FzZs6lVKJzpcz*~@Ove=8@CbBV{4#dC#$ph3gJ>Erp`xZb?7n0Kd`n`t z&i)ROAnIoM7X`s8bO-VMMn2;U!c+I~yD-i?mOBxN<>+_fm+M&>Dk^F^hd*Occ;RIW zqy(e-lY81(zE-dI1j+LrGP_=HS z)WKYhE>|0fc2ZBDhP(mA1fzCiU#WiYTihTHF0P@BK=#7I!ns;|ByDZ}xw+B^I%P&s zZggE9>snh`Ek$d4=np3Gt_^B?-QV4ubdo&iZVqTp&CKW+8+Us>xdZma+Pl0rZA-6p z3j@M!5boQc@w~~Si$%}Xoj4*xLqkF$A|n7CcwBx#m@Ha+pDtTmTAC^T(z4XhaeXKi zqEw*PpYj35+N!v7&=MUTeHr8x*$NYEd^WS6dzB;{R$k)Kj9EuYOg~^XW0^CqRsshl zVHc*$3{@*kkbkPYuQDDD&}k1izPlKe*u2$jaKQ%a0CszHmfutaz5kw^%v4fRB9X{N zL_lC#s@E+bB=lM_S0ULe%i~`yK&Fl`Qxt>x00`tUeD1U_88ujE`L~@9p=0%yMEm>J zcEz6dt?X9(Jx$(5tLmD5A8VXfuZIlh>d&ME{T0G4_HSC-rM&YR&VyGkFE5u44~z7s zR;2yM01#dubc>07_{w>)k$u;~0n)+3yV2Tf48FM#KFkadrHy-CO;Cw!)H(zkrp674> z2~xG4sy03~ZU1Dd+aZ}ETGWWEIL>N*6Qb$HZ!VIn+uqq(<~q0#U1&Oaz-urXRixp& znAV=7H3?1Rbxgu3m>o{D=Qf$h8GOm0HVQ5$3TKZxN_?I000i80(H>)sdAZW7RK7p- zV}oJ#jY%Iz;bL{z4#&g6l*9f)EBLb(chM&I{LRJTXqw{et(U~R*UKVa|suWHk zj3CaquGws5q6bW)&TtE?-rzyp3NCoe z#>D>YFIrU$uK=wiEP9ot3R|^uCxmyo%B`TaGJN^6BbX>ycN1>JWi`4Qjm&REyjKh4ZRT%5Zs=3gsk^Or5c7F zNL-z}QU(!t`})EPeh*ENDp1p?b_)CXQwDq}Sg66tiDeZtZtBruq%drRCGvtK0HC;Z zN(GdZlu=Dhm_c~&!ja?I!uUNs_)JG)#G~&G0AhDFI(A794(hjF`|p(NqJXqf^vMGZ}jz6}7WAMIa^N@}x-2IB?<7clVg zy0Ey+gHyVi6EILzY~~o21EV27 zdF$v}{gBD%S%ZE=WTpUUsJQ&|<_z727)8{B>!`HG#(- z(UqHfV=z(py*B`Yu#7e#xr-DE#z~a8r=)C&?@J40Zv}^WYy+7>RsGIgUcKD4zr!H!XNSR1WDLE5!2m2 zz`iVVdmbQ7zH>cryT!Tt>~aUn1U~bTt?hc}Uv$b*G!c|GpnK-MIn!M)r2v^6?d8kC zu4TcJ;^NO!{<3>hHG$GQldkKP?<~f=%x4{C_S17UK<^YRBKXD8k)DB}q_R|J?TEOo zqhln~T{PGI3>_Yo=+ikbd0U_x+QW7L4owTN8nL0>D~lbw$NdEmOAMDgB_QA^K~-C- zFFrb6SC$iT>)7eAzN0A519sP9zOg?>_SGBwU{=$GZ)^qXI);XwQ^T*oOOcY1eP!F{ z9{FwkYNp)6cw$>bNGL|V_B_vK#iaW zB7$YbB@1q_o!MdtRIS{?kZphZ%h4{oMX^~s?XCN!uBBz? z*fxtQAWK0MXzm#StLz=ha+H2Vk4i8pPeyaGi{>gvGCpCDkPHGMh*~8DQs;1(`o&wi zxV)T{mMd<6X!a3#@=&WvB8j^1QucdxafAY1T#)ZV%^qS`uT^p4M z1sLagcLdc~u4076yz5A&z4*>#-pzB%N}%UNk~z%K>C8M>Fs+tDlsa77>CP+5+s5)0%g>3=<#!`kH%LUm+4M zc}%ynP*ZH6o7;ou=hPGjoB4gL&of>&wh4%vLItAh`GM|nIEiX4$NC`Z!D3a_wEq&| zgZzK|c(NqZ^aT!O3;sR$QR+P{fBCFI$kNWvHxTb38RF3^BNCLt>CLh4r9c`VpLMC>7x3Zn`&W^VnB<#f@h>FJU$ ztCS$__yg|)iYlJ!2d_RUDW)K7G^?2J$b28tsa4cfWy>}?pAqtX0|td9ocbxF&9ZH} ztPTSoC(41Ff-^S&EI}KYu&I2T?_x5le zQ-PYB*h0OtTzPH+r%kcWG)9^6yWKJPrLJLJh1@OQh6W-CGQpVPOpt2k@c3K}1~)r6 z2p*S9|E{i&goK1zH3K5Z{Gf%?)U!J(eq<% zz%2^r7Zh0A+5(tis8Z6@M4`xF!r=2mqekr+d!UC(%O3*vt?^bW#a)?XE&AjB-!zW_ z6~t~#T&HiKeDmD4f%9(Os}~TK9Wr92rtU7HQdG@YSo#2idpSN?ZZW-*Oc*TE5kegH zd+|*!Eh@3kXX7s)oScLLt|OHJs)d_0OTv|iA}m(Rw4$>b9@N$74|WRB!UK(WH`AU+ zq^FyGpDH!YG<5o2Hi-H-g`uWha$}*rFNh=2WyQC)wl>&tln*agt#PAKue3;CZ2ACn z4Dr{I*;Y$S$%Nd*U1NutDdQ&Fqm~dj@8yiZySj8Y*-prVU5BOmwj2cwKz#WNG(!)z zuc+YC!+NmkMxffsulGsjJiWj+H(wlNbYCOGc{>~Cj8oi%f=vofnT&7bg!WMV*&QyE z=092Q6%WQAAEvN<&dzqOYIwDB5rDS64MZRkR~EGHE`Q$3V)guD>_2>%6^NvbEE(GN z4+>~$ULXe9!cX)|J-5BybO1;MD(a`yJUrc;R!o@0=sy6%tDv}kG_0Gs%{DQ?H)MI?0E;2WpMSykfWa)9H+i zmKGlXEo^2}AHn_Gb2%{bjmbT?oMk{SLCHgop{S@m#SWG5Jz2k8oG>pppAQ%+eskaG z7Q0LV-Edk$kdKdv!9Cxb7lraQ$PreFrGI}^7`6D$M=;1)&e!%=)=?^&L?b3B2ArZMODRV>|`j19N*~VR(MU$AAnBL8wn>sqa55~XC`26*$kI(n| zVqMo*fB%m_DFWOM=py{M9la$^lk96Blv3TCfrRO+tRjfd)6fS}>;~HU>F-%zllbN@ zS3TAJ{ezxih_;=RaC}sm5+prNz)@6mzFk8&b$iKdc`gAkR>Rus!E4yrcns{G$X82U z=%dTWK%4g3_0kD=0Ep_(fW`@{y+47I#TOArZ~7#X)l7zen(bk>6q{)f@zF)Xh`)Jz z8!ryWR}yi(bsgZj{ZNCP~J!2l&tt~8|-JyxqoIM>4^ z?mA(o(}t2;!1B^NGwan4hZ-5~;9jIHdKCd;jMZJWKw&uW^d;j^cOAi3Dyg^`bu~5S zFLOqqD31b4XcMHTL-45wTZ4ICuDQ<|- zSM(Qp!=SK@9`tu_kM$-#VK>CQbEgHG3hl2Lwcmi20tu!k*rcJP2lu z%B8%2f>>7d@j$a=EHxXFRu5f0wPk?pmfi8~*BaUD)#D9(A&PtuPM{ zE{~CyaV!&`We)(ojmI;2E7{n_3e@8Rw6u(&@^UnQ>O9*UokB-tZ{ZXHr($<5ZtV74yAzh5CxW(ft|tzcWn&!7 z)mBIIP?e&Tuo(9Slwoe-H>6`&@gP8g^c|HbJa<1=wgLakmoICB(SxiEw6p;W?(k^X zM82-60_CQ&K&h0cw@61*Q!V6Q{)^v}&%t8xq~!`!e?hoWXSQz~9Y$Pd?2RU)Q1)ly zv>vMU!nQAhcPC;ziZt^ww+Sl;<5)M!D1#+WXDTgVUu)Twu5@}z%~NX^=5JrfQHYn? zm3W5#;U{_d=0+nc17WozrU3wT^yfF5{vq+|=Xw`|J?r96Rz`gEu_pn z0h9)r(syjr`n}O~y`V7C#=UVKd~hc{c2H9*h(b)-@P;i=t9Wzc+8ns}O5k>OboM6r z5p#mCKX14vCr|fxa!IrNBpLUHm>>Ep*^ExEqqB3fVX+7_xGcsiPA6;Ki97niBCiC$ z2QNij|H+oG!-1fZ@U_*cqk1e<9|WJA93OvKi}~d)LHLNaIMw-S9EjpMq1`Rkg#Pvd zSWEpyGW6jaYAT6$n`Es2=v*Hdc+g0kXwXf%e={aeNcQTP;2vzUu*H7z=Nl%DdL&voq`RiYJ%KY}Xff|pSgd@o?GFWTGRtyAUkkAmW8 z^bRu_;9Q;A=z^ogP|E)_$q- zdHxrxS^Ed8d94`$Jvuri{~00O=iifqI36tb`ZHR##uTx;i>BC-Vw34qHMuQVV8t<#=8|e%naQ z_Koijex&Mwlu_fBuKjKDX5CQoggN(6jj1ERkEEEPhRGfPJ1+*+wp!Kh$K6Vz7}j-l zVA1_EM0_^C@GEvOh=>xu@y75KYC}KVge+K6I4CHvay#sM&;b-{wxxx*)aV%Fv1ns+ z2avr+gF~<)orm5*ek{FuBanR`V4$OaSpS5rT4ur-c;`NS+iUr#&wOM8YkJS{%5eD| zUhp%jwrz#AmN;6GQd9fe6R|olPB$_@=;L4^?eF>?l)ekk6*A|~H znkmEOPiPGLB76H=!~R&mL`_O1hKDeHanF=b>phT51~rL_T*Vl6SIWEVGaVrLq6xX` z%i|gW3~m^mp%j*I^T-ER^ zPP1e^BIRY<01in{%c8;;ZeCaj;i@pTURwHKv)LouA8HEuNh42rvfeKa%9;Qj3jiWW z^W}&F@aaj{^2T?OMq-g=f#0zG6lP_L^M;ILQiVbQ7pDVtRM z1`x)g6Jkk#^Ldi34P^x4yf^*QA3u_^vi>6Ew2`U!q>qSA4|)Gs`GtnE|M85zZ|nmw ze717Yfa&4rS*iW31DE}_2(Sx@`*T;F)fKNc^Bs_{HEXYifYAZMu~#Yow>0$0<=I~A z)G;O~qeeMh$?lJnU0Xy4iRS?>$Qf`Vt$DrHjoCuX_giC{8RB+rjQJFWq&Yj+?c5j> z!2C}@frm>*mP!+VNAR-qD-8VhNDU?g>`XrcH>9#M*8hjtUN&H6yW`%82k7t}DiUpf z_4br&m=OhZt6HT|h*XwfI`v}TQ6Q`}JslR&-7Q8cA9L=NyOQJrA7s*G}mqtJMw3 z1AeE^6O^>Hae0%4Kv(<&tG(X-hD}y>7|0NP0CKVd-GV1AQ863Og*BhG|E(UXwbmQ$ z2SyTN8E!~lKT}qIIcf@&ae(o^k9{D020}iTuvo(3o`lL4|7j?EQi|J^jhGE0k2Qwl zg#dsBfxM*i>7wt8y+tPB*;8#BFxU`Ppwd34%A#6gh5)3-^xBOW-px&0Z&$aLM}tXl zuHOEs>jv%QOu0#SJ!jd`X(D`6vM2GUO$M|TlEZdRPc}BTN4W902ui)O-0X|=@<(tm z1ugT4!sQb}F1wfjY+iXR77h+vS9sSbdd-g5GQ*Pca=rHt9*=g!n8-a+cL)JBaF_Q_ z_`W1g-f>R;=Lo4Lkv*A{4+kGZiMd5iHHYT1RhlR=Z#j!*Km@e**Z0@iT?H=iIef=iXE;kol_;k(< z$kRMQJLk5LpQFkL#QY#S^lqWIK2h1K@>gO|2Rvuj&Bi~?vHrC>sNs{r6oG8Ih`k*S z7ihj6l*)QU9NEU ziT=4=t>*|7=&JotNDLPCe)}0kq)QKhK?&)3u8Qr^Ix2w0d;y_`UgJ%4WZtAqh7AQk z%wm!~?}8C9smeYtn6bwFBBAh96~)KE04;>~^p6q9E}PkFpo^vb#UyQY#QVrFTr5gS z9dkVdf^1;0~jHY1lmN2#D5Yin;WF+Ai8flvDUwTMJkR(1>71)OVx%jIt;g3& zeG>pWXSN3}hD})~4lrV&x2@v|f{ALq9u4TjHM8j3knT1Iu3W<~+5^kFET1%-7I|MpZX%G zF3)ya8(a^SKj^XI_j5}C3_{jFFjU%xcr~;)dKJu8_*m=Wa=K+dZZ-~3c%&a$K_0=m zCQPavt^HR(ezhnOCji*)t*O++X=YE&+Ov@uu*0ht{P&{Yw4}|<=mDM5+#o~7Y}nm* zh4d1@ACQ+1wL$}goP9bZS2TFa|XGe zDvjJ3=X<&|S7Qs>{<&YGpws;xf-8JcxBx(8R4*X*=C@QE4A2)>0pZ7dwlWha@DGKT z;bl@aIG=_Pl97`?^#VQbqs*iE=@mkwV=|p`(UTwPMbgCl0Cq$KvlK}@&MiQTDQOL| zba>!3kU9TP(P^kMA|fKWXb2(DnB&|P{}KttfFdXJx`x0a-Nl^rKTAlyiMl>o7CdwD z-j3gf0%hCE&Pq$FSF1vf#*bFfkd*_i=fNW0!NJI$4|nXKse6u$OaU-mvw>+XJWLGk z5prT;@YPsA0E}kK3LY#pnC^Tevt~8x+X~CnXS0~;1Mu{f!HN@oQiy@W-q1k)s^!#g z8V{rmFtJhE%Kw0k-4hM4fU4n2dpa=Dc6oE6|2_IPt~a`<*mY1VSE=Bei0ns@Q_0E0 zfjdA9HgCiXY50UdLi^8HgqfLn48VQ?2>OV`H{6`t9^AqL$P(5|jbyT^&Q??;2){L4 z_@0T!Obtv%-RH{1GS0hw^p{QnP%O1-8i#P8lhxG;HkZS}H{XG8ZdWJFPD2n-!%4o) zb61G8-5eZEO=qX2)%JXchLjk>Fk6Xv<#~R<%@eSKymWaHZiSHZ?4y9F0MoazA=fgm zTOsskAKpJFdLkQlw!rpe~l8~t(24t>-v?jtZ4WUa*t>T)@9!ho^+0gP-FO58hU z%p#LFjzuFE12AyFLP`ScKs+a$!rGoebS{sn8F^)_sfmTh>9X!g8r3y{P_Wo)sK)(=>5!z=u;>1=vWlQxC7`5sF#6fIi-!t~i z{pKvwIHJRBru5x7t1e+`4*9=Y03DsJg;V*7qSLnK=A?JTNeMj8_(WWwwHFYqf&(BF zvwH_U7|TMUmhJuO{T<|!--l1_tsM;7OWS{hbaE%w9`!~A=dj(+&CieW6mqUNd;6Uc zEG1EUnkpAGjmY&UI3pdOA2)-#c<|;=MyfgtXk%l!J;|yp7n=tLqO^GVQ;mkx`Vx5I z;ay$h*eyFcB-Jl)oKXKo(XC)(=i?DUIo|Hakpj`_U)Sa+gVkx?N;asFq+IIfW z8MVh(?^}b{ISCrcBoN5pE zV0J~d+KGlqyRogWFKAdhC}ktwvedm(3Wbm-Ncag7tzv%HQ1d}dd_2`B+kQ3adrk+! zyl+Y`wiZJ>g7GP7dPzJF^vCg08*$$zobS&-j#k={HW)M{^z>fSD!d?O{rNb?x6~{c z#i;%DA@C(uF?G`rnYWP)RLg;6f&K^3?G1}`fwFY?kM~1{6HH+ALcEO{`%rVMNU>WtdFB1B zX|8c1pKVl8r}SFrJa=(LMgPQVq9!qqQ`cI~=#_EnwV5YOe*4%JuXpLY;7|o5(ft6p`-h) zh1Y{{&z_YY%>F4iS_q2%@ZtJm6*wIG7YuJWloZubN*_@nz@vLtRk1^FD}#}Dq3xhi zM2MiYJsC3w1BPi2d#XjY8jUu-!TcVf$;tfQe!-u2Gf7HHOGhkEFZesFZT{ffn?NJ8 z-H3M^GgKow><-R|9S`R82kK$-A0}WdNl3n<5`6MKDV%F?4VBgHC^hZ0jETh?=t^hc zfB05VfXshaOq?jydAixSeV?zC)hdzEGv-ltqDscxYgJgUJmCrbnkF0|GnQkNc9At0 z(?8Vgefi~%YiGQm6;KRdI`oC!bhxkC?eSw&>FH549ZB36S*I(hsQ5A(%3r*Eb7(Y| zjec|uS7|eiA@YKtrA1gA!(A$Ge8;jUp3Q<3^i7F%p3>!#Ed*P8c%!jUtGA%2yI$mX zIg0_%V;aZ+l5{`?z@Y9aWw(kgfSUztYq+We^+>xoSf~qCzq^jfQ2c|#fkMd)a=+j7M$xB%F|r>EP`fKcUqZxf0((GhaNyAT0Fkm< za1=){T%weyo!tvxBr2_y-9yii;YLmFzW#n1t$JMSp1PC6cJUvT#>4e^tBuzf0Jj%9 z1hNw}yqvksw6rv8@C1k?K6{#gvoeHMfm#~O{ifZdk`1*PpE=9rC}1&Zy^z5l0dTv) z))5mfhtYGb%>kG9DsgkUP^7n zTjKKpTLAYNNF@5yi~YqSvY0LJTX?7ox(?|m1)M}GEsHYD--f}EWE`STZJ zp1pf>HJF#lmQe^1_kbl72=?il+ml9+fz(ctQ_F^Z z{g*{bFn;Y5E8u8x?51%BYJt&=hFzqNBJNj;JMaVVVPRoeESm-D8{FTpvl}jX-Lu-6 zdMRb;7Wh#;7Mwu3PE6t{Q4seohS!m=q{RA>c84w+f^Yqt6hjnbszt>wtpj z^l11MA>m$xnd8YA-u2l*Y#}QNzsI9#%4ha30qq=U)dHAAL(~38SziGaRok_VqM{kJ(2~1bl9) z|CM6Wy0wEc8H6SH>vHFCc0yTJxty z$Ht4Sn$?am7}Bj~k}?}~_}TM=iK4!*&+jZeg9db6(3St?ADZ=v(s?-eb65(5ltOd8 z;c2-#g;!wl)c0T!jq~R(-~6>3Uknd&%PL1-t8DyLkl~N%F|c=jbz0J z23`lh@v<^Xp-a}&?@+CDNOy{Ezs90l7$M+n#bq&kC0TgKeDnKto5}CV^(Q9*o+!%i zMws%r`1tF$ZoSjVGvE4g2!Vd**KhF*r38i$QKM}ESC6nGLdt&MhPxkbIYQBJ8-M3# z`GTR(gjAt1>tK#9pT1>FOEVGW^~O;)Y4sAB>$h37TQXR5myf3f*CxtSDjm&KzclKOnsk7ZH+Bjv*Pv2iruGgbJ%}U+=06Uc z(qj{#|9V`QOS$;!-8=s2>1iAwmvqT|sC!5xXO+{{I2_S8 zZ?kDbtf)M>6aTJxb-iVNkeWy)}1CdG{ioA`gC)W4`X8I$F8|WXz~+g2(a4MsA`^i^iX;7 z`<|TT%2ZZ#{nV|b1ijZA2*fxlJK&ua^m&7eM>tTU&6TZ@f2Cm&gD$c^eJv4E|3xwg z((>vwo~Wp3qG3p+QV0lwP)Og+#bkYmlUFF#x-(PuW?|4kMODmw8XCWsH|mUFXTu^& zuV${yQx)g48u1Atta3@SPf_l(;@Lg^ipTPaPkzr4TU+=2Nf+`)U-3O9)+o?aTwZ_a zXfpTSD6mY}Ywo$y?Z@xANhjm#qX6Via;D4y#P>Yxl*aC1P0{H&u;DTrlqCYb2^*o& zDSZ)$2%WrP=^?8juSkpOY4n}A>LU==L6VC_FNQmU;<++Z zfhojT07?^W^~rg4@b^qm?B>o6UQ|E}qvp3)CPvcv`t=Y|aiKiXh3|!0^;5_lo_;Z!TA5F;@)klYj#c#VLsFR>ar z`>Nb(Xb$4grHdEO-4zldpUN>|lQ4LnGTlQ@?TZ7;K8jxTY=~4-6|!z|%5~<#FGO@s zuEAI-i(&b}Yi(+&1u;x1Bcmlvma9M}gbU4@&xM0WCeF_lVhD1i* z5EjK;!6CM=xXlvR;U^oZUEduk_KrM4aR8bhHt7)4Nk3W0HL8_rv?AzlOt%*nux~8l zeWc#-1qU`9yvFyjfVDIoNGfe_+Qu(xU2g_viEF++U4#H>?u zB~J;zVU#1S5O{~zwQ+;vh>;u+O*yEzCUsec6^|r&y zu&V8Y_8T7iD{qr(DX=Zq%A9O_Mqj?Iwg1)AH{nguGKL{5Lx-D9ge06^=YVSlr5lHJ z%b*@}^tE<%0`i9{vC()UZ^XqeDg91Rkuz6Jkg}j#vVx>Uc1Zk;G68(n~k9kh4P(kL!`xB$Ex&Gb#Eh8AA;OFmWY-`f>b!(O$ zobSYJ2F6h0V+eBXQ>M8APE^z_BO)RfTOH2BmMlt2N@%-|g9Haua!Qd;65Z9S`?*`2 zb93zjOTD17y+&5WbC-rYYMINt@WqMVqd=VpvBMwCf^JZRxe7S{j%B%{ZhKr=U7hK! z=ZJtpdYP|5SoLH$U*|RSGvJ*0vpx$r4NnScRUW!xaHn#*o`}J&d7G330H2Ro-xtYv zeouJQeQx{d;E;r}&DISH00cRnFTIe9Wo(W*7qT!px3SUvvt7NvH1BN^#npWm{!dgh zDg-`8qWp zXWrms^43X{=kjZTlaX{G*uJ&BISJRs)^@&P;UoMs?|j?uH4sQ2Gc}4|3#})3&LJgF zqT!XPsdp#oLg4cEZF+h z*c9+hWvk_mS-g3fHkZ?(#DVh6VX`fKEcqM6-;Xa(xAv6b9M6g6;~2)tLOKD8LrA5c0?c zy!@b51p+x$+LiW8+~m>GKGiQMZ~XlIfo&2`^S3+3^l-qSt8kz&X8){p&eADwZf$)w zn5se-tsTxPmmx>rm4@*2srF&pKLcUUx!yjk)#6G@?&iIv(L!N>_8(^soOuE9L%?P2 zqiHpra>^g)4RZUT>}IfYyBACCaSv$b;9sMlX!^NjSPWbEM^h8O+Y&qUc=P|%ox!C! zTHozYAA5NvXCC;xK70P5_X4x{g=(&o)xy)UfKQMr+1>lkY34m`*%0=;h>t%D&h+Do zms}mOtj3_G9n9Cq4?4T;Elm;&Xz6x)ruWhS%8~cDgk#KhICt->bkFoI#_KNR2Bqzz z&CM5el%nCuwW21_#cb~HD;0GCld&xN;u_$VSUn&_SvoZ4N3(pT^N~_jKf*St%E@eR z{O5pPmtjR5Tx&WH`>_vCf=LChzJm6q3UwT1C+yMpJ4wlDr9T?}%V9PiY|}o_C?3#f zRXP?Cb8SrVgy=G&y2{wXz7-^x40;vpI!U3IFI8!TLH`2kK!5~;$@t%Zd=&)cDp?xK zax*|ZoIQUTM+G24I}nL=#IpT=6(PvH=*CcIR)(__!6O~{wLmTFn_&Uv!omWS#j{V_ z!W&}Qwgg<0tDLP&tgQi-Q@R%{`}8RZK-bNVU2>QC1^$RUr!Sq!mh9r28MJpCUL}W- zTt>5DGqV8N{4%;fTD2?Ajwph(b!HMJdWX0Ah>!It#EXu2O`pQ8IU2tW_Vlu9cNs{?OwIJy9tKoCg zLxJ00Opbo?HJAg~YChN|fvnw<(q=WRL`F}@`f5W>tP{#;P+`C z()e9(^2hmZI(AtuhF+;WOr$ermO&xqanBAh1w|J?!zES&l)k>ck4V=}wd>D7&6;vz z2=*f=+rX4?!)w?cr`7{y2Cb;u(ZN@yF1Lg-n{+K?9rg(>^Df!#v9%>1QX!jj;5R!i zdC4X0vG*A^C6=#@i;I((z(QHzIJkcMcFe|X^et$J7Ix#gusuSVtxjeorrN%~EAR## zv@zf6st*nw4ZoZYJc&{P*iQNsop51qbxSkv6Es>6p(1_N&yqf{tmY-k1r%XVJuw^L z9P%0(H_Pp&x-|sE=5C3K`X(kN?G+>?CAwd~_R;N*udkjSk5`lWZ^#TVVS1VX?y*jr;6>69L=1qJ{`cP%ZSLtEXV`k9^96i~7G zyV#CzF4ke5bANKmtOb=i$iq86Jz8FakJ>ta`toJi^wPL_}hb zp5a6@KADT$pelAaR1+G`J@@NpU}VjX3ts5S9@dfzPWP=Fbe1FewwhN{+UWjdqPUjY zX3$7J6=;1w2;3T~x5!Z2YC=1sM~F{q+cLUz82|!${rWYtZqYU1w0x$@lA?2l**zC_ zxd+b8H~K+~U)*iN18H(@toY~b)1tJa`M$JPtko%64tny1Oscx3&dEdu^~_>N6w>MF zI}=W0W24O&+VP8BLZarkkGMdmJWf|r{q|A((*(dBg{FOHhduI}ns#&tt$0Auq(FkY z1=~)(Wc?8Tl+$!n2CQK~4hlQ34xjneL@4^KZS(r*_$WXb&AFuNS*o=jMMw)NNMtab zEh0I^$GIggF7IqJr>PNZ)e)7NCiM`;z<;iM!pEK#NWa>v6;)bqTt-m!CfU1!*!c zGV}R#u4Prfh~se3=eKxg0t3SQ0;D&mP%}434u}A{OFlwBIC5tz*g1E;)^u%TcFz*3 z0zeP$*VJ^YS7|W7r!BRvZ-x&^L`kV6&c~<0cnjdPoyBSIoAfHLq{FCoCP!jpz^PU! zcD|-N3CrkYKVh7uUkwYo!oJip11!~<(J~W@4-;7L2uiRXui+?3aCxQxRF+Ue$hm&< zU7M1h=@A)n)sJGBRi{HnUmKnO`O14lcaI_x@i)=`Rg;l4oV!$)fm*LEWS%otl zD3Wx1MWf#@YWuX{)cv3rhT3R<9$F^Znb*R4q`QtU8_{EJDwrd}-2!jSF<6A;Y83mZ zYuvWbC%+dL1B%uE*ureOHvqjyu|D|#xmE0qIG~a*zF=tNnoxT_8#BI-z)Q4CP*>8A zkl%N4xpG`13O2tqiNKNBx2L1k#Ce+X^(P37C^vKP4C*+1qs34`;YwKrK!>JGo`5bEd!!5${pJ1RSAF_TAsIS-dBfbS;PwP+{6XZfpagd`;-3~&oN!9*n4I*ZP0*@CURJrYc;jk%7 zVV`3^$hjOgKZ&6Vc^1K8KGuhEfHobyw@TZ!n#EPYqcS~HZ7-UiKOd3AD`^@GfCm7H zSI9UMAB+3{UeRIgdq{upN|Nqd^s(m_5wIULz%w)jgst3R=ChwVoBA?M3M##Gc}lGS z0J-lTT;j1FqIvK@YUYK_`5Nglt)zP&{vcVBi z_K!mw#E`&X-a=tfiNbFDe`A8gR4I$(Q1JsDn<+TspDz`%62+qaKzZNR+`Q$uvUuBc zM$8mXT3Xuw3RzoQpCO0|yF8IKpxwC@7#L{u<7<1a;i7DDhGK=sI$7<}u6RIbp^21g z!;d#iTKPreO_4lIu>;6rkFQWRwR{(Ng zWMBheGIS9{%u-{tt6Vgk2P2_{)|-{Iu=JZ3;2?<(b=t;kGtf~Kj&xeamu!sjPK zfauD)YF`NqDlYbUQE`oW7O+k6>M~oR+Dy%yv6Iyv^oaO{N-oono?mRIp{TRgWW{R$ z=!CyGqT4WbvqKdaB)5FUn$EO>0yfFZ#7cwTWEt{mc8|J$61szKrx+PFg&rZ8BBMD} z_(6IetlhCz==^#8v4dF@j$VyhAnfilh>uBKqPD&Eu`ep*Kqk99m6Lh0=l8OmaF+C8 zYQ2w|$16+qI@#T$mxkW)Yl~n=+S(TA*-j5q@2bAm&ang-5|;A%rkC}_=L%&57{aux zZ1^3`m6Qj60S)!Dr$@BXbQcH<#C{UuVFPxvk`c*m5jF2kQEM;zoG~MqYPnRESq`X` zHXECHcU(paZhb~Rx3beqyC zx#;7_mXLwz-k(V#-WO1fO(akk&g7pabEMU^4IC@P^S)(k@oH~4gV|Z1!3*cPy|J;O zE+iz>Ki%K(LP$;JUoF7eXlcT5AMCK>3;KA=HONQy#sqEmG{A%AM9of%V?6+*($fZ zE;Sur+FR=r?&4-)VTmNb(5+$LqXT#sB1sI^yg4I%^+Cdj-^sD?d}gAf+>00Nj*DzR z7Y`kw%!`L%ilOhwABVPc48UPSC3`u!3F`S20>z$mi#fdm`!tkT7 zx~OEY{#g^q$&2j+nOJTa05@=R#+nulp!ZfDj3GBazdf`ZFsHts_7L!I(Cf`@fHZs0 z>+PF2kzE7R-bc`uQCeGD1JL>bx{RHLPJrlCHJq_i4O-g`f9kzB{wXVUmFm;Tm`to0 zlcs9AoY_L>r^hyWsi>f}A(WewHl%6N%E6T~ph8-{7# zP?x4=*Yh-k7KV1urYdlx${D2xN5vQi`HH5uD@9J&TX9BZI%P5fG!!Rdc^oJKG%DhA zlQcwJP_+}l33xcKVheTfz9c~dhqX*?*@t%Zj>m2Np%b*7tO!3bBJmWgHbv?7B0j{j zy^T<$OBYH4IZ95zqxT97vpSbtT~Q@`H?xY$%3@~Y=ilrD$Mof1)?< zjOZ!)PRib$hD{@JqV!0$WWP41B+sz6Rc5#VRo|QhrZkFr5Ad&EqCFVWc(BZ4jph!1 z=|L*KxUs?7$`gP^1YbI!S#RJ83X-p_J8+BEeI`5pQNmw^9h&LiI5vERxH`9B?$5?X zXl7=n9OZu|Zc1;Pb{g_)X^{?u3r;~7jc{%qO1q2F;!&!N)Zk5Gs*D8_3et*vLo1;p>*I=cVT}nF- z6(7B7eWat4{qlQp$NJReaN0&cGR4`R;r=TYx`+4agO%Na9}J{Kd$0vR(OmI1Z;$>v z={_8*j=;VtHPy#kB7aYB``*8Tm-|KknVcy?9WHu*OBJPj@e)DTs?9~CqB*h~hv9=q z$Fx50!t_#BXzK@7oZQ@UO^_$JKbu?B3XRXV1f$=8!7~%h5ACLtj&0feER^0b8VJPP z$$xmEY{M=NY}$D?ooF*revQBVX?`IdAytuEy93ZRl6};YB%AJ{I^|aJwnxN=L4|{! zpoEAic-mZlYVdP-IHm{fC6|es?kd9s?S{7)vQ7X`1H*Pr*0blayaH@@P<=WGQ^EA0 z)^3sc!`lUVm5AKR9k(1!ma}KiI&fHsnT8bVnFzXKpyRLV|MvL~F`K^ekFN|G1qKAf z7K?hF>Fl>!)R3Tr7lWae;35#fPP+}_Fai9LviU>hoH6S=ZLfKEgJM~Bv5WmFAqxACrPD!mRxo5d-ra6X2NkKK<5UYMQxB-lCfaJ&8>7YJn z_TFT#@)=B;DO>OLT{wQ{y9^MX$ib4yLbu_2skGnVo>-g22#TImge&P+Ic)t&r#Z}3 zE4@79k^5P*>l42lw_lr2i$h2V8GjNNNYS>&`}Y;%3kQ$N18#wwe0p^r7|?I0K8q~_;bV2dqGy{SKE(xQoMx=%e? z;?4vxVTMDxoHk2c+g$*jiyY>spMjDNgf!7%p1YI zQ7wiB*&2n^FfwBvS`DmNgBMp>?+}gtvo;sC!V3+9Mvi7Q=xXQ=lNg&SZ~ZtRLG!rm z=Mq~B4;O-vd~MA%?p+(DzX9?LG}`m}`j(Rw_h8vY!_J9(YRy^=f*R~}a!~r(+uJK8 z@rxgB=RbV-5NC6#&jjH5Ro~H%bH#mq9N@?Bnc2b9$qQZK$594f%Ky}Y1m}G z;}!9DU|1r!Lz<++9=_bZIj`Sg)^zUA4v1$1N8y;bIxO>SyxC!BEEf-0rh?pSS#qC8NHTDlYMC@ z8FbTVo9~8psRxVC2@K2{?>`zyu0d@GIz68WeR<5$-|yoSv&{oC1>EM&#)N%`kgxkAK;beX z-nAIMkfCoRjiZ=soW6=z9kqx<^yAw30DmI#h&qoAP-u!X?&z7}{pGjXUFR!C<7aJ{ z9(x<a7QeTxw1vVhh|R%B{R!*11ONKrzn=ZahG49WkI71FPz^Rst9!QD(6bs zqiRU+(AupRg!Uw5e_49sDw6$q+Y5k!Qf$TnW(-a_Ag~pziJWuAI{F+@jo9Dv7Nu$f z89I&|7^s`1LjNQw=^xAuhyajDJyt?UE+jExC+v1qivkg&Wzh{^pwTz?4g#Ir08m*U z2m_FS7VWK~!cLY4?r?mpvc*4)T(LS7*`H=%56C-{tcPk}-|o^_0+R1I&L-JUCbZDN zBrBalIiDk($Rrm9?pnZ9!^&qoQy@rUMSDvT@dautwMIZ-rEs5cnn1e>p1fa6PwD%P z060m1@mp+d{DcWm{1(`G*KXhThgcgXisCferrF;ZlbmfKh!?Pxig3D5O${nr60?pd z+3jk`Q=AqXXZ;B%f2Mf4aO@?>V(%#M>Ja~SAJi|NF34XAfwRDK+C|K}W7P!xW=wJX z-j_w~PXh12^bW50QYx)nowuNAsCKbSJ8Grka2~$`)~nrm(baj$x9B~b(aKfVD(}JQ zS~$Gn_*~O|R!#M*>+U}avw5Z7o-h=N`F1T>|bPpv8!&?0*>M@<;PnaHh z?b3ssMX`t~3*`@$MLavSAHft{WWW=lQBDFBFfsJ^tR0n+r6sm?#}=Bcp(#HBW2-E- zQ2SiN1p22`P<^{^?^;HT_2lK{ZRu5iVnw! zFkJu<3Od|CR>oIYL4c7sA52+)1E2DAwf|lH30km^7lI*{aT8hJyQCQtQ*+ck@vXD7 z!ecMnCjm^l{c!bgppVal%?q(xrNB-fD<{DMW)oP|0v;h{Z?0ve0;OfRA?YknjL!HL zlpw7$B> z5Aej#w*iC^HmkEciSQwe&CH_nOU~pQR7=5(qK&r!*f@YSo537AoGFnN#G7~W2S+I; zok{f{^QoK~PegB6ih3Pf962Yygq?5$7z}N9Y&oG$h(91Ot23TyHl*N+$c|FYoL$J% z)yUD|kv##3!0q?xoBnjUWkWV_SN5ezJ{FrJ%`2uH^s=-(CLwVml$wccg|SkUrk^x$T~GU445fHZ5Mz_Y90~{EP*bSf5-zI%VD|-KgFJ zN;h+yCyE^4F5u*`N-P{0gwq8cmy3ji7Ly0EpuGzQ=;ay-$@`;^MjG@;IVfoMQp$^q zX&JYjwH`fntMF+=N=zJQR^R>YV$tok+_ZfO%cOwTzsPu*=#loL$<;}I=;0DSb6yU= zEne5sFAjl%v_%D(B8oDD`colE2u6r?NYqDq*t>n*iVXn~)$dA|(vv;VYr0pP;9*v& zc#nU=`itXWnccC9Wl;YFsuv)hX&)VynS-1V?&84k+*YwYf)(`Af`BO`A4BxrH=D94P<`Ex*&3tkT_TEGZSe( zj;)0j^6IfVaHxsLs(nQPZv5($rFQPzxfei)VkJm=2PkS7-KHGn0+sVaNC!|*{({Ns zHZygRAR<5eeKD*SDnM}e$wod18H3slO2V~qj3B_yFt0qYq2ZCnH<(K{xVU@}7@51j zX*!)4f0I=Y27tZ=#VJtz$KG?PCx(kk$Sv&@<@rB1wawdLH^9!;Hfq~DfwUS-!Iyl! zDL^e}AwiD9nwpui{>ERoLB%#3sCxZSn2zi-r#`Wf1l{^eR%%c*QyXo>;6GTI{}%;-sc zmzT$awSwrBW>40-8m72Z@=d4CSkwYR@bu3g?wTVdX`ND=*Kq!`3tiaV4>Kq@Ksp5R zqNzIRR64#tJx=K5Ssb{r*1(L-pRR=Zj~{zgs`i%BeUZTLlA?x2*MxG#mPogGV${YR zLIQI+=RA;w8@kx>VM}cF{h8VT#q087X!fRGWnH*R{%vP-v(4#jN6MpUA zeplk(e)l~nDX^_4G^78y=f(f9SN!|xyI>gkug3J>R$JQi-9IouaRVRu50eHdf^J@wChfzSxbsp!%naQqGorexa2`H={O*U!^!3h=8h3ldq7t;h zZTJr+4uXQ;Qt&-nB&a}f&aWc`e;hse<@+SsKa!*OOu$CtaL$V@cf^D?@vGtaUui3H zChbq-wkxsYE4M$rgF7GH1g%a@w{+RKFY)b^H^kQw){b1?HqPA&dR0s7C()FIQ?XFM z%?eLZu{AD9^?nwcUJz#K5qq{`_@YtTJ?Xp6)tGCy(HO2#tjeF=5;-owk(#?jliir;-=_4l<+Z;tBGSK^vCp{s>kReq)R z6?nGHFzTl5ZkwS-E&g`pvFhsAiTd}iN*AAvD9$fl3izE(6>N7UTd&IYBF8M6Xra-K$A#HGLbD|?G$tU)$dyjO~d4zVcBLvHS=3Bl2c-_I;!moe$)L)uSI z3$`88so8S~Dg-hxm7Z)y{YDiOsWlr~cl>$V!kNv-o9-@Es|R|SeYFvIwqy3xLGEy@ z?{XdTY&wO5Kr5-q(jx0a?xeI3qz>bKp@kX)PI-^OH)UuJbtDZ|V8L(^c4O23G5QIeg%%f{c5+lmw8 zo`o8_pH?fsrBLYF{&A(YIFA$#sy&?o7AeqSF-BS*y9>X4>=~8P!T+PGTTYy=)f?5s9`lUn&b=7E^lAn!Gu%-hT=Ua3Zk!Im9~p$7U%mEQ4f#DOJIhv> zD*-;A`C8>^?n#;Tb({lZssn$90_)00^#Z*WC2GT`X!}F*yl2Z3{-gvPgN_zgLPW)d zUB+mcYUOcQ%QD8QO)u_=RFnBOa7WAW4Ap>6MqSW(C2CpYOPb01&_G$#J``DiI-7g= zGLU*+J4+p9KR4szPu-r_Ie4=~<;Msfk_mHCj{B?0YAm@+Va#1U>s36rwgy zO19g#1I4Vd{J?JS!cD|4;?hL(Z;Py@0!c9Py?DXsTE%I;MDc(+Z}erv!$*sZayO56 z)oB^s=0r*uGlTKDY5YAlpgpo3WVB%^p6}?I8OTsP>Ud-K0mhKNi=EU8A=me zc@4WX(HzmLl%u|4CF9i6ks($o^?+N;$A>gsPrR_*RblRux`=DM*&vhGPpjWGgl@@N z2C*+ys2^$fwLFo=ayN*VL8#Qj?khrUQ;&*7Z445{H?zXspbg@vW!34z8V(W_o&*+%I_!ad1a`YwFzyZbQAzmn*y7-~8sQ?_8|5H?yZK z{_&sqP`;YMnM+@6hI^2j?a=kgfxz4Kp65>7tqiXX&JOzfzJzb1{N-1vqBi2w2pgI& zNbz_7i=XNeBtlP_}b+0`{46P6*ICp+mYy(WJ8HX z_J&)*5Ux-hzJ)sT%XI|A(f&@PcqB8-)|OQQjD~h^((bX#k*+SA;x1GQ5s4_}1TSwr zBrHE0)pk%6s!dgV(@-RZeV&X-gWVos!Mxagt@W6+qp&0RpvXP(EmPf?I`1n!{U}R~ zFMk^7ZholAMzssmM@I(FPtNbh)eC#>zkqv2STZIl@!g7x81r*jwVcVk$9}BrMxJ|Y zbo%|%_MD;@2`}BDf8zp^94Y>0J>Px$t$6`L=kh_1{k~;_3M9aoQuE?j;b#cA7>u->E>>;;{i`{+o}_ zmr51m1wNacj~l+sy#3;2ot&v($}OQ*y-1xx8|9oE^Q0 z*l5St6f)n8YoIsO#2YyEpRs4)TkVdH4s3L^7Bg4hkZiLW+pgNO=xk+W>93A*bjX=r ztZtdn!u!4HZFX(>gR5FTvkrxudlP~0`|i14D`yuF6|b_DR5+uVt(@f~1u+_z?z63Y zti+_3+oW=*+8r=O3-U&yq~-C`ZT959))n|tHh%L)*erUAsEX~!8_6xQ)^ndI(5fXw zkoq$1nBOk+AG6)I%a_NVip|(|(U!$pD=Uw`8t=#H^trhwvpuOP`?b4zmO>AoGVrZL zkrBdO3Dk22PSngF^yF@m%o8>Rh%))o{7@sAvCmN3o_&_Sdzx9cZzR{RTlSrVmW}Ep zcaB8}(=$wSos3|$o2eDS7ER}w5c}lhodnbDXU?Xmo}{eHf&P6*Q3=mmFC)5`3QlCA zinR7;3g1Mes2)WdN096_#`_njp&B&X#VTZ1Sb} z^1JrS;*2Q(SRX879G-D2?jN3f+4ij;XK?MYbY|a3B|1Djy#Kw!G>Y+a^=tMmc7=zz z%ugcqnwlHs+D9VPH=88Qs)J?h#~zTYwGbcgKHirQd2~rNOz>-NMz~s9t`-aJ*^1c< zyV>zu-cY`AJ>fc4rS2q2lJvvJDfpu4AA4yC z(r$$>IWJ2sIq>a;qw zcj_9dxI9&pV}7(UozwSOp7AD1+^i58oLgsv&7<>AXsUcE4jg<}!k5cYf<=OLqzE`3PW!)$>@_m^Cz1UNWXKgvox*04|KNxqd%5%sMv zBOejxC*KqO!d53o|K}pxeO$p=@t&)e%x6`nNKd@;=V+PqD2zqRpt*CaE* z{@fyH?!DrIi(QA3TjAq6%?@ltQ)W3tc_H=^CCr%;Z`6sXvO@a4`ZOta^N7x$>NKm( zY$)N>M7QuR7arYa7RZX)f>PbBS^A55#MpK`y0Sxd8LGr7aU;Z@abNq0wRS6tHT}WK zr<#@6LQMR2Wd{pR-^@`C#w#HG0Ol48iy9WkAt14m0wb6H4GIgLMcmV-h-wezWSjMat_U+R5pg&?F!_ zWSqPP_f=KK7nzE~$B7H5M*!A&(#gBJcg^6GgLBWo55_OSruU@(>MCm#yvSPq6i8d; zc7%{Ge|lSvJ+-n}|Fnz7{q$2zpg`R}YBE4^EuM~ziMS42j*vDbgn`BsZqNp*D> z*?RcoU42Suke!ORO4hSpN?JzMuH`++7*!53+D?0mtSd5#9g$kZic*LR8QvQTeH~XM zzR*#ql8stQ_Nm>V3aq30Hc5`Wz_{liM&{_lUze>#8Zy{I*jXl!^mY7SqIj6})3$_f&f_n7)wanX)m(;y zOu~pztON?PB8hiu!mpwQkCx*<2sc_br5A5v#T5M>gr^Nl>p zgp$g(Q)aB81g`vtu)zfvnks#Fvy>ZzOxJ&vQ1@;5_HvSCg|HdwD5IlG)T#ei_n0wb zP946heOZeSk+7H(VBh<%4fuDt2Q_x@X!TPf1nBQg;G+5sUW_ZG3ysD14cNlyfy4Gc!B$(Ig z@uNRvAj#UgWSnM_5LRcj1B)zpiPocD^T;Uv?He~fLxLI!UZ0%54cq^9fB%JpjW_+* zIA~zIpZ|JhJhtax@f4N)xMVLoBIaJ;5MwJjrxq{!x}$~FpZlei6oD?x-z2;UIEaLE z9}m~%!NF}a-egM-)KmSFU9bynnFp9&{w}y})zTCB!~5$Lm*tfkM<2A?yH4wBbFm8! z$A&5E`^LpoGQZBv=85n6Dy0i_>Nzr-r6Wq!HGZci>lXuUZ?9l_CK z^Y^l6$&zG6%Q#I-eObNTGa4C-T^A7?L-@=3a-C3d+i@(lr6iGE7}4^X_PFI!8&iIG zCVh*20cX*Xu`!m91Ws#MRRK6B2-dAibeF5uulDn;WaPe=~9a78hvt5sMcU-v%w}@&2aN zXJ!kYCgW1X-6?_sbH$#}qSwob)xUaS{7S!855?Nri|;*S1s;Ee6%qBbl~~d$q3|s^ z8Ez6U!)dIm0zXmGM7WO1@EqnayI2c8`) zvexcR|J8BW1fEk=&(csQ5ZETRH+FO@kJ#Sv58CWw`;KIlFmrgl5WIc$U32EIS;HHA zln*jEY8y`{s*gsqR|G?6Q#?HG{2XuQOHz%lvlTWSF%{QdTn&(@ zTyeUB3NRO77&9lKhPygg^Wm;&?4GiOGvWrw^BUorb85TMf0T7&wq@(prK}QFQfA2S zo$y3fqLPtFjNArQdcgF|Vj|W21akQh!})UL-14Ght)bY|%tCGJ`1C~nyI$u$!PuRd zI+zV3&D*|TTKv^FbKfIrNsP&quBumm|0HP%5m&B0Y`sn1x$KB>R$ zdT>#4u?ICQZQzP9yzz~5K{#AXYh4)Qm?wO$_+?h>gu}w4iD<*|sChrQ0KI~X3GK?|oj29;W0zJ-(++Uu;;frfZf+>qKKKyMc6-m~(n;O2 znz;81oeOolHDp z(NzDj;tx^A&ti&Y_jk_VsK^;NQ$7+=OyZPW_1!X_X)WA#knQIZHTW#UolUGMTu@cj zXJsq=Rf92IIh1lpe$^*yD90y5_6FSwh`O7}(5cK8k!y>%IH{u^u_$ZqC&!Z1YLb%8 zPki@(hb9TU*i4;1Xv)bBZl#q4R4AGTGn-P)Efn4xygWcF8%Z~#H+qKf^}J04#w+G2 za!{w+f?v0nIYqEzjOOUD$SC{ZP8$r^*lQNtSYo0?C-B;4!=K&b>>)Xklu z?@a#t>qh3a>el=z^EQu*;igI0bGnoLlrvthZ*Wj!?d4o^z36lfKgz2VIXlC5DwR1g z&h4=qf=g*g8fJ~DD#czTxI<3hM!cYOnD8eJcjQ-k+P{}b+vNWomr-5$NGXX^8(FuL zSvTT`_IN^gCxgpkyx`E)pNM`h@QzeSLiauetYSzMEPUqCR2?y3^_t@mwoQODY}JNXtJK zqUviTxJ8MIMJYXGt4TWlu6+ys1XEGN422DFYfjgq5hHbdsPU3z+vwVik7ox^?|nXM)1rsL4ikWSs&B^JZ|pQqk-T`Nx>6S7$R^Ciu>T6x3D<>^dL=bN7V zYLQ~C;jr99#^(|on)2{7I2D!_WFt#p*6@_i5wXVYkQlGbVF!_pu{Y+2@LfC@>*3P~ z2Vhxh{(Fow=JBPoPAZJ>E@8PYZaAGhvY@(9g;rPp~!2*`R-GaQ=*_ zRxJI%(#o$-XxzN`z1|4C(j`FyynR7EN+LrDb1d#f|NmdNST zZ`IYh<kbMtMxrKJ+P|PEEhYRro-|>vsqPR z!pikX10~29PF`Js0Mf{~_lNMJ7~E9TlrswqmlsdfAY_n>ZQf z<^=rDfOF=7>j6B~u&4Sr;Lr?DoMj%pQNQd|J|2DerS}noOlEbEuwQU`KQ7zJm8c@U zMV1{(BaK{l-OXC>>V8XSf}%jqS8GY@8+~INYp!xQKi<0&UdeZLua~krI{V*oZEX{R z+^=f_ee7~*J$(O9-2GqY_bdS39S83}mt>_J=f4B?e=Z(Pj0}wnZDf0o xtd^$FzW!R{{d$MVz~eS literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675254013.png b/umn/source/_static/images/en-us_image_0000001675254013.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675254017.png b/umn/source/_static/images/en-us_image_0000001675254017.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675254021.png b/umn/source/_static/images/en-us_image_0000001675254021.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675254033.png b/umn/source/_static/images/en-us_image_0000001675254033.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675255405.png b/umn/source/_static/images/en-us_image_0000001675255405.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675256029.png b/umn/source/_static/images/en-us_image_0000001675256029.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675256529.png b/umn/source/_static/images/en-us_image_0000001675256529.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675256657.png b/umn/source/_static/images/en-us_image_0000001675256657.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675258381.png b/umn/source/_static/images/en-us_image_0000001675258381.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675258889.png b/umn/source/_static/images/en-us_image_0000001675258889.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675373901.png b/umn/source/_static/images/en-us_image_0000001675373901.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675373905.png b/umn/source/_static/images/en-us_image_0000001675373905.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675373909.png b/umn/source/_static/images/en-us_image_0000001675373909.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675373913.png b/umn/source/_static/images/en-us_image_0000001675373913.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675373917.png b/umn/source/_static/images/en-us_image_0000001675373917.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675375297.png b/umn/source/_static/images/en-us_image_0000001675375297.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675375405.png b/umn/source/_static/images/en-us_image_0000001675375405.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675378241.png b/umn/source/_static/images/en-us_image_0000001675378241.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675413821.png b/umn/source/_static/images/en-us_image_0000001675413821.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675413825.png b/umn/source/_static/images/en-us_image_0000001675413825.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675413829.png b/umn/source/_static/images/en-us_image_0000001675413829.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675413833.png b/umn/source/_static/images/en-us_image_0000001675413833.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675413841.png b/umn/source/_static/images/en-us_image_0000001675413841.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675413845.png b/umn/source/_static/images/en-us_image_0000001675413845.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675415213.png b/umn/source/_static/images/en-us_image_0000001675415213.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675415841.png b/umn/source/_static/images/en-us_image_0000001675415841.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675416345.png b/umn/source/_static/images/en-us_image_0000001675416345.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675418673.png b/umn/source/_static/images/en-us_image_0000001675418673.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675613937.png b/umn/source/_static/images/en-us_image_0000001675613937.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675613941.png b/umn/source/_static/images/en-us_image_0000001675613941.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675613945.png b/umn/source/_static/images/en-us_image_0000001675613945.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675613953.png b/umn/source/_static/images/en-us_image_0000001675613953.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675613957.png b/umn/source/_static/images/en-us_image_0000001675613957.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675615337.png b/umn/source/_static/images/en-us_image_0000001675615337.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675616433.png b/umn/source/_static/images/en-us_image_0000001675616433.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675616561.png b/umn/source/_static/images/en-us_image_0000001675616561.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675618277.png b/umn/source/_static/images/en-us_image_0000001675618277.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675619157.png b/umn/source/_static/images/en-us_image_0000001675619157.png new file mode 100644 index 0000000000000000000000000000000000000000..d8f9804a86ba17c29671c2e708ea7d8a55e9e102 GIT binary patch literal 128 zcmeAS@N?(olHy`uVBq!ia0vp^l0YoR!3HEv_nU76QtqBEjv*eM$$$R;|6k80#jF+; z?O^U55wJ5{BC7O~q*zc+j>O?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001675813933.png b/umn/source/_static/images/en-us_image_0000001675813933.png new file mode 100644 index 0000000000000000000000000000000000000000..39fad0065dcfc9aafd50ee82937d09a913802d1e GIT binary patch literal 356 zcmV-q0h|7bP)=pun&2Bk>n5L~(lVh5pJg5Y97JNW|}AqZcI z^oZ$QN-i{TO?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001678437642.png b/umn/source/_static/images/en-us_image_0000001678437642.png new file mode 100644 index 0000000000000000000000000000000000000000..f3ba480a16bb902208d6f8e24db815ba27aa01d2 GIT binary patch literal 38616 zcmdqJXH-*J7%q(CjHrN&qk`1f0SQHsCM9D5R1~BWN>CvpB~)y4#bC-C<@9#`PrJUsjAw*KvCbbsr>!-GX#y?nvcA2G|FFSc>KEw#2rOgufDlCUb+ z7Nr#6J=sz{Wj^#gH!-JHsq9Ht#Z8kF@%_p>r6ROm{_s=Y?-H$PFHf9JiNUy@YnGIj z%D9>O;PC;y3-YgjybR^rym|Sd+^>Xjltb0Kllecw{IqC#tHtKH;i2lFdGLpJdY7s> zZe-|}paO1ikk7~gu!-RHG9wQ8?bCfMo`3t(gH~hgj_prvaMIatU!K>8Z}ppp=T}D= za2U3(uTZ4Ow@;~=(4E_#UKal^3*)B{f_avDT6SV)nkVzZxrovFhZyuY%>3wCdp;mEtXsDrObCpC-=(mBz z4%q;Bi*)}Z>)DaSVw?`VL>k%G+G>y%ppno0VY@PDC3_gooH;=KjiXvSQe~w*EEQ#p z-Rd{_`*PNa#j`wni^0YYhpZ0$tFg-p!0ReSPS^q+9NlQ4OlZ(zz3_7Lz-_wlb`7`s zBn;p}bo<)`u<}$5zombDg@6l9g!k1^HDI!k`K@klKf?n}sFMR;TWp@vTx=eg2&*>w z(^QItBki#Coqw4`(5wHINmxDp)6{sF7ymcd)&Eu_{ohbnKLtO_;GGwQy_agjX&v$< z1vGc&Q6C$IN(V1Jwg4K*4)vW~)+cn}WAj;1@_ltq&icsjl!IHP+?tp*fit-a zB(2p*i`E1|&P-?I-cpP7y|9|8)!LRSt;fJ!v^FF=(=Y4Lfb^Vs9=2tirY(ekZCa`; z=nwj8S6kH}x&(&USaJQ7Rgy)n4_aY;`~ZV}bdX;aP2X4;!wo_q3iv$$zFA3d-iu<1 z2(3SsRjyP}ApMAD;nyF$M2!?f!UOdNr0VJfvyt$WRS*ATLiapFm8(4yOi}4E8X?Y& z)dN-65nYTaRYcSonmm4;;m(c{Nv;8Cq6s0a$1}<-2Q>z#ZlKwYxKT1XVu22F+97HO z%q|}2CPoFPu8dqzM)j2>Ag76&)G2dx>Jy6pg1b8f{d{{Mn_INwkvdOJB+vANAe2n;_tLHa(~Z9xJ}Tq8ZEG{rNMp=O%7wXOhi)b_D#Foe7ngZ$AvqTHWzMk?$tD0!l`e! zcNvcvfn$evn7;|g?mK~mzi(|@diNoBFRuT6`$DRnh8??lZB3cM6`<#xL9e3ZlJ6ef z&-W60@g(FW#H{4pwG7>lXV1Z|B{+$!;}XnU7?HrEdpCRO=67OVsIH6KKQ*e-t}Lh& ze}b32N^gn|vIQ6}eCH6)*XK*uE2GgkrweiVh_P2_sTOn;kjwSS*S9OfqWz{fhvV$G z+s9`Q0q~bM<#CB0hb)6+0B1;$+66eaaKzkWqI0d0U=24PL9ctir`PwGW0m*DpFPgI z8F}q#g9`ZL-p!x+hguGG6Ox4Z+P~W8KS>#t&s{4aeGXuIVmrlh(g3#sTlxACBZkeB z?6Vs_67s-IXUClard7A`hV?y;-&5gB6JD2e2JnY%vC4MOgOf^b<#!=o5QwtdZQED( zF%B6b2MPDTg6w;FB9Bz*>4!zGaiRcuKu=K@g@hOP_TLCOLQKQ+sJ+CyzV0|8V;3=J z>D=m~)wyWUy5| zZ1150sMz5_5j85&WV?1|_eLDDWq$SAo0DDCcx2u3snfs`5+4$La$vr#N=L;Wu9CYT z4aB}yyeD(JgRzDLeyzUeR5+qJx#%nFmL(IF+#qz3&pu(QN4nBC$krObI}aG1yOxe6 zQj(1}eT~Nm@BTE4(X< zAzn(XH`m0pZyJy&C)s6jFtQP7)LvzX2HZ8xcTkgJb{%5;5J*NtzPHDti_%-OBrOH1#xCaML zPr}60-p0GMJj=Zq2Ma^>#2z16y*2D{Tj>tslvZnE|19W3swNj5lO}y6;E4DEiH)*9 zHmVzx6WVQ&9}rMZ zW6<^67r_;<;xC4B_P1b4#1}q8HB&;c?9+EZ(wF!9n?K9 z-8WbRmRq%T*Cal_zpa%#GBeeZnjZDn&7XfiDN&c#!02yS@9z-jz0P}bfO+!Rv9n~b z!sHxioRz7UnXMFQ)en*fa{ZoHZFE{sWNqE{0QpNJGq)1xZ{V@ljosO*D7}Y=;})^pkw(JL z^w3y+p9XN7C4<}WqUic)FG74Q%02|;mq7o%RHb<2Vh@c%uv1Xo2G`K%Y6Rg%Rzp0p zVC;bs|Fs`J)V!cpl}zFD*HZ3$LzU3%T&NhM8d>>WrO&>tp!3(@yFQQ-sa0>bVdsNb z&~%H=-c?ih7OZRsIr-6GXTI6qS81?BS^J3P|EnLDgTsAgT*cLYiCrmvdLv1X)@T;e=f|UxPLCZbf{szp=Cs`bn%lWuhyye4x>b=ory(O;E>B1!3h$9 zF4Kam)$4zx>%mn*A)N`xZg0C!2l}h_UfC*{IdCxn33t|^#3A9Oso|%A$v1&Y9FMG^ zotvcoON)D@&!du;=%1HY!;GzvK`) zZHQ;I^ascTci}y-IoEWyce6>nVco!N`jCoH`WN~$##Tu=BdOf`^R#? zN*N`%E^xVp!%&S{ZQQS_Lh>ZI4s7-wuA9X?j;E4!Ks>|T5fJr$mnQrJQ~^XhU}v#-+zABVDIX!p-D?ez;kC5 z3S3RU48c`cx0PouE829#(M+YXUqSrCOb5izKQ$LAj=96729z%A=cu)Q6dYI+WS(G? zK=`}bt@+ffZ$fQsQkU+6Dp;(_qeu6XAKB}#wxj1RNxeMV{X+(m`tV1vlO8XHh)}>d z=BSzd^@%a2XVq)g;pDO&zD-L5G1tNx19bFhyO;1dGm&VEQo6l{OyC;Yps~Dz&8{O% zDJG8iig&9GkK4b=ET7--RpO4hI3$D!!vR8PB7rt?^}6w0dY$EM+F{4d@_|No`z6~F zEHWd_#cS}x=+>$>9f7N?Un)Xm@u%-5L89eg(j34PCJrFiU~PFmYp@gm5=;$E4lTFf?N-Yopv-Cf5Ix4ARhmmy1@7aX{6XJkwu;%Zlp5iVaLd?} zTptqUC6PR%>}1UgcJ%?5@EO@>HE$de{Z>>7fShX_KO5s&`O%lOSnSN7+iQuQ%@=*1 zi^b9NV7pWjVdo05(9V&@ek=9i?!zO_(FFpi448qrHf~03jqI)H)`P&7R>>cahS-S@ zTcBOvogZ$Xom)?i9-jQ-ljNIUWK%=Ld<=D2=3samhtP$kXnmtn%py*#=)>0PFoO#* z&|gkDZM4xgqs7)fs;`HYzzWtcSfbFZ6GrKvxtf+!RYibjl_1k z=JvSH`h8wVL=+O}RFr@O`O%a~&`<}85WQ2klwpN+N*#GNT5gqQy{w$awLWdi`I_w+ z{oxnT`Ig*A_WjDJ3tYH_`g%fTC9ITw;%2(a%1$CNeQlj^kR##w`sy30;g4f0Cyd?f z$2}>S931l!k*gNLRK9=bUOpvQK+69HjdM>sq1IID*R4+N`&65NOmfc8*;GEpeqf}0 zs{5H&w3B}duD{2sxA)QVD9ffIH72J2usNsKG$bVt#p(ML`qTtAY-}&?>MusOe_9%H zE-F2O`mVvaX5N|K{n=u@bJ8?`Z*Qy=v=47`(TofJZDvGwX)qbr*OvJ8SH{{Q5sULb z@FBq^xDVwg8~V5$r3d zSoF#GCf;b>IIYK2xGNdu-oOF+M}ZdXyS)E zTTAbK=>^QTXSy!UAzr`HOFcfW> zB^cbjXLm^|VlA+K{ZXDK))6Zx;7KzDtZ(o2Ke5W|mYyWIY%{Ta6f2%w>;M1~*!CBo3 za7MaW_FCPZgy<+NXBOf|KRg=9IMcdTb?4BnJ4=&+`+LotJ;zIPPC0iXi>=6I43hUYa ziUQ?U7Q`xWSB>8=y?CPBx12lLahp3;jM9MuS5|<0+r4=|;XgO-y8nTH>f|@Lb3YF6 z+Ac6cH+?hVR`AnH=+1rJ|N3svIoRnl!0S-Wmw0|PQ>B!IZxmgd5r}cj8@|7l|3Unj zx`3S(Z_p zSz($wcJtV}4g2teZl8(-+b9$hpNId%tSIVE=^6b}*hi?VC}>f1>n!C?HHxR}Cl`3Q zRVKCs`~2D6soN{5NQ)pr8Q@lvG+`u+Z@ zveC+Gt-@n@R+s6B6oDQ<_Br3g?r``MNgfKUE-0$-kvAPX-11w(`eK{LL*PQ3cbMP) z#tUiAAF?<0P2cHr77Hxz_MU1@)l{fjxVU8nb$|j<+-?Nz*_jmQP85^gFS$REV+|U}umoe(%QGgY?Uw_uxx?b6C-YWwtW)v7B2b^VZ z*sQky4A~lCQL{@S_2g7@>_@yYwqO@h6FxeuwYwVVH(-%GmbB?{4=s_gUxe|oZNs1Y})WS;TqVqU@XRx=GD)|(3+m}=kf~;R73L$(oagfeKqiYIef^XZtTff9#Q9?%*~+60RELr zjswEV+>F-X)JMpry}!e0xd^o-dfHmpZXyRX5+p`$1rD`sSd;L@;r5BS!I=r z2+TNlYgPI-thKX@L-^Ag0`E@ zSf(=vVuTf7e$@1tT+4O%pVbb)vB;$h7*_0r*UjVTK?Q(R`RU2i=W8!XpYi!;t~^sv zU6UZ)H(VdwObmFj8j54YMl$R%k$DsLIwCwq#UFAD<7Y1 zdgqZ&^UK}W3ZxZMpV8iVd7;-{cIURZ5BMSo0=CcT2rSa2G}QQm2VAAscfU^G?db+a z_k(TU@FP+r|Lk|Z0NlPJ=eJ!rs)jSPXG*o$&a2q&Aq6AJCni-^+ZRPSgyi|~+t4GYv1hYhFM>-~GVfh@ty-0(gPjk3C-rK3C_E(CnPaRf7i)Ki>fK1X-~pgSr&l%yQ4k!?7A~B{_V#EII;NG>_Mwj|N4klDx zv-n59WDrH1{SHKc)>|!s2%Ndhx@r6@WEPmJGaNqcNS-NxM7pEdzr8ufxyOQ~uifs& zwLrj`-tshm*UTp2A(2G(pdRoG?ZN!I^I!$@6`AY9x~lHdF8%Ln^v$rS1XnSZ(jR6(pnSy`P0=*FqT1`< zT=8EFl2t5zR@Z;YZFk5% zf8bjeNR`ZMib=9#X5NF;b>Q@^d$2w?N!96lS9H_nzPOc*^zxI- zBzjZ+GaXSjSnfDk+w7pR3x*(U+@yERJZZr1arJVrze7Rql-|Z{2c)c|8%qqKPxo? zoj=X#O@Ejk*O}Z8;7b>N!=N52X!&T{RBZUt^i=24A(1$AK3IPZd(5k!`scR)7iT9_ z3=Pr_&RH+S9}u3yc3PE$@{dt!;}g;a(aVl6s7e!lNd?@wy4!hBGIKzqdk9Hfobbp@ z@jd+alG$1yU*Cp90YonpHteCKX=flhQIN2CK6t|qCfO5eFBkm9k0^u)%u8us_4Sui zAWQB`-?(CxX1iOVTBT4ET=s#q7HH)`UuxgN6?m`K(na;@pQV8Z0lgKWM^_9|cQ;}R zBN>cidYJUx*@42fj8v~zb?5%U+NF<>eenwDl5+joc1J+w0PABy9j`X${^1!?#HXd% zi~dV_jHOwZsWe=IBTh?1J9V%Wv~?{B-H=25%NQXb_zMu}=bi)t{F`OC@ZuMZfY+>p z+ECDWn=1b^K<6vJH3xW_gy0KDT=>Am>Bu|Zt)fM66-D4e-bknWa(6dm`L#wKI57BF zWtP719Fl^IcZ9HAnNy_~jLauGr-q@FoG3_rqQdgi_7R+Kn-Bpy0CIfC^=hBqRgsV9 zn>DH#icxGamq(R|>!r01Jf`I{2!LJ=z0F$Vm%AaN8QgQh6R#R;aaxSdrN!NWK$ll~stS4VJ<)_dkM~I+a`gbY;)faC>BG=Z@~DT$U8;+0v9_g^wM$5`PF-gi zV3fe22~Hkr>=T>C5sg7uTDsZ4LZ!Tt!CI}Z`(h*0b_@29@UJz2DP+I`XJT9z-eU*T zFP+OX?b&f;E*f(RcZHUr~xdGFGPH+|H&6taFlIYEkMX$R~ zN8ze|bcwUZU~kN>rhmqA#unmx4Zy5>&Bi6P7$OFUqgiBH1v>V*0i`)3@#j8Dzyq8* z!Myg9Y_;m(n+kVe9=vHuMzlq?%iLRz)YN}WN zxco!%{B#gttXf+JTU{(-el4cPPzoOs*~NNwlvZ02lfin-11Jg4ttdtX0?broOC>2{ z?rc3d3?j8*q!nyVjuFD9R2B}mIwz+$HEediu;19+nmK|&s!Smt^&?naOw=xg4IL_}uzP1Cqvo!*^$1MhlMZ&*{ETO2k+JroP_>N=bNEu6w96CcJw% z3V#KzauEz=$Lmea0^>1K6~$1l|EE`YXy33uIE(NvCkJQ{eW!(TBkT?Q<{3bFejzsj zIngMuqD;aYL9%OxL`#FMez@V|2*(#_#Uqn~(M|YL zy2I#L4<4$84X#9?(=LOyjF(kst^^QTWFf1V%Ek93peEtEeHq?$D!A9iPLL)QNVVEj zDcuPzaU4-^5&+DZZp&>1~0b$5aE`J(2B&g+VQSanABqDRd{;(`1kjh$HY^yZaE?hjb zt#J783%mpmttx`Yfz;D@;`|=5iHodtoO^^LNpGyhDo#hW_Bqic4vDF{X^>nzaT*vM z4}4`7XRH&U%~VWJLuDikCz%~I<)Y&1t+>a3)^mzO_6aTjo^Q3<@$ykrV`&d9o^uT& zCkKqy?dOoA%AMD~uw$Pk+*!2WkLEmHh|k_olX*7-N$*Whi$k{G;zFDBWG8=ui) zSe?x5`PHbEUwa9MFg}F5ky3N0HC2CaA)X~-m7T18FK7v$<5LkL1F{<0Vn~Y$@`g&r zxFuoh9z4EFG;k0fbF{_&8l{Ecryd|b;jL{UF;Yl|_36Ins42kRy)>xnO^l+@nLCGb zfl)9MJSdqaIaGbvpa2*7e9Dis$NPKClYfNY#SD>}%>sPk!ldwI6BPL}j~yRyW#D219t$KhE&?ODJ5V7FCAANzi* z_!t&R4R2Z4@XzkyUF8G;Oro^xlZw~Spz(08j-w!!UoP_IUi_MR-Uw^26DtYZZ@`d$ zNQ+viVQz6Npp%^kfV2SV~4*JpcVF!p|oDO-~P z3!B2wssj+E1C`!WphUKKi&G8r9{+6hmA-hXKyMiCTPiGRjQu!B_YFBXg}Sj2Lw+u= z*J#t9I33(BTvpt}H_*4q=!tz8qd&1?v<9f&DA(r6e*ne>waZj};+X-xGh4Au%)Fe& zqu2SY-3?W}oEU}3x=P$uOt_UbsY1dt_VjC)DYJ#U>lI3)!ZeR#$z|!Gw{Ih^-?*tQ z;RQF>sJV(sdOTF_d7NC;x5Z`cAo2dHT6R3 zrRDX4@R*p=A{B3IbC8Dq@CJ-{_^47N>!yoZw;%&!s}Jhu9dm4uNUa3{>QRe8N&_&H^FTJ0_NM8Z!g{Mr;}cc(R|Ms zv+4>Na%hdn6iS|^>;3)*aYib4Tu-E2vfa1e$uMc#u~2T z#y%cqEI&t-9tS~A&9uFT4f`y2?1u*vWkpE%q!ikG*p|S&=f9EaHEOxYAMUV_%N%e*vmZ+H$VH!`be7a!Lje{Yj#@ z;=2WJ%CBZ%oCu~OlHO4C7V*brYL;kmYo#}QQqRKSLXcAfR|;QQo(Whq4XL^vpZiGk zpm{0gR`a-@UnVVD253;Q6NO`yd(s!i!gt&ff!>E>1899M3%^w@tlje;55KA%yXeMh zZF+M;c6sBu@G0m(Ll6ygZ?BdTwKr$uAo~M;{gYOZg<}~}Z!Cqt*nz))T*NIAA0i-p zJWYpZq6P8zUJPTgYA+-Fb&nnF)ir>tBRI2oRR>J%6^ zIKA4%BYU?U!2difIats5$XoaP`Jg0o%kg7Q==AAH3Xtb1j*2x*2Q{luNPnbci0=rI z7lr$?19>2`Oe8g2NV1HGv2ra#@snkDxp(Y%=^U!4ZcF?n4b5hRRAxZsNW(-Ngr=tPr!76fBKs8H1w2+>-}jYNjv8N9 z<;@Xji_=l^L^I#zYr!)U_MNvl;fF4Z5SR z7k|*UO2$J2Y3zl}4CL)C0&#Q71eQ|Qc%){VYh_CyK}uJTC|(G)G!puo0#tkjo~Rj5 zQr+VAZTS<(B?lcYsVglN-UjhQRfcq+hxDmLx zhH`gb%^s==(MUJfihay{FZpZscl;G-Z2z~22m+=v6G*TY!@+E>q$cMl%YFZ72tdis zJuspj3k14+W6F=T_TaIE)QU)%HAWJd?DxT$n?bmA8NmKgNjg+)7!0 zpD~eqB1yZC0Ut|7(rgZgDC-KRpjX~4j7EX1#-!9-XQ*HrcMf+P)Wg7b%qsjP5Lm(@ zV@}=U4ED5@WCbT}ylnn@?DRJ{gu>*y(Lhs}vCO`uXz4WP ze%`QM9O$H=Z@Rd31^i&TyEdAavXV>981Z-}$IGCv9hV$Rqg8#wk1&rdwF2~^sX zHRaAiien#S0H>c!F}r^Q3KSx$t^TQ>iHZ5n-Qit{%OChjYqk|R91m;-y%DZU_LEN_6cM7C-*m6ioJAp%ji1%=?9+P$~EP-FIHKKO^m*_(!Hs| z03JNP828T%!XWj##UDC>$0FTFrllm}u4jW1adF+d>Iwy|jf$t%!c;GX8(V1}3R8Jr zU8inKQ15;2>i0I~+T=;drGsGRd-99%JKW?Msc+!PXHmH2xE{%Y=&1tP$>WnTGJ8Nl z!?#lV#pL@a`NzmU@VKDGKb_qKqeC$J{`k@7TnFrO$2E}rIwphF;Z7ulX$_QdaAW|Y9*-0RxCoruc+=3mXh=)~v;cc)>&!m`ykDhmC-MDsN z4+;#g)~v?=Gped1@Ll5kTZaSkuWb$GJ-ABX!b!U_@$o*?foZQxJ1-*ln_Y*gsuA!X z&L_-kv>GyrAkBoH&LLH=)#Oggg~RpX<^^`3-hyYgY*f^V)$j0(R!nsf(t%UJ?rF^j z82Zl#jl7TweQ3Mhnw^@O>cN=lUYM(#j}W#CJ~LS1Ej0*+g;ncI0J}sO;eRw;=rtOj^{57v1?MrR#ExT2;6~69mew=|I{U|71=3mYv_d?162NLZL29W(I>;#< zX=2ijAO0=uHF!qisaX^Bn`X@8Uhwsik6?JL_LVEy9=C({^45`wyl3$5bnkx+!(U0Z zt%DBu(@7KGDd+#Rfxq&x*Zw~gVl{}Lz3abdZ6|Ubaf=+S-k;(vr|Q5IPGL-bl6Z13iDUHU#Wi+A(*I)kQB%7z7T(`#4LSQlBW zNSMe5V8=BPUFRA63HEcI}kv)b~XX;Vgl^p9v z&{LK0)(9ochS654EgikYOU*{nq8>qSg4XocFbZWuD-YGIer~L5OfOeSB)GuM$NLYY z?;$ci`$c)($N~x+YctY8B07ETA}dOmFpyBOl`&r8qnd#1wFyQ$L-D}V@YX*kl85Jh z7kJ_p7BtC6-MBlgd;xAA=bFxM=byFV8N*3}gf1_7klkS_alADNEt|uXIxWF8KA0ey&>R}o6*xP#JhmWAghb&RYggR_vWV;q;bjdVZIdcSZE;|y zZ`9cb+-7nNH_Bl*{xfKYk$tdmSoLNxm5jcxtZTREL{HLLa2)y=au`aSGMCBeI$kUeOk zQsSv&_$%L;p4B7#Y=uJj=E3>XF0!?{6A+@PoC(j!JTKLuK%zhLT?V*<#VtM<3K#SDz&!Ts>K z?GsL0n%FH_XhXJdq@_{}-t}fInBFLMkll+DuH6~X6wg&H6w}A4X}RSY5d?5SACP@6 zAf1ZCMKVSbasq5IZx1F?$wIVqnRQrqKYaGPX3AZJ zGmDAbjA^2Kz7e*5UW=oEt~9Z`n~pET=T{)AUbrg4S~=akyd$*!oBKCb$aiW)Hvn$B0Gb;J5LS-{$pLppOC}qoC!3-Q8|xAZ z4`G%=-Yn<+4kc5T=at3!$!P#ygW58$`AZK4B3=_V8=qY_1yPffBz7gHO+d(+i3Q77 zSe#U9z_DXdfBfUf--b&Ac$>i4=TtuOxjFuzEnhZ0w!d$qRk)Um(W0C;)SYOgDukl7 z^3gNz7FKa5JN4p_s>EeWRu|Ykt`yqlh5Ub3UmSjxP9cibEG#NKoX_-&ykU$jEs%OX z(W68qYX8hvtniTNf4fUh)-7@>ef=ULPHVv~eGd#}t9#ku%=eB~5eaX`)JSUkY#yi1 z=Z?DAz?p08g>Vk+z{a|s+_D3HaP0ysiVOigHjR2faNWp%rMYimb%gDPEv7bSpbtv2 zJ_V}G`?J=c!*0es{#@&b{YM=1iiA&uXp2a`-|VFFjjUxCaZ`5_n<|y*VFA zWZfRi5JMVPuofj^{OSGa;5yKOA)}+HGUYxQf-sRZz_Roep$FHlSRFo27C+yIJ+EHW9uu0&R zs&7d0_UkQfxKzV8m4Em!s*ejNkWr;Jm9F7EKO_IVS*$b*-s?d4xR$OMyDcdnLn^Hmp2@3QwTI|61) zcd}oSAH_6G1XT}zX8(lj3k72f&eA!QIGk?{6s+3@%5_=Yw{0!FaVq4J3A-V^9Z1lD z2fq8IY@|H2pYFdz%X8@eOe@&ms8|vl+T5-D7Vm0@S|!1n$!}@z!+aAtX4oByPyQY< zY%Vlvr>N(xSBMh=g68}JX)7c9HKqG@0bP`l5Vm(fQydu-L4e=YKZYcYdNVtp(V4F^?B#^^vCH8%+gnO^Ap)qQu}Pf@I$b!HHWr08O*?sP&)pB{t}@6ebQh(l*O%%Cw)}zwU`xV=dNIJT3q=O4C|X*iTy`}PmPi~PE>yLO(9`3-x&&0g`!Q-0rQc<9Zv%rJ$fHTEsN z((7kJ?%h1)%-{TmlT&g7sJDk^H%<*f?lm0@J2T-6{FZS4W){rfWZzf*Sape)P9m1z zF}cvxsF0Xsgli?8ab+WRG^JtL(sWB5pB&78oX7TO+@9QJpU^pX+3+Q&rc$GWIE`n> zJX!<+WvYwdJ=q{(7$@IJXvv9v<;(4<+Q>_DA6vsQ2YD$l?pQABd4TAjW&=jnx?6{H zzr`F&aY#?aqaw|Z!uYw1Q6=Nf{GZ?CeoVTj=-+X;?drJ%L*DDVmUqzv1S{*zFS`ZY$ldYk-io*Dz6Jg#dFzRt7ha58c2bU)(pGvX83?T0Ll98A1gDH< z#vHGIc@Z_7S>!o>Ma?)yr6ix1Cr`S%^)q>~#U){~^hN;cCQ;j|s_$+BEp;V1tEFwR z#8uYz6fDa&wju|`?s3VPWFWlclxG4Cc8*C2L3gIv(&l{m#Z$l|398^5X8zlmlQKXu((s%n3-2@MbvW2`Y~hQ}M)~09 zTMv*cxAeT(_dhr+l)nqbH(v>Y0?CcSrLgRa1K!XR81Q8PuRdm}FevC-iXj~o`%w!0 zNZiQt_SyHNwn)8E35U{86HmNc6?;Lx>!nx+Et=r+?EO;U7cbw`cDuszG_kG0fQwsYVG$E&-0aDA1--)8&2{P+)M_By2jPFk9`OLJjK< z_%@wpZUb%WFb3-HIHyD$38y`{dge+y7qu}tIgKNN4sRe72$*JAEsLVQw!J?^ z9L}|i%%oU{RkDD24C+lXgd$QiMr5Dq4}VJWX1{oq8$fqY?B|}xhens8rpU#~36h-) zXZFS7k|km7N8nk6f(sG28&PAPEqk}T<@PbC%uIIc_Dig8q5pqQQo4q=!qzNVrP-lY z+N8ntfdv;L*RnkOI!cnK6HG$?EleKA&!%s()0a2rW@pDA=Q@ED9FlQyHk&Fd$n|8A zT9$4jQchxaBo2QkB7TiUzB^dyLo+WAW_!tb_OJ65Te@nQZv>p(IvKO`gZOt`uADPm zNI43BdYL(6f)<|(`05VmJ-<31vGbMzm}&hx;w^6lm>2`P>Il3SkV+CP7w(re>WmX)UrJ3^b{lny2Z~>8)C$$t*IJR zP@~Te;uE*>K!$Uu>msLVv{An1|MeYXsRG-Y z-SO$RptU>YTbkW!k8REF2)`q4NS*?|l|i|z&N~}3LAj)dxl7TOYCYY|^YZpn0Izc> zs@MsJ-Ty#+TTT*o=su_&-4>Y;0#s}yd^o+W-5$P5`y?g!veQixcktw8ohFf7QbCcy z9?;|QgBmVF_^zUtTL-DG!hO|ORLW{A=u1Xhuu-KGz=|r^`sMZC$}1;3aKNDc*7Tm( z>;%ah_SR<31J_ICV7+#|+QNiW!8LW;r^Ie*XzH>q_%D<}_*VJB;MIbuS!*0DGaELd z0LgOOK(R_kLXV{=K<41$yPxRvO;6Rn{Gn3J4H4sqwH2VakH}@~bRX$>{QtD~-C<2- zUB5Wa;LIpGRzwgS8wddeqzmXMI4DKBp#_0}^iJqlMl3WD2+|cPQUd`(6CxrY2}MB& z5Q=~yQX_-_A&}gi0G9W=_dfT#_dfT#f4q6-nFr4~yPUoES!?aJe(Sg0dtU73syP^1 z>*YRLhrqhxKNLlqQ{IW-L`^zAxryK;V!3Vt&(pfM)gO;;`rN!&RamlB4n)sy=hd}U zXB1rC2KO~XEc-p&l2l)29Y|{sLplg8^I6tmLP0*yJ~-5=q}+a+1#*ywSGVvU?H)ju zDV`WOD=<3zQ;l1T{)25$Q;UQ^f{{Mh^shd0%f~KY>Q6(wfB)&*R~J z1|EafmMqMg9iZb9=AKeps2J(?oGX7De%;Y{1d{*g;h2*t6og5a|?M z)wH?UMuQ7oTt{S?0m3qqNylMD)hBadh);wIq?eQ07d>EReLiNg;-M)WVknz-9*l{W zWKrtF8AC#F+f=G&h^IN-H?X$8gvWwa60{G_bz1yied~7(Q--#aO}TAB%szh6KYp&c zOQ^L)n0KoJP2HE+@nyc;+U12pK2jV56(`i`c$&9a$Ap1!$N9efYN%?MBT1d`bQwoh zS-CT(XFRLjCxlv-0`*Y#ik@_jUL)OTr7r?On;;QnggaX(D!19uL7 zGw{!pheDd(B|$s5cx+Gz$3|#?_G8H2#;NGZ^E0Nl?!obte5fOdU!uaSW~b;caBWlye#!uZ{Jng{EgzaTi&U9rcw4c z?jnQbWjuvl@FsWE61`8qfclXrDN$4nm1xfZX4JH8a@oPTRJhTf#$sjCB}e!@wp|NJ zfa)W&U_TLA`n{PDe1dL8IUZvm-{JbtdMegfHF3n0a#5kWPB1FnLBd1!Y>2ap^YSP# zdk-RNW3ie!{@Rb#1cO~6Jxz}C!Bb2Eg>&70;{rN3`(k-i$Y<(1{8<}xPR z9NfF6oacDwB+bQe>(Pd-XP#&0oK#H9_#%2TC$v2RGASBKdhVV2$)ATui$*SYK4x+j zTiISUU3rg;Xa?pl*i}gLCxi*=u1H0cM{7^>nsy(y)qISG4357=LoDQV(Wu?NVtC(n zw=f!w=AMBN-x0kZG~YW|IhDGabe!SENDh8Tn(WemdC|5PcYd66f7YFDQZvgBkzZl= zdBnx*m4wTVqS`3uf3CDOldNMaS1L1ha4l|9w3IytIFCP$*LhW9&Aqs67r5HqJ-vKt zw&Ggo?Xi~VXQpH-xl3gqs`?uy%iftth_O&rm#9XNzIOJXv* zG!kGFs@$f4)~dq$vi++9dxzr(}LcTmTp6(l-CfR#FH z7c(fYx1-k(-&4`;dA1y0`aw?h;A$=(v{!b?A`=_pa#|$TEyr9UnCvZk#Lx_@_=jPr zM5YEn%OYQ%BW6MJQOV+6=_VlY28btHGd<#BC$Jk42zm3f<$^szhk(PXhu-GCx|~># zO|El#wsaNKo*UlR&-KoAm8NsD_9UNAVP~c4l?t={CLaB+a41T?*K#c>yFX+s!2V6S zey|!24fmOvez2;oR=eH4A<;nib;)z~+k|btjV4ao${M6V?*&q@cOv}HTD^i=2=O;w zs$_%O?jQ?3u5jIFjm49JPy!)3%!XgMp{Fl=q#7)^liA-=wSTW(8!%Q7++NyNIx_hp z+IXPqP`hhW#C0IO*bw}lHoG2SS1-O0%bm%?MR--+v8&bQ_-6MrK}F1*g& z3s*D_x%hr=Z_Zzo*R=lTGe2=blBb3hc1H=RsanYC+zXeu&Gi&$?f(py(TiZV{0k$7W`s?jBLx44W2=v;9pO*`yq=P@XI5e(6`hy>b3l@w5_;JX; zHXdekzy7a0e7@3SOrsKDxBLL(XalhO_(3T5kgu=r>v%Df*C6o7JH!}T8V4EJL$Nsl z0^~;cDB5E)1A82#Zl~x50_N9w2dTLZ57QKTkfJQa=3u=E1(9da0Wny1FU66^m9L(Wc3Ibj92J*ctYTHFR#+{LN6jIV$G9d1bs+ui_T9dY(rO- zd1S73`GJ&qw|^}u4X8E$j6VP+jtumK@Y>1SRd*fY@pb40PZ= z7^dPgAQo!v4BTybm-DV&b8&%3%a^j!@I4|qMu-ffF3*yE`~%N0ec@&zi+Wo5zn6OV z+r8z@|HP2US&D;O{DHkB%Bd0QgYEKVfJz^6dLIY(my#WiLXD@|m;2y4#ZEP@G@7|o zt)zmt>QV=|C~_U~uQz%m>ZrS;TzcF)#vFK&Wv6HyFQxhOFxE9w6Il z%@w`cUb--gzHItPmX$K34Wdfw!#xUVno-eN2oSU6AdgB4*se4#uG8DWS}5pGg=_L5 z*+~G$cj_N7^)Er{2w5Pz6U2bmexDZ(?fR8-0kjOfQ~;#}VUNf(ps3_E)!YKy{f;nc zV}~KB9?08%=D^2xbhn4Y^VJ5w^&L8hR$l8_!>rv0geW&P!TPdtz@fE5j>(0Lz$v1hX5$@L^;5jUh2VZ8yf_HRu1;o+XV~8 z@DFxni8%BN`rLy%#D<6dZIt8rfNH3;Gy2AW62kwBg{{#Rf@CXz-l1E1@bd*vLL?R_ z?lun2OFge+K;-<=*jF^~MvcHDKC`;Yv5;Joj7a# z22jd}w?`ln27_FbUj~fX`H{N$M^?m8J$rHhpB=<(yis=nvhGXPWccS30n8ger2T_RkdR zrRkNFZzO~FV!cx&qDC4^UMggh88|SZb`X4C4SrNpwr=~0G^;VPz&9#G>ysN#nhY9c zv*Q60_8nl689ix4q`%qgv>G(#_jvy%tz%51mOw+ejlYMMt{!_-Y@i4B>Sh}`7@tVH zp$^*N{A^1eM~xVb1-RIRfVFFZYXxg_@@KKH{EXqrm=YB*S4DO(JbO)k{l&mJ;egG0 zE?)eBA`*}ar5KD(nwJ87U2_CO(?v*(NpFB~<~D5c6?w%&^D5;ZtW)61KV^1#Nf495u4yUzY_{F9Os}V%JS913tG}b2h6z*R_)#&XQ4coP~w& z15A;@u+5Lczz9hn0)si>`G5Gi#}G%-WbE7jfidS3NE0O%UK>Wq`nULY#=T=@CBW}f z%%#`ByNNUSR6PFUH-(0T_x1MvimF{S^-n5r`tj2Oo6IM=!IK6f+tilN`{xPV`0+N- z9a1d18jI}CT&2%@L;vOW4k)&M_X_W)^d{1jeJPVTi6s@6E|npS@T% z=q#_Wg#_9g-sk(d@bGV!qB8q_O~6&f*6fp8EE}2!US$%B*mPew)ZsaO1?f=m4pt;p z+s`z0t4Yy+k!|A8j_L#H+ejCR1T%FfMy)$1L7nD23!-D>Rsh+RtWFQimaD=906%v)JMiMddvS&-e**=+=kTy zek_T7t8$NYGwoOP5 zUo0JoeSUs4BrH7dXwAzIk5J7&jq&}aV-!q(`-`6i)uNe;+$7?=5Pp>U zhhd$n!Dj@?NnpcaVr?W3@Gl)QrY6JtpJqey(6^FDK zWJ90suta(@T&UZKmvgfEds-qz{6;+;5{-geZ3-cHS<6^Y`nZ0TBaC!@$NuZ$C=0K| zMY0r=)^c*Zi<{MxHzqjk^uftcTT&WiVZU56_ZN7cuDezRdd4+r{2h>0=%mQQNg)5JAc?7UcwM`&PU{?5S-2TwB5EH7<0Zn;}=G5 zz94!zORvVoOqd`NGl}P!{m0ad-w1hPB^1&2xWus5l~e~7dbwK197>n!zewN%`6BpY zkLaZb!dU09bSTQcn~at@3&+y zr}SJaXjR5jG+{ZG;Grp={Tbc!z`naP!=r|^u%tMuwNTlH$P z9%E9t!am%PT|8kA$Z)I_@rNmFI=Wq0_0gmY+aSj zv4Eg}H<)02^UU^~73mUlk%wW6`uU|M*F)TRihLfO1yNsY27~GP)<#Nu@VvA_`@~dQ}~d%cI85` zH$Pm~h=U_2Os}ceMnC8%ac~p}Y&FBD{>%@yZ6?PuO^6xR>xuZ@aQ@_5DID@?bVhlM za`Fn`j{$?bVI%|F+#y*(;`>_utG5e3%n>phQX>$MoP51BW{BkJTNW(g?BaSCxCzEO zNkewMdD_m-P5^A*>N4D6=W?ka>dN)8w=wRvB2Lc;%ZM{o9O@Imjk3#tSX=CCdyF`B z=An)ApdeT4AYcjsX@Yq$`$)MUZSDuisZ2mV@o@!Gdk~j!*u17NverGEV9-E7B*FpOw*Mj=T9WGh)DCRr z^`Dea=LqcUOeoB_Bf>tMr66x!TfICy1LKtAi<9mj;4lliBrYmru5P`_$FW?HRS^7# zhecpL21pre;)@s84h}$#Y#zQq5A^>%Bx@dO;5F|`W-5o_(FO8;1b0>{t_?li*<`iW zUxN&H`P3zkUbANb-++5>Kk7MdVl6zUDb=1dPnQNL%p_4um~2jWMR%n{&4AP3ke$z3 z0&M#tx?I#_Z9yvhGcI1te;o8@3ItEKguE z?;H#0L_04@#agS)OqB*C4GZgKi{?4rH9mR3;PKaZa$b-B^m8jJiBaIM` zP5>jqVxaYMe2Ql9 zhZBn=JFElO&lmc>83@=`)Oq=zmXof7@wGIFYPb+)*$9+A*E4+%j) zt5PvOT{facGv*!Q;he0rA4e69E?D$XZae?z0dNCV6)qeLc<9eMqr(J-+ye2T$FIp>@Z($$*3lwApI=(n^ z1&MOW3DGl=9GrK0IWkplJ?I?3YR7cGn}?t|nRY*RB8e?8oA6f@DM3H6BMlp_l2;GG zaXMZmd|a>2aO}bV;Wi*+U8;gZxqvEI7vb!4w!r@P-$j7B`R{C;{ykzh>ypX3cO&=O zza|k$|ETnBgddt4-qUEsY2+IUA)|($Eh^L6ez|$Um*J`4Wqm9~DYP`DSRUb~!rShe zx`V$t3Q4Y^xi9o;C{+2#okdK!0#{SG4qI-5@x3|FRx14Pd>xy8rg!4YfZ*??L_&L5 z8_1jRo%jB%5-er@@(F3eQXv=(>4*Y!SOh!AF)k|#hbR}{e(6&5I5}&t{gVEZ!QXj> zhDF+)F3G>n1?d)d{pxD`{!CHv5_Nv#<=`tZ;J0dxIsUcbI}gB-Z4~@B`ov)m;6@QT z4K@qC5APDTUA%+xi7+61|sH-q2zQLT*P;>neM z%;dV$fKnsvKD_tB^{LUqcOk6aLHDUqV?Pn3gK)c@6IbzD&UXgrq1j{=ZN+_mQ#=)w z`vEKh?O;a6;D5V|uU#oy_WLB4gmYO;7*^t)G*i<8F#}^?ts2!^%lj}I0*JY!C}`>% zaFSf|291U)U<|Iw-4BmXrHQaYI^W=zkx^P*=Oj-EVBy(BDNIvWn#& zu&q8lDAD@kjnhvJX6?n4F@CL~vEnjk0Lgv@Q(~HVJ&plj!R5O$-;71!ccsBHLd_e` z=}>#;{r%q?&z8D`(#t&i`lUWZ`xjI6x_F6MkuBTo)|sO@q$;XAt+9b?4y9`9(CnAn zXZ{uFact-Dv>oKwX#1CeQac5Ea_W!bQHtoPd;R5CXR5OeElqa7(rgL8wmB8~wLP{J zCgGfNo46;ZbbWbf@{v=Sri${Drow93&io!L?@HjK0UiNFFWqRd+8&%e&msXoPFw23 zV0)ZewUlc8TV1*m>a!x<*~}^yNt9GL-cRtQArs-q0DFWY)euOi*WcJB07Hp%GnX7% z^;oi2h*wcvT<#9?9SLA^$E=*;I`ClAw6lKqOyG~tEJX?BgHJW_nL#&??>xH0<%M=h zM~qNOECrQhvNPfnQJW>u9W8t~GnZ%O(;WelC&>!;xgmn6m4;BduWwdy7U>yMhiy8d zRX6aCIf+74Tdp1ccxUXOY;Zg{{c$4+JvF+a->s`|Km2`TS06^_?)DaOYlIu+AHW6n ztl7yv${ue^tTocPKWq7R+df?wM5y6*eo=1N_M9d~wRE|lHN%?OQ{~#>O%|oyJ;a$q zqU}>K;r#^l#+UC2O64=<_nVC^%$jJO7X*fMf~-bDSF#x!0k5eX-^xSfqF?3xbw9{73y|MaoqDv^^6t^rl zLrW-HFf+G}U+V1#-lcAsR8azis1~I^R(Y}?rg|fGN02OxSg*07p$$91M)rLtC_mI4 zfF~x~%fDVJX}-WHtv*~t)A{GQ$GLeeuLt=fb2bJ+l7|G)^|D5uJh7JHMjGbL`+m_o zHX)0Dq(^WzFu#x$-DNXKGPS>9sg3tBVV!HTaMH$L-xHq9`R~FO_5E}#TQX5G0iLR` zYt~8c0Gx>LQC6Hpem3KMJuxF*=?6`@UegTrR2D8;yyKZ3S4!#!S9@x)-byjvUlglPaUOI z(e+2Ps#y#EQAu^8>&IVmNL;8Me=t(N2>TTsEFfYtAb=T+sECD5qY#DgbNbLG&s+-w zBLc4r0RqI#{7I}%FZGwd0@~!-WIuci$XRSk8!Yl!A?S$D&&U(rAe6hM(Q#szpUk}i7||P?9c>N zaL2D4oHgq4Hv)>(=sO@gYB_R|bZ+S5;W@_DICVDGM&X>Fhu_W9A&9>AnZ;WTHN3ia zX|&i2LPo!Y=YqHBM)lHT0c&qpIQ_4x~K@C%$G zT-mncVf};izK69w?ov$5_>K*ARY}WVfg?QrE8wLYO3m93HaJDa*%s|h3{W-JJi;- zp#HQI!)FYl`m(FSL=z6zDL7$!_>7Pwf{8f6p5*(mExMAURx08x(rLrjK5!IE<%8vb zT^LxQjN^)aq8Aj?Pp&s>Og^u(`1)?CJ%GeCKcuv$fW#>a%H4bO%5Rg*ss-8w)CA=^ zc7<|}&1|1*`x9tu_Xh4)w>JY0fCoG)!4mhKXd5V(q1Q}~A?_bm0T|RtmBU4tAQUcb z;4Ht6Em6gH#rkizeNK{i-`C(YPV`uBbjHq`wby2-A9WP4&=g9~HwtlkNt`F5fmApu zuoyWtK~w>(#We)1UW!nKM4;ENuYTfeodN&vpTuVs@6Fl~S(2q!_zgllSSjKwbJ`*y zkkR|P>M6hm#k`(VI8w>R>9T3uOd9&y6yExsbylfRYd~^oQ4+AL@HGEqVhDx9LcZ(8 z(}zMfL1&Z`RQ6#ch7OfP*NpTu7OqN^Jr{0YDFRx8<8=l8t9M%vs5BlkGc$v6tx5&b z=b;%V`-btkWmo3&k>!@IXG;r>?sL}2oWPNVmN9y>RiO|YXnYFCwXiHB@A~#+c1N z!ahqqUL(^zEyW&?AqV3WYLp=HSK*5GFtRKCqxwzwvvnsfa5x_>tp@%YEl$+@-}^eY zd-dOrfd82v1lgO#^NIDoV?^6K4;E=bs;A{6FuHb-5P-AscusAys{OyN4#fgr51wl*zPTQ{? z1%Gt*aUv>T3uKn|5zqxQ_`klPB1$^tFv8%;?pAZ8k#KKnI<~tbSy_#Dv(A`bt|*1& zumMJ=qz$0P@wRgp8Kv@w*ZgXMG6Ml)_FtPrKYd{1=K(>9cC6zgrmG(i$z zKs0y)ATIEb?6d! zpUTqL!3C#%-pYeeYdJmmZnTW0_Hwk?_m^bWFSXWi{Cr$H+v99JI1{jrS}KS-)jZ0X zfQ?YfVS}hfjz51RZljbf5Wb<8*lXI#M@tc~QE-A_?10^?$tRwWO}7pB_swo8(zTRL zFC@5-Z-XmQ_zrwv-27kFfw!IDNTb(HF~>&!c9KJL!oIJ{)(0ad9^|_h&|dpi9S2?J z^6uH_V+@G>B_U#5?hToy)Ex*|!xZQhxSW|)t|^mx!YgA~W<)H|A0}r-TCZ4@l9+ij z&P%UNnSRHd=^Jqw|SAi0qd4p}nRGScT6Rzx1S z+Ms^TP_p49>tNIQksc*+DQ4xp^w70~?5RB>voVvl4r*air=lPC-0+?_lfjj*kG$5s zVh|5+JL(M1rEMxPBAIkap=qx zCqbvW!QAK?5{+Hx=H~n1&5>|!gl+kN2Qpi6) z)Jy4BMaD3^*N-^M-7I_s9IA;ctQR+n9L+6hzj_^mmlJ-1^~fC<2IQ5FNK0Cg)6$rr zXsan^7ijZbv-ZX^hH@O}TwDj8{(o7g8z`Osx)0?)-2r44gh7Uded!te!*>V>VZL;~ z_WR^0O~nqNKF)Zg0f@|<)-rNp_U2>(bPBx@9B!PgeHNjG^Va}>MN%UG8WWtgAr#uS0NDz)-lEI@4@efgVJv1J*Qw0S+zkjO@;j-gGyi7^0m!fjrc z&c*luJ<-sKJ5AWZPz*}y1f|EclYQK3sv%d%EK)!_9q_1L+&5_i; zd0n%-5MT$TB?4u?ib3Gg&QICA9_wgk!hWGe$FIu`sAFTr&Fh;lI^F$MOadKT;JJBy z^F{w(4nREJvRA?LxBwr{?d}l1#WQp%u$=A`jeYEV43D>eZ7R)r>z4K#aUuxVAa0%B|HMKZ*|gZg2`(f5w`RV~=EGm-ladvi7<_;ImeR$AnCuWO&GyeY+K3f&m!} zZu{bI$Cw*FlyYp|>#f_}@?qy4r<*4F$`nvfES-geOEu~a-%Y&#cElD;j;D5#yH|qn!xJGgbuF0# zIy1ffY3cXh{%QZ+vc*NvNoXH;bmAoM%SF;W;@V;;JpvCX^DipJu{kaotP9H(tSeGS zXkx66P$6b?$Ettj>Sa8dkq8!J4T?{-<3s!Q?pM|>A5ZU`Z1lQpUZGU6W61A)K)a&_ zwj|>I+us2cAe2Xl^)avk+k$EiJ+X>f3RZ9qnqgee0R(StV9gH_rso-2;OGe|j{0{9 z^A!GhzcAd89BCcc{c<$&U~D|Rfm~5v^}?3`Wu=tkJ>r@zm7|#c5-Ms3sPiO8hCoOi zZMbE!xkrtAcZ{j)JrmYq?ic=a#ly^;;Sk6`EQvLj%i1j%G@t&OzYtHc`F>?+&0QJ# zXmJ;w2YWLQt2`-IF%RQn5O1tn_p%zbE@mpz8@*sWPOR$Hs%7j;`PEPgV`(I`P;i*h z;=Xv95x{uN83qUCj^pHbrvFL4%5dPBxEg#~QgA+T~L{_=f&g*8+08WpFu zi`7=kQdRC)#jZrNW`vp2=57{l>1>IzB-`k3x5|GC*L*A-^-17EKw2KMPpZEw+6bY;rPgi~#4z^khGxBF)_%FS)RZ2G-P6M)#(xQC zz65lqq2yY6M+1!Brsl>cLd@ZOBieZXlPVR*?>w3_-<`n!vc|=%1RTsa|;ddPpD>#3TuZ&bj|u?Cl!(y+C6*$mhevM$0Hv6>QK3$0+O^ianJ55>aO7( zEHBFl6+ywk5&Jv-YAg4OnGZ5fGZ4d-dS>>p((mLp9Kek(Q2r{|Ll6t`568xpcewF? z6p*#JXj_h^mha--dX+WTVW#@~)aB*arRFVpEb+68yW0F2abM^4j&Iv7d`F5V_rhZ@ z4ONtXf+zmta8Z{!puIueb7MAVd|psh@(nAh}7=3_h=rDN24yg5VWahk?MQsTI;oX@6+X$^*fgblyuS;iH3X zP9wT%X8WvJj93&;N9c&#YnJi>hxBFq7cH-$kneR5u59fw;csTRrK$UVtTQe287?#? zpVz9f=1@3nb|w8;dPg|Ji2*kNDr!DJAuv?xKD{P1{v}bZh1Sfvpvp2~p(qvY>1_3Z zfOUDMX?E~WSXnX2%hg8Y2e$8uU6fnsxvKAYI}B*l$M@e}CdFfS2z7*73ho*Xsf9D! z@z0j(6|nhkI1z(1lZXBjl+!eyhrZ(SF2~;wrwp%)s9I%Yr>cO1& zQgy|J3Mi|-=|$u06k z+P!!Dv|8Klj&39(jB;gN$E=<0QngChX=^;SlY1?!BEDUWAWr66*c%hyJ{(-M?26u% z#zzN*E^!I=b~LQZJg+p(&}hx}Ds?F%Em+`cpg3G#mZF7OTR+ANwWOTx+d*emS_ z%{ke5g+q6Z3nBS}2~&|NLkifPQH6EGTWb#Njv=+F1(kyOx1|Y!`pMX91OAIn+h}?b z-@P1A`rG1}%1pqQW@0+tys&MwpZnwDpX+M=fRgg?HOb3S3>KR7JS2Pp|7bjUU{P%I zrrRow^)|dXFoZ>E;1{RbSgtjVHA=&RN_?2D->EBL_$a>6(*K9OTeFQ$%>0$TO?zu8 zqq%$CNuJ8y27a>QFve_+U~kEGt~-WZ)!Bi`ZF||fG65_0=FjsH+swJ|EylK{6ra2V z5}?L^w=bZLqao>1M$ko+8pq3#J0Ff!vfOtaOD+5ozJ5oHpIs(V0?|%;cyyZD5vB}! z3^GVyDgjwP_80vug=Ovg=R#smL%uk5h2Bmm4S$BZM-`{eZ_n}ol!x9&hqs3=qimpy zLVr;%6IUU?&}ckIX4@7nRC~6%QF*EWOv-5k<}6?z998^u$Nn`9Lx)NPpG>ZM(^Q zyJObyVxfGhf&j#XI1T$P)DxD%!rpCWK67EJvTY8*iz)UOFD^==R)d!#uOZibH@=Na zBPF_xbim0bQQkIu@B1E!&+#@ayFOjzeKSthZibzuhG#avz5{b!^-N@;`N%41ZB%^L z{lDW=QNaq54N8P~!7vovP)|`_|$N7g@bG2pIDsGjKvyCnVS4kdes7DDRkwyO3&)Fxl(ewOOTsL@RZ*Hdyv(IgnNbP z3iqhpqI;Rvjm09{rifVMVP?|W^je=bdA`Dl)$~b4K7p&So6fRG=9L2 zw~H4wES$g_VVs(pQ&G%Yklf zBP(q^U4}K$$tjFYk7>L2+Yp_Jn^_96(3F&v4XtB8wbC;OX$Pn(2;SAnbr0F~_hkOJ zi(wv%L#u7$t5f3!PpI;-{IIPN1BLO&99RoA_>&llj_&kef^Sjn5Y2JLuaqLg|Chu2 z>38P#Tn9dCD6tj|W)KP5)4kjR(0J(bAgdp=?< zmPKnBoiYv`i;G`8iN_e7w=M`}Q+e-Tl`}gt`fgRVb3xik9Z^{(X+x>LS_!tq&h}c# zYS2MpLZp9E!L7+0;$9Mxn8kefSErBWBkAIby=?yR?}@~TiApH!*}+HRUG zLc&c@7P<*0s8)%>^*%lp%uFh+9gpY$fMKaAkfV5p_ni~LEwfuJ^gldO?r+CO>N0_0+A4p~TjRK7gvqKc1@gq@&$jgF-6A(h65 b!XFtDtmNgH8Ra{GMlyK1`njxgN@xNAeY7O< literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0000001699135873.png b/umn/source/_static/images/en-us_image_0000001699135873.png new file mode 100644 index 0000000000000000000000000000000000000000..60afbc022beda66eb77345013057f007c49bd2eb GIT binary patch literal 22788 zcmZs@by!v5w=KL8C8Y#JS{mt;4v_{yVw2L{-Klg-gOoIEx zlIji+2zvYDAGmIt0z(MoHAG7Eow94{?!1dKZujiZqk{zz8}iP`DOCM;o!a^z7(&db z%{})DSfL--&1LmpG_n$OE<`Zqad|KYPkH=8_;NZF;Bj#W-!A_|G8#6#NhH^{zdNw| zgPq^S*_jE6%pX$(hc%alZSOD{76$VT>hceIVg$t{gp!E|Xi~?w=S#fF3{WV=6hR`B z4tjzn+~f(hi49Q*ZIkgGq=+FAUT?(Cj{ERTz2(0?fh^3A2V>$5IPg^^ok`7VV-;I2 zhP}w7<<43`=74v^7~LKF_G*_)qd^<Ic@9@yFsI6KdVHY}DQK+)#*C!E%dY|%HTczouoPgZDcbW+Cgy@ulhd=;|Md$EoJNZ-M`MoubShh9p<;kyKIrLRl+5s_PIKDsMK2O54=68mpTh#$N$IKp(>{FW$2ax#^){V;re$@;uF z1LS^MegAbPiLhBG2Nswx)Hz~9YfDPw5ZPJ{Z)ggW!oaeTNL~?7^Fgem23H|6taGX%wX1}W~Jj3 zYktn{h5~NOTI+)@Ej5Uih9`aH8aGkUV|!KhYx zzj{HAlVN6xkw!niBWk`-jt}6)Uc7EDoU^W!+lCWYq1a)M_^O#aw#~g;6Y%aU$q9Y2^xR#*&0IUiNm6poREm(egzwc z#;*(Wy;fG(+C9il?Uf<<_eAx|=fd9@ly9=jUkXFj%SKpw7A2&5_om%3&f~ru z^_~(~!+6?1vkBKT#d}8~2?}>U{7Q|IC16&ZeZ#`iAbV|)T3q!JTK8%El)W=YCYKZw zy=iH^sJ3_9?%#au*q*(H_1QwimUoCq9cVA%8Sfh#M#yXOo{SBgoeEsQ^m{VVWuQ=j zBAEGJDxHUA_={3n&%5vGq#JSCkAXp@6bR{X2+=?;K+A#1IPj`{_@xuzjzOLJ#H=XC zT(<@pLGW+8T>K zpAsIUBlrd7Dy4G3al!YWxKJn`9M4eIR%5bScHft>Qdr|eMxNMM*C*oDLH2OPjNbPG z_gY%eho#nxA{a0FRz7Xt!UMI+a_E!257O7L!hg#n#`g5JHC7|d9K%>NIxczo_J9oOBbR1QfHGgIT;xoJ$+FS*EHlUf}h@SFct+{Zk^rc&vaqeT7H>pMF;eCx}LRB1V}jxlnhQoK^Cx7(IhR`SMbh&jXlPJajc?pzy4JX8CF z2*d7vUAWFXL|G%ePg&cq?><@=oN|Vvt_{Nbi{tI~Z+zT>f`a%G!l!RoA^ucrg0Zzw z;cQ>OXO1P>-_QD0BtOmgq?Lr_@jtE&4v~(|;v4)YnEn2?Xw@cm68c zjI5FggCx6{7y1XQwF_?5}R_4o$rS|Bu*`Yq0{6eym*y#AH;>d^M{ zK4)0t+sD!OU_7o#@)Jx=_E+N!R_HxJe53bEiBD68e!*gOGyUXe)~&rm|2>U*uf6pt zBI3dRco7~66DAI-iO5n}(Z^wYx*4NHv1Mu2U&Zgu%C60Ek|v%t(c#Ez`Mbt+c69vC zoaI!^@QC!bd9J?><1E&!``mgzJv9Ga*L)Hd5D*}C z%}SP;dC8>RH|KVu-sFhybAQE^SoSH?eqEZIn;U0+8<|Y{>!SC~o)CSeprJ@(wZhj$ z=JtZc@7a9M&7Yoq3N=0@BYSq=fFL6;Y|EgwttTyEs#Al6g17R<(8NR{?B#;xVoU7g zP0Kg4hjU`Sqhs?gv9Z{bWs4Bq&e2Y_SvBleuX;olsZx=Ubf;IuOlvf(pCTMD+^iOU z%zR=X9+l(SU_Xa}YB0Ru)zQ_3d-gbo6V10>RPGTx}lQU=Z$S|oer??PBnyKwFhM> zj0SSo9n47uq3^MBaSfkOSxlC~eay8t8cO90%A(~sJfw|rMzy5Eq-RCMD~L zE%c~kvb?h+%$G~cvdb3t50b#NCHJ-29O{dE%QNjO1#R%WVyoI5YVR*X9)~qlJuJN| zW?&rY-3r1aC&YITLR{2NT<4laCQC=JF`wv|Z>D>&T$EZBkCgyY~ zIJ8`P7jV3O;@G58WYpG8YQNqGU2wk2J}*!cetv+Dc*-PzIng*7$?1=rh4yJuS;`Jw;0Rlh9!KR5RDD(;HJK^mP8^oHsdmsN7vPBsSz%MaQ* z!x%2Tu|QzwT25CsO^w6@R#+~Rd)3!m}H>}iuP5|BnOcUn?^oUu@go1!I*Btc%%4X8L`XjkhMsap}mvJ zAw4LHXuZfLPie5(y!PxHp9_gZB*|*C%VM5;jrr4srrz~_RR{|~MEK1T1q|w7Qg|T3 zp@DYNqWMz-o4Qhedu3oVDXwD*L$IytGh$H!^SZe1YbC*l7krwU?m{?{>oj)(VTr%Z zYyQC0*}E-}ZFkPCx|;4twD?@~m%ki<2k*}MKw{1N&NYz8P=bp6=|oxCxY)Dx15k=J zS{VAV!i4T`Q3(kx7Tg_hN=r)}cYmk<@MMYsJh;M zwEFP__4)2>qERw$S|n?>1e@E6Kf{GigMGY?_f1+zhPO!n%Z2)S?y)9yC4^HSmTN2= z(T}z)?-4Pw6mvtBX?4=Q%P!Wh&j>p@x{Uh{!1)di3p2Q#x}eo*Au7?RU1~6Ctg<^v zVCWx~x%Rrj_+9#8=aZHUWU*7GP^kaF zBc_)#Y}=RMG+_TwqFHBG_BT@eq&07*)QT`GE33hi%1X3tgmtxoHw~TM!XhR%rfQ%{ zU8zihsjS830S@+~VdN*pj?l`GoSa%xio^cx)u~k?lTPL*9#u;#OSW7LZnx0uv%h*~ zX2~ss0GeF(=cw4&jw?nFglv7C_hukGI{i6ohLI#E*)GE*)9H;MxOymFkx8@2$jE&0 zJ20A385+kGQ>b@g_UEm!FyY;pD47)%6BDg4%+OchYvTUL>QU3b?#K4`dWO_}5$0(&T91Wxg74eW z(P0lFd1YnwF&J8IJ=vn8qdjl8MU|n?zRThxruHRJ@$v==c$@>!mHcRHn{Y)%MWttK zoUWG=ACC)p6By^2zX$>z?2|~W*zeeNHvw1v)Ap{xQ`cHP2b002D{X-*>t7eU(1G_9mytfC#$pPjTB_kP{)Sg(yN|a;VBiWRft^A z(msr)Y)i??_LL7EzW!QXUf!eZZ9R4{+e(_T+OpKDsbbs4|%57Zg?Q zF|5s7ZIigu)kzKjm5a^0}jSvd*0w9L*uD3QEb+zkywkX%G3V9?REX! z&dzRo_6fXA7A?v;eHv8O-~I!Q-hM9QVfjhx8)gDU4c1VEw0%hHF}d6>yMR-<`di^S=^DJ=X{ z?;8CfrB0WFpir}p2^{0^+RZ1#3GtVBh|4}oML zg^&IYEgq1h>=9Gf^;|r_`AoX1%aU*QJQ2_dLbJ0eKwgy1aL{9U#f^n2Jot_C(0r7; z`xFZc>r=CH#KvIC`jxx0>0;#Cn&CvTRySDKLdAv`O07vTW(%R1S+-Y~m$E}FUZ0@j z!w~gwStJGhyW9So{$U~deHaqiaW7yI;K+-_F?n2&_Drtg0Y8J>0WgPL>D53q zv++tXJJt6{M@fe0!I)XfZU(}wE2UpBvmiZ4|6v-bPhbDjT8fn~VE?E`!1=OHB&kp- zgg7*x?(tWy(!22>?jJ=K&wo*p98XVAYMKA$EcBWGRDVzJ|9GVRl}4z*!uJ=6mULS` zfSwOAGAR8uBiqZP$JCii5F!)rt;~;a=}2JdIFpJkNT~xS`KdDGH@6wLNN|2wjrs!b zlthROCss_VqV5&4Ler@mim)M-^1p$Ed6xJS*nAA(DhPnm0FTM8co4^O0Ck^T^Ajw@ zH9MR#jK(iQE@e`J<-ezu{=eo4@^HEubu4o1w$JdClG0iPJelaZGPE=4+qe50pBqet za>J*h{1pp?w@=>H!NXl{CVpUe*xy+x`HGn(s(E>ZbN+B8aeZKL(;{*>n9`}1O{3W| z0f)7sv*>k(oH&#=P`cHv@ydc~g)UR$wYy@mthta!suSsqf5 z!|yC#?sM+ER2lboHP>pjO>fBXOa%xXfwowz-W`fRW>@<0bNU@3j?DZ$-%O^U{^{!C z$?xqm+R!f!SI4JBhX^De!tz_`BPbzQQ6-!7HoptIWwu*)9L>-wm7)?0)>Igk+@Vl~ zxG$Otm9L4Xt`Ns9Jj!iuY+e8mkaTnx7@H`Of6&U#LF?k$`He;B(Z~?Rnk;L|L1poK zVW90xGT~c&HUge%13r3V+07Kro!=?RxGv+;0WoJ~Z=|Ur#KW|067ElIY>#ddYWx=( zQGb3h!=ApIlm{pfA0^%r*=xGCU$QfBZOMS$)%2?x*~VdW!ztzkwyTM*jmVdSoJ}Ez zV~^Wi+|lVg!olJjxs zy{ILP@S?c|+Eut?_Ec1T3%%Ae?V zPktAYd2P4&vy;~M&=0cemEqCYG!@G?&*m`Dv)(z_Fg;C`6gr=?6Uu693we$TzjTZ2 zWA5gzZ>;z3iVk|1%o1Hluey4&P3f)E8u|U_&u*B7$S0y!8#Vd)u80a3N6+G>bZTI# zJbEjgP%H)ayGlDMgKMG0du&{+gf|gczAlYJe_)%)Ki3`dStw~nS~P7SO|#C_OmDyO zeV#l#HSfI|GlT0%#+ESKoqri2{{Ap6~lZt zsB|`U*^;@NE=Xsbw~>W!N}GAgPcV|pl!E=LyIy<`DT+?@+@rn+zbwcM1^I(!?y9(Xbq3Ufj5yO%G8?F z2KL5KD!24Ffs-xmPPjt@N>aG^{k5 zEq8b8?T*O79CBM!mF6ra^%hB6$Fh`6O4Edfed`vVElrHm-&Q%H9#vFqIr5T=yl17P zS>NFwU|>k9wT1^IjBm26!t>fun}`i(_$A|U{NkAS6HEmL@ZbvO)t-*zu&TKOjZ8K? zxs2C`GgN`&X})s#n~4$hQo&K}WAr6<2lqQPLutnb1Km1$dV0O_sQK!=7e$`qn?HvZ z@wv^31~pt{7o8m+=J=iWDQrj;-W$?Dox`gRe zoJ08G$6?=; z8HeRe%ueF4Q4%Il_arKB-~Ks1U7O@Al9ZK%yk7A(y?*d`d$9pdn~0yEU6DF!b22{X z-^tB`!IV+bR!SP`m{+7xUde3WIFzRHyzfby-8R}f<<-y1`UpMyb?~tB-u?vvPDjIP zcj4N;_V4`rj+pq5Vio1()%vH1O5ApaLaRZoeKgrORaSRwF|jY;4lQTCG}e`_j!>4Y z{x;?Kb9PG3Di}#OZVvZ*y8%y1Hh42zp{&Zb%h3E!X%y?3Pf=R!?(g_c2f@w1omH+J z=hQ3SNQ?3*afM8X&i7Kp!_;bOYQ`{wJMqD(y1TlzAJ0XC`Cnb`-{j=wvAJD-6eQvH zH5zLnyVagavDtUpd4Y{DH7_19y4Z1II+6N4h3m*NeIiP2dg}1@0Zo6KYmvol>LXM7 z^PkPu^QYtTDK!T_?}fY{mjhxtQphgTavy53Ic%g(`d;zHs`f$uR7=_6e2)Clsr4^* zHVn#1Hij-1{SKt@$w{tmKN0;1|E}IOezK0S_D*rXBCGTk>)Ysks$9$%1|5vo>Ca0y z-22qG9MTp5Hv$L(}dMH;x z2cf+;qZATZI?jYK%G-@+7s-rFD zO$q3+FZ!O5j6x>*E==Za{1%Uu+3-XzDXthjc-|*i#m9cyKg`)xtdmRn6lfAi3YDFN zD0SIhL~nV~N;evG^b~`?L@RE=1&bp7<7f6DTZ7?d_58P0MD<^^OAVA4JiWZ~aa6?~ z?V_X8um3+;6Rl|U;0jLEb}Okb0xaoSPOB^1V}JShHk$TJ4nRtwzTnRP_?ZX3- zZqGlY%YylmM0@EhBs6p*Wt-hz*5&w**}`Qj*>mE3r6ng!5yKLWb37XPbp4J3uI;%! z9_{_vC^SMYTvvf~>VO|FV6H!8uk`8A`1zAAw`r2XsfSVp!fI-qD#mFT7{Vze?nsh1 z4t#2>-1m41xXe2OQ1Ll)O2#cGKJZm#!UMOYQQOp?Z>AFchcLteZc zoBdH$1Xn)sd*i$CSG-Sw_2PRfo(y#D1xfRCrJcag&=5p6gNIN?1{K&Sj@L)6x7UP( zZ>_1RsRQwJT+=h(Bfzoj`$d`lDIlw}SzI2??SG~C-1GWK;!lw(p08HpMY;aE`HL4X z3ZO;Q8J?$P1QBgP8J^P0$~ev1t|2Jv{i}_(-g&%rX7izu#4}YU2i|}T(~9Jlw0^`1 zD9iVbzW12tbuyhRAj4zUj)72StYL-IvM{$?K4CW=)_eHum-MH}r%qf^@kM_kgZ{#t z`lI`bh(U}XTsC>qU)Fl^m!7%8{_4dKr|mBXF}aXWE%xBCgSu@rq?JZv2)lcGNnAc~ zKyAz3u2B#X5nZ0;m#8C4)^5PT)>+~-;x z5Pj45T*iRA=VU%9u7GpR|G+9dk1FMr#+QP?f;DDQ6waj>^7=O#@*n~sq@o@LVV+UjbSzB#2M(}`5Gnx@a5RvzZ z)Ti945%dZCrx$>WHrRZ8&Ovr_X-PQcZON7G?bHAtF4g2ZGFhm+*d)a7EU1%yyY;E$6$wIqf71I1sG&HRy8?uqNA+(uRZsnSq1k_vnJkHUaWZG^|cXoE>u$hSShQE(8e9ugTcHJWQVrDe^sN%wBwQRDy`M{ zWNDaQ1j_Cx5$sqmECyK9!XgkV}cQ;M<2*x8S2X|9Z{6~)dFSz@k&UlYF*bL_8 zV*+u5p)ykxvUKZFowYQe=^%g@>iFEGku=}rFxQ@xY1Y}CoHrhf?KNnhl5z*ndz|MT zGy?ZeUNB7*V8`}IBgUA?5H;`s`q_Xfu6}q&&g;CNu#P9Zw@{Tx*6z8rkj+&Fv^A(^ z!2vIKK&SjGp0;Pef|s`O?qw7b3QAvP`0D-rb0YpYrg;w*{XZ!{+za$O{sQ&Qi@PI7 zuUZI|u=2<&;(WVRaX<>?()l}s6>LTuW*r`laez~OY>NUO7bEw{Omp>EN$cKZ z=}+aQeWI1{A7bvaY=K&b=w1&@?=Cb({ctijnX*=d3Z}C}^E#QI?8s~43!QuA4W|xX zq2j?!osSJyn@@jXB%G|$-_|eHY8+b0?Pp)NVM{*57YK~|gVUG5m}2&j*)EaPs!L|m zdPePYdyRdvF(mz99hBjH|LnmRqEe#PH!NhGr@`rBJn${{O;k^hq+l9H0Nma6(GByg z>GFIkGB%CTRfyqn+_0TPQCpdi)q1nb!p4pn`)H!!{p4rAAk(oQxG-3y-N{Sw=Y(ws zt(L1{Z(`LNt>5RN(}P?9+?X}n+yL6UbpLzud^Qs5JF(@j5K#z={uHM1a8h7cm`vc_ zWSQ3HP+H^d;!iFXcJ^$A_wwm`3lTcrceuU^6cWFyx*evbrj}M#WC5YBcRf=XDd=R+@!Gp0uKMJBT@u`d)A1lt+TV-1MeQNqyWqXHa81|W-TeSl7xgL3voW~ zHgL5^YGh~z1_oTSeT0Bt&EvHp+vV`X+plP{l-;sNcVKYPYdq)@i&P)_+*q-C(f3$uVO#_qAaDPfldg`81iWJ%!hK`d0ZS0 zlXktNvLg;WB1Z14L$j;T93rU8JOQgvmCEn*O)M<25;&nMWm?^m8OzDX4bFGGHRj`z z4_alDN)7h8vKh*yTCH*o_N7xZGdVUz+9eu+j`_o>x#DN$_(L~(F8d3egL^)k4eQ-j z$}r_%h^5sG}%?|g2hj^tQ40dP8J<iI?d|GIW6u*@yCXYSclVrw zR;*V&pvbf~s6b&h4>L+XsjH~?H9egS4E21Qu+Ye^+jsB+PS?)|zq#ceSS*$@(%D`J zvCq=06#oQkIqD-XExj_a$M;x9ODYw4_T^x{|FCcu$2{nA z(rR)Zz70x2B);q>L-yOFMxNpknRo13rVp}s5Ck;hp=&h46Hi8e+C6C*pJ>fd9UKy5 zVbMrH=Om=1QGm?~vi~BHpnY88brU3q^IV=;9PP{Oxpx$UG!;& z#A|i87FGEKCe3%Qu1{GjDlDh3DfVV+;l4YUe7ik8DWjyO)>njjKddr?@Ukn@i2wTa z>nYjL(6Hm$aXkI5kS!)ij=+ruI3rT>jg$RPuJIs&a^a_BkT8L@I@M?+qzXzzGKoVF zB5vE@S}P5sg2jZAS+y!_fhrTZY*0H27pDLcmpX#5!e#ROxe$atkuh^|#|w3XR5(~M zr}`8xiu_J&!oM^h+zrl~3E_cQy zh)CevdHcIqT?wXKdfUTxec_YV(IFZb`6}d>?)MKnD&g)dcDu1rLTj^bCvNLC-VkL6 z7n6x_8&J_$`n^n1ym$yd?0oQO5@&cHW1+reS_v!EQ7TgTKrNpN5q5PI4g4W{duot3 zoFo=i;$`b(r+1tqKNjSGLB!vY6OxfL$;f@FeXW7We6g3j9SIR%o1|D&AX-#;p+WP907^PEp@7 zTq&fv>s*bNU=iV8>%>cE-lqe-lE~Z4BvJgN|3q0d5VikWq!|9&*X02Put&KTP0t$p zF*YVvO71O=3+H3Gl&k;jxWm3Rcz11G(0x?05p()Y$X-^*)7QPd2w4UOVT}Y?uci%B zb`Z!f!g}Pi_p@mts!^lUVy2h?5C2Cs{;!()|9atn>qF^BGaZbe;_H8nZB2TB_w}>o zKZQz`Gt~j#zrVJ$v@Fo9L#L3q{yu_pFB~;uYB*Pq@ruLrH5%dDwUtg8(2WqEF5rRV zKHW)1MiyPS;GTk~?V7IL?EccliDb6f<3g?3oe|XkL;x_?zzE+1g5KGgE7`YLVSpHf zL8`aXArGfkp^pnbnFGrAVv61hSFI0(sS6}~dwbh|wv%aA?%fon8fgjSEgD_*pM0H~ zQrj3x>pom=HyzDk1;wLJ4fZvXUofE15%ZeUts@2~tR4;%G~NuRaE0YqiYcHpr#|r7 zE0@?2C2b5pq|ek?u)3epDvx*M$~Q-S50#^$A-^- zjb;9a6Jtze*!6uf$F>qorKIm{XY%TL$LvqBx*xC8UmP=H(S6BAT3&gBe}fASMgnER z58pVt+S;C=qN1jzrjA~a^4Q0b`pf}2L=G+b0qXrk78Vwep;Vs!Kr|st5|ThaKX^Yx z4C>dfeJ?Mc2BHzhq(AT-GzFC%h!htWCkc8{r>CRUJ8rW9v1NFF>t;FsBO(-+9t+1Y z(Q39zP^yR)^oBVB2UoK z&p|Eqa6;3d0Bll%QHGGu=LkYBAO@wUD~;UF#uLp(bC4mi)F1Ld84L&}6kjm5qi#|k zHmARMkmn@)aSP2JkKIG$CUmTPOhvD-%RDwzO9 zuK&_cP36pEe@Jo9JqQa6GXV`VpISWe)8vNf%bH~S6BtQ|TrzO!RqXGsod76qPgf!C z&D0oO+LE^1IirK7B?yDo4M0-0S&o^HX5eEsCY=q~peBiAM+h_?N*#yZO63emy80LGY| zc;7fJ`bM%P#>R*Q{yz5KCG$=LT4p?uB-ZSHmc(Vlq?GR+l6CmIIksUJ%pDsazjt?< zJ(=C)?a0UogL);0>g0#ANrww-%xsA$!|PLj zTZJGu7o?Ahn!|Dm69UczXbW;s$P$^YwJK08vo8I+xw|V{qEW-`Jb(ca5)vZdIP9q` zejkLc)au=QTF@ekAB5Qc`2ii-n8D-W9^Tc}b!mC|Gw5owocfA@Mo@0Ec>ihqgTi;S zu{@xw9C?YYW~#|vzkWS?+UUHOC6idKkdpVI83`SI1%zk=T~Utv)q0}q*|_R-<+?;y zB=K-Gg#<)WR+bVV4G4Z962Lj-ciNd)29WWo-u81(5AF4-8(f6AALy9?-8l_(Ws14d z{1@V|kq3-rcMO5w9Y|!S;etIORD4XeSpGOb0K_q(w0{HU@2PMw-sR`3XWN zUWr%Legr~#dKqo6Gbp$xBrL37Y!K(~WLZ$ehZz<(@S%F=JziE;)@hQXan(hTz9m)4 zwA-tO1%Zock&j` z!J&#j7wB}Rjg5^|(3~ZvP+n8hIX^F;^yByMn>a?z^Jpjc`dy&f!o>{&Z}I`3Q-*@B zA3Axbr{&eM9+rtfJfx**C720btx?R)&jZW>T^qQdtp~(>D}N$YXkc|12LPD`Y<9#o zJ&lqCuu$a=n@pwJ&4DE)i~z8n6Tan8(g4XKD?7VtpxuydqY+(Q>~LXWP`%2SQMF8a zeSf}jdME{`yJ4faw62AP^rfYx=d(Z~+B!18`>GW6k2U!F`!B7O=6B}% z(K^s{%c|EVs_nME&W~tBrLfu+ad>>ZGS}d+oh?o3b*h*5`e3TU03;y8Z{_C)<)yub zbmhEnLPfwD@;L9lB8Z^&5*+qfKU=7%suEMc5fKp?<=Y3R5=Sf(H2Hu596OQ#o&l;l zeQ|a@tR< zk3E>_-;^@6C4JGBu-@nqjx~~fh3qcb~t>rYz z*KHnCXAsQ|9v4jDDkUZ56Eg}_kmrrh{&I3y&ET+C6=!<^IC%0z&i-VBQBhIx@@i9u z#H|Woa_Gq>v+e#I52W-{gNX1?DZn~VeT#~K@uv+xNsLttilA-gF;Re!jfsgt!iW;iA5*9;rU37LHo7s8%56tJ zd4ZlYF9aYhCnx9Yw{IxGP_zPlIUK9X8wTYKEh90TEXGrl>Gd+za%HoL1uKlRDSVdRJnaUS@3#wfE8z9r+jN<&RE*x4yVA*g!A{2BG^)Y#>7G>+4zU z*O2H`ijjUk+${Fp^;)9QK^YXIkci3vwT7J&R zAO)wed!&NF>zaS~mtT;ilvFR&OQZU5>;t>RF#sewBGX_Z@QH%k@+%n2) zp$UJoRLkJ+pE96fBz=ay5p!{Iflu~=oQ#Bl(cRk{qLA%r>mcJnRqt|;?s+l)q$}da z7Z8fyg=6fGZKU|eYOUVzfZj-yO^$#p2)+vf)Mrdmk|@{}wml2LS7z%Dz8iF-H#G25 zNdut?j><}u&^;v^+Y3!iO>jzNx+96Khu4?r#n% zo%h_m@2~KROG>uKHr>Fvd0d1?k^(X`DggG}4=EFrR8;FfL1BwSa+wM-WMiTKn&gBtih`5)c*S)URRfT6n z1u&wn!(XxTPfm*A5dR}Vnt_{7Da6A+dU<&{@Y7OGNSb~cYM1}#xY~2|ydcJwakR87 z9ZfKPq+K=UoDLfUeP^OYpb^>AQ=HXeB3wir($j51dC+phwsvZE-T2Aj zm_zIBWR6tE(EvN~_U}xu(x_w>J#vuU^So~6NMkh}Hax>pG;y^(E95_Krs=pfL_tJW zW&JxgZi7c3i)nx88>!{~~%Fy-SneAW?Kq>q3?m~!Gwe(XYwo+$o zuPH|sj1C-u*KBNTvw9moY20>S3JR)2>_MA4H7zY|zXCm(G`ksI?jrUHQeI99+d3-1 zWr>}M68lfR%&e>+nMame&$~ZIfCp~)#=OfSQ+50m!CTAV=4P+VHAa#Qz(`~g7}`fh zqFol;_+}g4Kl}g$6Kp4$pdcJzr3;=8%9+o~_V=NM%7yyimX2(oW$qq}IjoOAkdBeW zX99X;Nq#++<5mhU02!itw5~@f-b0Rc|I?ooEb>2nY{|z~F5ve4t3fjT>mye(Z$(yp z{C92;gXlS?pTe?!4*str4Sgk!slOlMs@^Krg~PF1?YFWN=7h>l*z+jLi^e2eDnH|6 z$Hpy*_~Xp+T}k@k3i=W&EqOjJeLWL3g(3*~PO)JGx_+~zZz-g*f! zuX_v1cM@=Y7OOW@K21E#z2uEY$HjIn6ep5P;9>5e1asgo&F6)Lu$rnl52bs#Fv9&d z|L%+r58YENA1Ug{rG479)j(j?m8mO({!DYUR)oBrKdXYh-;HW&#d$6Lnat1>c64g3 zdv?TvsFno0T!MJ96I}&H+M*6u$+S~Hq$&F)?I(`_wcFSf!4NQk>$rPBNaXuw(i(Uww(&;zzKjk zziC?Jj_Io{oX%r5ur{nV!4W9xWZe|Se`0Xz>Dd!f$k<+>@`SXvxW%-)w&*SG&+qQ6 zr?8h7J-REcn{}%RxV&PW`R^PRpz4ne{2PUu$eg_D?THe^QnCsKhADj}jBTX&p8Un3 zA2hB*-xgBl(#Z;JNIKg0y2rZhz5mrsJ51}oiRsC|yL@u9lgCNVJcVlv1r7**XZjDU zuTZ?*V9ALULo>rr7w&Vn)P6l1kL&`-N!KY8;vU@~eRtulPSysD?-a?+A z1?S1c`}1!e9bVnp4%pALfj;dkX`BrfFrj>Kxx zaLVFHThCYb5!nkD!(n0>?IK*iBIwcE9A)sG2Yf{3?-dSg0MtW!d6-Ek4Lao2bRG*okD;0m@(=FV1`odeElyKV*$8`MJ?H&aK-%{XA zpTK<)R_>gY6XP5$J|lMi*k~w(3nvMK*|I7QlX6*p{ERYDSWTOFs^(V9kRkePNBPT& zQ}GYoVTXOYKW}0c*L(^hU~Rcb0uOVQ8*;_y&EiJ&-K)d%mlwDD9e(u(zZc|6b&)bngS z{%9)Wk&k-cKd;^>5s&U9`5LxDu_rPkW^Dv&@L;4j*VivqwNU2fxrtln%Z(4Tik>T& zADG)ci}3+J8F*KJF6*MABWmhqLbpG@`JBFgq+H!Q-xPC;A~SkC>tu1?VD&-2?_p?f z8g>*{$COm5nINyf10_6Ps4+ay>L(Xyjgft(l2*66xnma9czpa4YFL>t4QEvU!l-NM zdW7ouL-x;C0!nv8$TG4w@G*&X1w&#qbZcdCH)S$F-|^p0xb>j{k>p#$24aYJK#Oe`8DA<70RH2{ylUj$C%a_4_j zLo@UIK1asCa4R%su%hQ**y?UI=g#?96b^?cgI!2npOLdFtvvIMpaKEytdHO~ZX3~f ztF^{Sd+XBVtln)GCPJvGr26eV%%v(l!ko%mW48!J*7qgqD)v0w6)>=jf5 zBz_(7Qj<87v#EzYd0vXwz7?pTTrMZpoA>77;#TB^BN1}#cd-Ua%P_s>)TTL!uQ&Gt zGqS(BnwG3D>y@#Ox>C!cBILqA=coZMt=3+fNdC%tjBJo}$Xv*n1M@qYy)4Z22CY{g zI&wE!(%l;5;lTIg>S&lD4T;|k+Q?{b-!rm|!A@8toa$eL^t52_p=^Y?Q8rqu z{{k$Wb?4t)Eu5H`SH5w@E|R2UgK7e##E#^&+7ez8@D8(!CbrE<GfGQLv)_6ZTmIX5%+SrX_^HlNob~*p<`CQ@~fyf>gMHm z>&05=3DqWab5PZCl;*kMzNRwB69BfS&vZxYTq^~v8-LT$9dL%^G-}SQxtZa~2hmVN zLS#k`YjkFQ5LwYvvgI0auNQ}!q>JzrDd$x`&$kK?&5GspT;E*Fuurmw~jXtGCjAAV#>d#=ew%aSi+1>h>~!>cQqn=-+z9BIvZeCG>YCV{6i*4ee^dW z<96j3qn4}-vZjV^X70TGY;8Fs!0-14$|X&2McL0q#YLv*->7IKK?Ix4pOn-hon)aD zz_9;DozJrFPU`P9VYYbQUlxabi4lj_IBjs+x(NAdJnhLu=w1@OevUL`=Wp!ASn_(c ze>18bdt|AE{b;+lakBB)y+l~_XB5T^1maR`mv5E&GWPR(CiuvDC!|fc&tU}ksDm$N zcBA8}Bs#-wN@Y|O1TxetN3``R1LjUGs8$Zn!87V42@Fc(YY9&sr3YB(} zj>gkKJM84Nw!Be-2SXjG*Bcujr-IZ|j`?lO5Pa26B#Aov(*}!LPQeTRm83rsONn}^ zZo^38S%n^}$5_mZKf~Wz??FMp@6{0spDk{gMEXVU+4Y|-Sn#{oY6}$slxX+7mK_EHHAvC~#pX!E zyghU(o>C50Xp*g}9kD?rmy=vOhqKtmrygP)ud?f%#wmyBL~uX8|A5oXByc_FetRE> zJlt&YOYLLWvklW;E z7Q%FV%)5cFny?t}530@N)}BE;&2tfVQbLuQKC-$gtZ=@DXhS=n_b|UuGMr>O$Fn8Ryw+~jU{eY~s{WIkdZwzP5Ho2p~*77X5bzsT?P>ve~h6fF(ZuOcv%b@;8tWg`=@ znd*WnjJ1(et1m}B=IlohZX#CvA^Bw^pLBSR-~OkxqgBAHOG3l5-ff*STS-&@ zfa~r@MiB)#0yxvEpo+{l{$Vc>LfvPNk2}4Kt&vvc?>M&zRG0+m&~lHTKm;oW;Im)R zYidJ!)%RJLEYX+R85_!OBm>-z(nCpopHjlvWUva;_gsGb*7+_Qjxn9jxXTMKJhQp9 z{8zVBS+G(pucaCK5fUhjcC|0y&R#HJ>@AV9^p5@M~?&iiFJEJh>^}QsKl@yD> zTk@8Q?$2-;NPa3^L7JZRFixl40CN^`yD=0DYmMdPAL2d^ZQ*#4DHR9da2M8&xK04WUpnZwGb2q(8Xr08rpMmV7lQ{WpQ2lasW3BXzoIpV zE;|l{xh__O>hMhQl}b=jf1k$+l#&&=8QGjzCX%S9^^3CdNexQ7`OC6}J)$3>3-x++ zAiJd`*u~IQK1w1^Nxk%y{^kt}g!^x#Je={j3O5sxsBtthQ`Dx!%WGXUl7qs|TA`tK zux8E@ujq;Oh(1)kF8+GC@j^u*{$)`Col?zOfXY|9{ywSOeld#6-zzI;N_{!sPV~DV z9ovr9%#$H&^waUBJnwy?qJ4uq)%V>~83!!c%`bLQ>3la?uaW5_FZ+UtYqGuBs!JDgD|RH< z*vr}DeC=O6rq^h+!@LNYltj|ebaP_W=iMX(rl$<)F^TQgU=F1x)lU6DHomBN)h5P_S*VW^kZJBuGy&46`kUyE2$-*J65z9iw1oZHd71_2yp zm_ht7YpuI{yn(GgV#nMkF65TkPSVS321&K@dj`ZJGFrPLq+Rbm_z>DlYDxXE+R_X; z7j!-PR$&J|qyIkGW@4osB@M~;R{-?$#EPxc$l!=1!rXRhG#$}AQAQ}DPO4dVYE&G| zduca1U;Ha@n)p<|C2Tb2s?h0=9D2{~&W6p#)gcCUy7!QWFTjx+Lwrx+e4T}t1Ve2q z5xZr(Z*I8;3vvRC=ctpbGFAJG_29UP?8brBf}}k^N8G*b9Yf|Vl8zwnC&W{`++R&d z7Cw}|+D-@C$N4o#RY^!~^Q9Qc(U*MAwi#yKLys&ko-?HOJAso7@|SZ; zTbvSliF2!up%fqA(=A{w1mRaXjgL=uy|iIwQ!r?^^Zd_;8*;2;^N$ns0dv22+&qB` z@j12IsPVJoX$@%q`m)Wb3|--r^7+Gi!4-9)$#B*@p8zlvi zNb+5#1Zf5hytK3piwc1%vs|HgRjM4(&gZ*U-dAoeA1@!~ki<1Nt%=+-EskR4$nlq- zZtRFg+?7Kf(epJcEY69%C_=nWBOD}eq^{lHNP^yY&hsNa*r|rfRX+BON}|&k zw)=7ISVB;P%)U-lI}8PtIU6tM8cBcgSVRLnI^X29Qc3wqLpf=I6mvn#omG^L=}bMl zIvCDe5?$zU$NN zJ6285wTyO6$nYC)|3OM_-n-XdgR0X90kN@0zkNpNfSv=4Jg?dSf%!Dpr@>)W>pJe# z)&RrQRH|8ehhZ7V>{naWLGLUk$nx0EZ9k^GmY+RVcC2E2n}f%H&8NrZs)5r!L+aTK znJXY=8JfkfF&C=Lr(Z}30eWfrn{6}MyLWey+dy^m zh3`PZXs$fP=+soxa~o0fxWV}DXE%6iwI%Gs4JtJsUWTAT9Q-1p3!TGyt1+ughOFCP z93(+saE7;jt-UwS_o(I54zr?Vsy&M81D)NK2iDi(M?Cjal#Tu4JMJ1kY2iauQ zc;uUBZUNz{%QUQUh+A*ndT8p{JICEtRg$t25eLt})cOpTTKy_f@i$u@TeemWxe0%=Z|ljj!!o5=1DTX$Bw;cx&S*>L)ZvZM=Y%o> zkGMLesBqP!1P*EBCDNbI2DN$zcoihab%QoC1iA(TqpT8x1}P%#cyaS(ODhUR(CKG4 zx+s3G^HVgsKcQZs_Y^lb#EVh{+uQNPx~}!gTfW1GR`!6%-3xcimRyf_Dk!O{6Nd^^ zQUfLYFh;jIOr5W9$L5M*JoX$`TbnEQG!L!sr`8BVH%{jv8jwc0zlk4hb|@~*NuYb_ ziAsP$erC_j9qh{jhza0!OJ~#z>qEQnz?I~jt@D@?^XFfv?bLS2yXxQlwYl_zai9^}6?m;mLui8wNg{=3l`OI!zQk%(|r;wy2x*4i10 zYoM)}yD6w-xy&hn;pL{k)%a%toy^o|ge`P!4eZqCeYi|Hvzss}c zMh#lgE6ei*#N1hF2Ykij;$)Goepvfj zoq_bEqH_%W{Ak^A8D<{?m@pN@Kyp9a?tf1vfAgv-ua;mQ*0X>1B-vUuG^9bNwRa7cZMUVeIN0dGY3 z#*p=b?z(n69H!+IdQRw)7jJeK`_|OFc1nL_=hiWo%=lMFQV$c~mgUlW^xcCvy97v( z%WY`oxcQwh>icE89WPTBG6NZR$;VUK&^csei*#YF^?}@8ujL9=?{@>kpYDGi33(R_ z>I9c3&2*NS0!j|S9`-oDChgO+%(_CDtNEQwb!hlJ z_sYEP*ti2RXxpTSWr$C4X{Y-{O{pTynQVwVY3`9sDRMmrB3Y>B(Jh=nuK2(>^A50_ zpd&1LzLuy(8VzDBzZo24KMsLXji<4pxg$YDjySHYhu%xRjIqD0xr@deG)td|zPwf+ zH<6=Ui!dsWBA^=)_r}QPc0QAJ%2?e7UcR}@^F@t8-gsA zINOR<=k92;6x@tQI)tJ|0Iu7L2|a7*JLD&zEP(Qe!7k0E#~`m#!WWmv{+xN z7_kM!ZzE}on21`P#XTG3#arE`-NP?hK$~=|6DjMz7QQYnVS>Y=Az;QAmM7bPpfL^NZp@*EfVAq+o2{b#WsYlx#Wv zhGY+rgV^jyplvXMAa){N?ptq5EPABmTDnp>BG{dQQjqPcYTuxbszic>_2b|BcC;z z%~n>99Q+E@|5Uv425AEo0>~v$4Dj_Lfs6(?mM@O3tMj9#<_B(+HgZt>4V)_CSyl%F zrAlbte6mZxXSdIvpZNk2t_s+d0p2)mCn3T-@kKdFCG%)__X=mtxBhIsklvg4q5MXB`lQ9e(<{edpq*6m(4&*U z9$$K(bnu#~si~FYb%RYJ7@VpO8>hdXW_EDG;8z&B?hbUC;8mFo?i?$UwrdSrKQ++T z_x`mv(e5Zu0s4rwvp8ZNO#iebC{WTz0JbX}YuWd|&!tG;Q7+e9K}yOHo~J;NKtZB* zrljW*|8K0Q@^#m%LWUjE4PhSZtAly6?*>&)d4vqL?-pn+FJa#9Gv9mg01tqZirB9c z^#Pvc_~C`AQNFL)7%v|fT&Xk8a8(!Dg}HmGwlpMU7{yPM4ZI2V^YiN?JeUn5Q%1Cc z5Uq!-yb&Y^5V^9~C(A{}_ep;cPMjr~>s0)8U_G#xSN}Gi3t_+9x1R_UqMuj;6TL7q zGs8k8tKKJNlg{8~7Ig_#Fd z!TezujMJm-!5FVy6KsY)PRNin;Ff>uN zLPckDz{c>14+J;~63=EAM!U4MRAXJ;NLozrUMtJWluw(g)M{gT#r{a-r%Q;s<=EBF;k({ z>gyn=P(p5sRp`V2ka%wN?0@b+gaQA_cy2GJx^xB9xDb0|5jSB=NWTGjlA5YW^R$zl zoxQ72>k%2K<#-X;ls@(WmC&CCIzUpe@K2{y||G-0yA-mM~_)}FPU>K;_PgpKM zvNDR9UjVx)Le*JOD13`|?BePVw)w+D=~B$;ye2{(<(2BcX{g$Yr+?##dGE41c_bJ? z-&uGMzr-ocdD#m0B>xk=PCHGkPHG}yP-T7CIrtIn*ZbLQ8Ag~8d2Xb=SoYzO$$t|} zZcTK9J-`LmeH5wqIp{ao4_m$~HvbYaxuwQ14z%W?E zzuDn`lL{e!iVkl-+!_1rb646CJN;39^75W`9e~-KYlX5*f$eOYMrec@h8~G_OTamWSN`FRA$$y@GQKOg%42D|OFiZTts`#6*R4-ipjh;L5FTnd3 zRY7Nbr3W;D*_!{uaVk!rw68HnXL!y3jn`2W28@+R;CQp3{wKH9d+3W0yIsEuTz%4X z0$D~mf&`W!3}^-72ByAi;OUnkw#)@O1LH#`U0w7Fs$|wn#lyBDsR??kF>OO%C9T(p<)*%IqHLfw#FbsJu_X5wtdup0Rd!S Ad;kCd literal 0 HcmV?d00001 diff --git a/umn/source/_static/images/en-us_image_0122999741.png b/umn/source/_static/images/en-us_image_0122999741.png deleted file mode 100644 index faf01e796ae2c35d0263c6f644a627f03e1de466..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 18362 zcmb@u1z40{w>L~lmnb1E3@P0VQi?Eii!_L&l)%uTgosizG)PIe4&4&cJ%qHhw9L@? z-u(a1bI$Xe^M3ES-tYUkE||Hmd&k;)uf2Y2{r1{KXlW>s5YiH2U|^6aLlkr{Ft9)v z7?|q#xWHef4TVkM1*W@>(i4pGA^O_~99wyHc?^tiF+`V^cYtRCSBRlI1_o)z?Js7x zOW`XF3?)rv1$jMhv)$%F7l!WUjosFle+C{01t;46h^j{SJ+c%tviC~9^9~~zQyw2* zT9`teUqbFX9dD#O3(Y$o;iQ-p0W#3E2Fr#Dz17QQl`o!qfj# z5IrrF^n5HLv@-0_^FqT`o>!rNwq0x9)@f?%Ye)eoONT;>ivZ{>yg_GjYHEJm^-#ZW zry9@M!D9|ms$?sr=LPnZI4K?SICOn1ti>ZjXgl;-Fw?3ezN54A(KEskv4ESalX8!a zccbh;TajftEkQ>r(!S^ZUp~V4LC#&$jD0<~<5^NN zuPypl(brSM6NAk2No^h~f-O2?{F%a;Av!ZUxk7wfDgp^^7hjBxqWP2QBP)_G-_{_G zJkN!X*6?JtVkQ^F`Y+p5*dSp|vh#v{wLaxT71Piqgh`NSW=0;HUr?t(pOo_l#`tg0 z%!1+8PlOFOA0HT>U~;qdzIgQP%dymYki2FYPM5#!Lg4Z9!&O0OY2(WchWP}unl(8{ zAfINhCMw}^%;2J6|LRj)Ns6j?9ILYUgmM`xT1l%h6@S%DMkMdke%7)l0=9Kwz{po6 z0`l;?qoI}gJPG7t)^S5n))Xoz+m+zd4|d{t4$K6&MQH-!bTiub3TdnO&}LelVQxOa zW-XEE&5W2pcH-C`f6Q;0+r_wDdA7FK{N^osg`C`M*#SlIE@pludNPA6-7$DN$@^yZ z=8x8x!~^YRGV9Lt@;ve@?sG34tXw!W2&WH*pY0{saS>>95m;6c+$~VhdU#h4(g~{| zzajZjpdB_oe<#I$v!h-AKKJUm+5v{|c2c~58^dzz;W3ZPtaTAbUfvUMdYsLSY`Uqp zf4_7DZ~vq*xRdFDRHWg2p&3m$7xuB`Rcwu>L1hQ$@DUMphM{Xg$;W z7#<$bab}W9IX1I7JkZgO8u>FQ*|^tK58+wgJStE+^Ps$T@!I0l`#{{7IBR2+0Y9c3 zJEGJLz7NTGN!5!SMd`UWu+)s_RIG7r4I{9rpz9vberrm48)M3jAT+gA%~&$U#)oC= zGt~_aRHX6lQ;0HF!2utwsxkN7V3&nh- za%Oy{Y4lo+F%Zw{EikAS!ckk(Awgr^2jGFg|YbDw-c82gvCr%+7=rBEKFerO{gplf1om!%hjjgx`Th;})^%eS%NFMr-neV0E)>H>(~BhI zDt=`;#~(@gZm^rz@~5e080`BVh`+j1uK{melSoJ~+%MpFX?C{Nb)tV~uFmw{hyzAV zm8@w{e@*sa6;mH6;pyjTYOIUZ%ezBHk|gb+QwzeBFTQ4o#54(# z3z9um`7k-ZY?xe07EF#;grYDH8U;GyXj0OKR&lb|?=BRqm%GeucV2G)Kn)wZujwA8 ziG`R+hEuWy+3lMvi_QB;`SGUQSe-31{Yq+jInZ1@aIJmqesPW{$gH1=pO)fA>itf7K_?$^R(carS6D$LC)T8lG-;%~BBITZqTn|H^%H_A#UYtfS$!g3=t18H&2W`(h+M*VC5c8+HDCR-4&1 z%!pK-mB8GBI`Dlf#3FF+shI(1t3#ITUZrAm7#1i_DqW;iiX_G5r2M zOM&gc>Q+_4?80Li*}TPL&nQpUzTBvD)^c}veH{zT52pzkGM`h>InP$|{dVZ;6Hxeu zHa(^GB!^T3>z`UNHlxVW%ILZ8enDi3x_*^smO5Ok(@J~%M+$9;oOTK@I*UIM2yazO zT;6&rzJ$LxWkVh$%^q!w9D*3h0o{ILI4H+$Hx6jv%(ay95y@5OI&XDY$!$`(O~{-JKCPH z@K$%Cb3g%k6QUH%C`M-W9jwki`#cJ}q3n3$x;%$CBVIHSRF2%tGH|R<4s7&>iB`9G_o;>Z z^nWYc4j~F6qvDx}0u^t!EIyscY|-f;Jn0{BDLZ~%>2WQ}`EdP8LOWH!)RgsLzkXWe z#yFn}J!$IN`s>8Zn&}Ozph7DF5jL?nN+Y$p-*%#Apz)(f)GM!f;%6LJ{gJ_hG3l$F z_4?J#Z>H7!mQQ|%+IK2@ie0&mYd6jwQ>U*eeo^mtMa4sLV~E8|=w?0Z-kkXnYEZ25 zcGnc4KOs99@02gtUlM&dPSx0`N~28=UXgnzZ4Yv-`^SC;X8oVq^S4d;k0nWn>TC*F zJ^ry17Ij?Be$gH5uQ_Ebnu!X~y1bL^AI_?LIfe0X$x9#*d>z_W_y#^}$hzsd+vt3J z&z@d5J#2?a`iAX`5^Z!9U8_uI(_m$2$Ry%ElQQ_81mpe64uM~T? z4W%Lss``BGCA!oph9CC0*^vtVZRCt5AT6iMpH_{(Xtf^S`+RHW|EVpvawkrT!pA?w z$E0S+)K=Ko6N$hRi`DhSDC*hFz361BTY9PA6%kg>=!oZ7Z%8prq+ARP2IYg(Yb&8= zD7SR;%1o50MgbaIn%Bo8czDCX*Ox1e@8Xc#SmuM+waI6uMB$A<2ab%=62RJ2BCWpE z!0@L$RODC*bVdMT%o zk#XbOTXvx~{~5_4KO7#Vpiw6RkCrJ4Ji9Gf*lH?&^zu#M~ANh_R;u(i2vT#T_ zgSs%=14!AX6_X?{)bf-!U!%_|gRY-io_(FeHzTX%4vLdfJeFp^%TdHqTDT`z`-qv!NRKWcTM*{_$s5?G(ONlAh#vVXu6uyW5Ey656s2*J;Tp6>m; zWDw6Qh+z=cDW(qKhT1MvRBq~IW}rMQefA3XR5bTrKI6|6&lFlT-sCpiNg+eU{&MMDi7^YEe+Xv1RpzoFrsnG)_VMVBJf zzMQ13xDh7~Zo4H5ZMvNvA=JM1^B|ZO>l((AMFOYZ-1SdsXWi;{(NA}ntEz+jv@d#9 z;)C9#i#Ssgp_m?e{?ecJeVbDWLwn$TQ}sSJYf5FSZx;h}p-LY&*ht33LuV9II~htI zAp@VN{k3-zpW~LlET#Ayq5f&&LQZ|XKe*PvzWUPj!w00;gAdUx0Mb(V{fK3eIhcOV z_x*78Oil+&=^kV&ah*9(4fZ}cLvmM#R3 zMJcSJmD5-A;Y?`+{k~eySl1922lvG|LiYQ6nA-gaOG%3 z+i~Y?Q`4R^-5%N+%g0NrtQrqK=;+yq1NW*wW3`Xa;RvKT`wP76K)l*pon)+;np+@o z$|xL$2cry|o&#qLM)_ zBVD_bXhe00n4oGwTUtT2n*}FEt!2vB6Q}0Jnr)%^IaFdhhwEGQcg@2`b=?azQ_p1r zmvfEgf925%_yB(6plY$O=!T7(7=LpSc*8l_-UVc<*_@4R$)3y+YxS;q4eq4lX!I$V zd7+h_qF?Q~StVK!w(T5djczdG@8>Vu&h_cO|D1Y9Y`!vS9v=8AU?9?r>XmNl@X$IG zYQi71GHzI_u+q1^SvFJ{{V1NM`~8gAtOvi#D@B$}c&nY2S91m9@YY(IGq@m$r%@m; z>Eb+2WLA9raN|vSt*Phqg!_^=cVBv@xU?K-h)!;xM^Ok;_0XOwgptu?PrMoCxV0NHR0a#EXxvQRjnb!vy%;oI^nBfiu4h!ZcgG>})w-{l zvZVqGbZN?wKT}7zT*%A$v%ZVjR_$Fu^~^2=EWv!$pw}ZqW$d#Dl4`o5D2bMp;DpV3 zYhc%W6&EjNloh_a_DTWKn6K0!&Y!aR)6tC;h8x(fX6UJgC!iGT^%j()z-qt6pL**D%An@3!%1pT~c zgJt!uidK=YvIi0|yIf-w6i?z@)KYNi%?ab_BE&u%sj`ET`f+@A2kfPr`J8IoA)$Z9 z@+)#0RN?pLU+Ue}<#A`c^6o?R@;PZ_c&hR=AN8-luvryS>)R*Pw+1z)B@N0XV%x_1 zFwrGc#+g!RG{4a)D-WNfrHf$mvCrXpR4eOJph-VuM^;6?q zbZ7J)ofd1}!6jJ{6l53}P4qdkLR7;;tu6c~2IivJsJr+n;pJfMyl8P4Bw+OE#P zCqVHwK*3DMjRx2j$9E$^%QKD!(8fy7_2XyIS>Ah>1xszB(A{@wGN7NWH-Vn zSy6W;kT;j+Lw$>rp*=Z&h=`mGU8+xMd<7P73|f4HoS6(We9hZ34}OafdA7$tUABqjkx_kJTtT>0>kEOHnT>Op@0Y#J;S-aO$ASo$$M`+DGj>L**h znG-(JH#tm;0%)f&KaglH?LBaV1EIJv=3lrVNAR!U@Rt@P>UDg`| z1Fxe~47}C{FF#(aS+|;uZ6-Ka|0wq=I&w=(QZA@H>Ua0;v*ksaW`65he^5Sr!jXvv zyL?hdLah_8Abi~ok8EmcU!o6uF06RJpxrM7xBVU&8nQ95MvZy~pT1HFCvxgFZl zk}-6m-^4+&NXBK>*cgCw!T{nAs(i604>`A*J_;BvcbEF(bB5@-!mE_2JL5#lnEEqe zM6&~9tycV!^iyUw2sudio_sO)-p8~1MU6fW_W8xwkoByrFjT*zf2FuMmLJcR;>#23 z+WvkxcaV*cw$IX^5SUuBrOOxr*9ulL=)WxPUqX+&9<2)>ofiy`8+&=p!`r+)PEyji zl~9z@Zs;853)rrC>sh*~R@YU!V-Us)E^E=RBTcV4y`eALAF{QZ^dToYybHrq7l%(q zBh3^UF7g`AM>OUyO!$!uHyP=op%;`Z-j7mi6%pIV2Z*m_$(A3dWP|Kw1J0NNZTo(q z#nwi=<4|Y}K^kSs2CK6neg;FZqcbsoC3I}m-!@@*1hR_sba*YmsJy{?ckxX?c+CYT zEqr(}iPZ^28}azFeCTR^U0O<#CUv6epYG(O5(zT$5E#AC@$y*SF@hla@&9hf{|zH5 zn*Gmo9)@b&vjpL1ceO*vpG1Yhm_uoaSnc1n`0SQNaOr1s$1pMBmsM17^v4{V(7FCgH&;>d0`Oyepluz7$3?1StZ}Cy=d)yGun%UYgi|E>w~dOG8E>_hjk}c)&6uoK zx-TW3iLk%f4sM{#-BdGwgRC7-xS;8kr&Jun$^(0+T;Ek-QIQtO1bm6pfApBR+2_F+ z;SotNXMi-=OVfEOLn{B)zof3w zrcw3_g;mKdUWU8(YP3xGURN0RqUM_YraZ=Kwl|Rly{MckYQU zme&Ww)(&; zFi;0vOnz_F2Bk!uLW~VO9=j>Bz^H>nY)})iHn+9TR~=j>(aR+}fxTI`dp7wS4KNgY zHd&O^QI~RcP4!A5A)W78WSa9mX=sh#So~RMFS1x`RXWf1*nV1@!}j_7p{t{r`E!ow z*(q6%VZMeujJTW>*v?07kMX=}Ua7{)G7XK*q57|u>&Et=@&UTpNoh|%V+WOCe&?Ok zvw)o1VlXRBMEud}biYG4rI!`7jXp*i8zU|o2Kzih;>|mHlWRHa>=2b(8#wLx7MV1l zqv>Kb5mlun6aG$kkzW)Q7x*j;z?oZ1*4pQf`hiq<6Ek1wCPH{WlQB7<3zk+Z_ZUn}h*Mb~dL z&E;f*p)Vppu}Q4!+(0aK4!FPUf?iL=*Xu=vd81l|MRTN*1`Z>+2J07Ifqxz#ZRP=T zCrQ+`(fN%j7+D?>h=4Y4`<~a$Bu04zBKF4eP4&M&1G)E4?Y3BPqf$m^)6Ei77_1^& z(5iuJieFBu^QX3&E}Kj#6+mf8dfgA+xvn@i?D({-(d2lnZ7Tmnu-OQ#McdBC&u;7@ zeNdN94C?8KB=wSwDxa1IG`w;O*sR}jfasB3AkBM~?B|P-sSD?-1V#ETVnggCQZKh@ z4LY$(Xwt$?Azhds!*<@qn6wIS#)Nk8!sPE$uG%Kwq>k;3U-Uhm`ic}RXyuhVBO;NIF%lULp|l=|%_>TM1J-Nm z*5gt9u7FSV5*$H=@E0QS46<=Q`mFJKF!%9o7b5CWtLOGpOR9XYLtmOb^qF1;!&kT_ zUu4uY&0TfRWRl5g;zIAnY-^@v!-KP^#La{Ef zMWrEtb3bSCS@49;UqRq4%=_cqH1vu=K_L`KK?rYE~nBCexS!gh?)2Dg*c zGrH%aCRz&1mKl|O>YW(UC2WUR5T#O-v=VYK8^xEg7bK?0KMt9!1d$370Von_**w1f zscxw$eOreio}{L}$lTL1^>OX1THf@PFc|(*5dCj=}SFz(m5Zj1tA9_ZF&R$C&P+sk7gL?=~1~yuaOL9789v z4RUmV z*mqZY3Bafwzx%KL`M*cp|8y4q8wmXiQc=z|dJW$ODz?KJ^+g?b6m{Cp!Low*0{DP4 z0EFTe79dK%hK0O?>Ai(v5G!J{`eZd!PR&*6%rri% zz9tD^yjU6EWYQWkr?xcLgf)NZxKs)3z3>*J@^JX%vlgmBU4W|ibC}y7-%5&OVIm>~ z|3uBty-)Xym4M_~(ez$v8u*3Yg9s0m&AMO@$Hk(xU7z~4L%k(R;k{;=1&9qx&H)<5 zxJo`f+#bBB#4ns0%w?Bz&2GaGn9ru3VPM1KCYzW0Kp3Q! zpO?p0duTWE6M|FU$wku}^4c)hE%w1r2$q}f&ktY^4LcAnHQOt+yvI^Rlmb3~+2bE4 z1b9BUw}F(zM|PIT9}o~$#6E1m=0wq%dM}S2^gaTzQ|O`;w0T%m*uEl#5XW+%5avsb z;CBi=)p_=3lNa1TK=LH1$hCs)Q*b+bFm_EECd3t zXM(yQeE^2xV*kgR;Q4t|D|Y-SRdfG?u-B&HM1Q-C|0gZ@hhN#jw2KJ@wQxdjBx5Aq zLX{T|tTl=}L*_;UIMt_rcyv`_kgqOx7wFstRD>HAU7p4CmmqmKSAVGqXI}G0#JTn# z2cpq-{=LGJLtEqh8BrnlEcI^MVd}L?)BLsP?jxSnq|L!=L}taJF%TK@%bvbF7y5R2 zW$#lmKO4~h>0Aw!K?^+PpQ>t` zgu1?6cMgIBeTQiK9*V$c&$c;(?JrU_PHdX-P%UZYh->oPgRVDDlP&j@RL!dN1@dN5 zzMnoX&z_fVet<>P_Z(ImHa0)>u82+^!fs}A@$JxZ0@Y+^W}+2eZb-RjT1T0I z>oqoH3)I6AieppqCf$dMEQ(f9y`DO~NKd0hu3Ey2uRa^^ktxPP+qWUxs|7mcx_#G~ z3UN1ULEMeRv&+TI$$l(k8kPG9I_2GOH|4WkPviAubkh;o)+k#jWEA@F?A$F+&5OR_ zYWrloQT8Uv_i&ftXs>a1TqW)CLu>ql-fMg#~xzl>hwX%HZ` z0R{TZEq=naIN68-i4a=Z05aY0*Hh1foocLu6(>j1{WoARbJ}YG#pS511&CvyPk3#5 z{S3sBQ7BW1pq@~XA|;zsgra2l99%>1XSObo>A$Erbc#5O|MH=8O4+<2-woEoBy*V( zttO*U@P?aJBu=~jeCPr6C_61eq5{opDEfw$CL&tGzrcfG%H&D%ogw16yiifh^acNO z@%@Ac5gD2$!H|W(=K5TMNYJpX^!Ke~ssnYXwD_5XB-v0dymtbS0|Yi}^Ju z@US+C5wYOKEtOgj^(yv*0yqm`EM%H*4y|E`UfWSfyU@=wt!!A&bwKxt&ksd-(tKKI zvj@RO9x2Gwj@FG>|NXCiS|;7+;#QL`i#Pj*AjEY^W>J}iX(_jV+Jlr`eJ2H3Phm_l zm)~pqbt%V!`5#_2nWXV5im4N@CR!E>!KEh{-|v?t$gHoTs2nQl4_27$krEZxmz^?~ zHP=g;YVpWPI|aLR7$ja$ZCn5!ZwOL#&i_!$xQeOC*G-f6^S!4)T<>=F-gw5$=mD%M zOqrIzq2eFg{|CIaF*pz~8?=iO*b*#&DewmpgSynnX_H8|(~kciNwWWpX2*2r6Ef0B zf0q@GFI(0N2Mws-`P~%5AeH#~I@+*ltQy_&I8erf9pct&ka&@2nl!W?KkVlya~1Sv zS8%)Wkth43MSshMr0m);QMC1uuuIM0$$Y7!*TDJC>Hfg%VR`8rAhb{GRqf}fMf(`; zG?j$QI8I-lecImq3IN-3)M~Vm;kT%95u$m{^$n+-!=H-QbcQzM;B-fsilo`2A4B5% zV|lbWG+`W{kA2?v=Z4UDD8UiuHLu5hAGXA);KfxLc8?IC{e7oBACA@Ycm_-*>F=we z2&Bq#4;b>aY+@F=_S;vHUmYz2`nI+Z#D-#C{!fZ|e42klWh~{M*SwOxvrR@oqs&$h zJALm+8@fGUViZ-IZwD>Mn)E8OPIk`J7%#1*$#pT!1j8fzS z)XJmo=uXS~zr3jFUcO+mKGhE5v3B2J75>1ySjQ8RIGFk9p*X6LN1h=UA5C728y!Nb zsH0pD``H!PT|PxJ#a@{?_IAKXT&GKMd80!$CplRA_mxjvtdn)|BBbhFJ=fyhU0cSn zv@>RY`M&!D$4hjrx%VyuuiThOeERln@mmD7jXTFElA2(JI#0E9~W_|aQo<%Q~ z^0g)XxCaaeoAsScF}UYz=|BM=tKu^+J8@CcE+a9g;0{;YmK(Pt=KscM0v?kx+Yh|# zovF9dXs1s}946~7_~$NSJE&jV>M5Es{aG-V&_myw-7tS+X7oWV^>tbb{Rt@V`GdgB ztJ&x$hx(lK_5yH~F~zag(w~x7*lGx#o773?q(Qu4aOmlfbF1@UE8`&g+x@|;pG5&i zH;(TGMVe&=A1He|E@=35**L=<@8Vo+C`0&Ts_dXp{mSl|yVZ{gLt{E_RXj4bR((y4(n*=-3Tr}3p=rZc8JM3!qnML0Tc^R zL^>{@mX2@+E|Vo+`<&C=7x-^vC@eStiAm@rFbzB z&neczI!F|Co(8&fNdKVqWS;LuXiy&&`%u4uD3M&T2-8rDb`qcG+BLN{q1S`RR-~GT zg+D=>&Lpj>e12ql!4;R)Rn<7TvFI%Y;L15tTb!MWSOUrdaBMRu{yyOQFNGon;Ys}F+@a*O`ZNSj3cm?Zglbv+H`YrYUzF;W z)hP`+F9>Rfu$SGQgMRso3FFkyX!P1I2H3D#vqgWjI^xpq=9$7R4fPj|baZs|s@o|? zXHDsX|8Gj{N~ahg;b@=#CuJr;AyO&;r{bJwJ5en{S%Bl@{m<~UNJ2#jWp@?6DPAb$&GzxOSNCWtG_}JB>t-h;H6h&U&f3R`Z6!!== z%2K>pN7+$_CGF?nyguPb*oTO@;r0EJ%||DLRf1H!DJ{_K96lWMODdt=+D0L#sT7~c zRXM`HxVR>@H&q8JSB=;ASEJwQoPtlH%)qwa}BW% z`oe}p6y4;)0Di29)GR-UW(9xa$BU|nWJqTaRc#S4><*d;g?k4=enqS{+Al$EY+8a} zdXcZtqACeYyRCoEfa+041;US&|2lV^sPb{0lG~=GYisW9h`nM~18s<3(!9i4Fj*D0 z2FZNfG^w+$70=|;X@ijF{^tY|`&B~W|I*~YPwIY>&RQE}H-g z=(I)hzYCnL#%bb1fC3hXKeny6)!z(|(bn4o-z0)BuV#lQCQ5*eWs~)wtRpb9;%yWEmJG|i-6GJ5hB8TwVRJUqzF`MyFb@;hi zw3~j48pQ*dR(}=9$sh2@EsEQ6TjcYc=vwae@GWRzR>pf~GvE6_bOkqBCcQ5AJjTY@ zl)oNZ1iFQ25V0*FGWbLLV4$y}IJ`0LoBK-XyvDvuKQCRPc3)+{RTVfxO*YS_Tq*l) z#Uh+JyB2IUMePEulVaXDJd<5Q)qwq;;vSunD$AIU2Rkb_I?Utr=sGw{2c)%6t;jif z`WdFfn+ibt^3&SQW;ZQY-!hH=ysJk}(;5D%3s^CEV=5nk7S;*apvFit$U%5-Ue~;+ zv%|ok`AmQVT4|_ULXU=Ywl^^9uvBfPW~~egXvInid!`*G{EjAN-Z@YC>bme<%B6VR zyXxDoylEE4UB@KQy2}X;ecu-M2WH{*oLBK1(=l$4!&YW*laX_dABuq z@w|FG$D=CYnqV4rZKhb95WmciM~O0?N}hqmd!3+j<(#*Y@mzS-p8)~v^eBGYePf-qd zFJi$lg9|P3QN~`M`g;500`i1(d>n>UKi1%YQs<$5-QBf=*)7Efj%GS8eKNRBIWLu` zj4!a@aSru6jj~L!@vB4_TF@6lTZ8QrCj2r(UYm1Am;+DR=<0(_%)XejA9`Y#a&#-DuB^^ zq*`oz!7*jjtyxq*G1xRHS&U85KSEaR@V){Nlbex6_KgNZaVtIE+W>0>W-rXfxXklM zPa28$S8>Ni*$|oP0sPlR^?;qT!^iB+SZYPUr0`1|gfHTTOebbd^f%_54#bc2ImPQ{ zJELbzYP>MspR49SB?HX-4lfSKPu<1TRA!ds8vcxNNV++@i%0=`5Pma|3;0@|Er1?pq86! zzoQ@2=7mQ`&`@%RyuJBG+a^L%TpW-9#n?0^#tf+$)Rmd}9V{yj`@1|w1z3VS_B&*x z7xNeMTLT7qe24|;_bP@f`S%i1(%U*7ZWt2yzx46K0fR#}UOipD<=NYj^~%K@VEX^nOk*10v`t@60&doLXg&fO4$L=R^Y;tpcl0-2U z#l6UZVu|C3`ejpCWHJ0355};x85)%_mw%VAPB_-5Em<5xWJMYlyV=7xRsHNJZH-VD> zc+o^2>R-Q~BZ1(6A{x2$LD&?{F=JAofHNg8E^Zo544N;O6K(y>YsCa}7)B6ofd^vb z2jsEz^z2NrG&@s#m6es0=F^?%hn{{d)zh-aAm#{x5WnP}J3JkvKZ|EaPVYDax`C^h0Rih z;8zCJE!w5MlzA5%K!v8c)S&oo8Txkhm%zKXIHcJBR0ljP3K{~iBnCaspW+Z~OoB+9 zbb1U@Eboc7rHzU!Ti`9@zrO9HHuulYkO|mY$H18BuCyHlq_E zPZon*0%gn=?!6;_;uL@B*yK$~PkgJ;xs})$RSZpAzW~>U^{yuhxSFLKlOdyopB>yu z$4&xF8Zb6RmYr2D)+hK6M{^$ni+#H*$YYs9aYu6>*vg@{dZnSaw;9^&nTmvMhiI;T z&jp|NuF-7)DY$%;k%YH1fJyMgj$A!;9kcf-bfsJD6kze2&U?eRw}$2a9NgxmoQKP5 zZv?zWtuU3`5x&Z3*ckh60f1jUkS_&fE;mYkGMsEK{HV&&<^=sFRZ=ePTKN?9Yo=5t z+WP`;3;1lAe(k&EDp3A*wVy073yf6V>hElj324sEmvSjdD}p}V7KXMUwKt}Anz*{> zY_(IrI1jCDGL+@sm-{4=`ntrg_N?hfd`~1g^0*E zxEdD)HJS!Zqo6`e6^lCinj04)8-kDdM}34g9!lhA&zN^0s?CC~si9}{UK6+M?>REZ z;;hzdoIfZ(>BjNd)zS@4Ki+t*{ry4_Dn>= z-7C!Gk|f6qyOvy@z-E%rU|)gF{{ETxQ7nqrKU3rz-*GXKI}l3~LYCXu7(o}o7?sUT z%%3iVuyvn(XZE4QO|;9Z#J1G(tdwDjR5w(anq3(Q#{81`>o`g1HQS;PYcXVWc78EBw&MAKDfgE0cfztB^ca!Mdcpz$TI+HlDV| zcpa}VQ1Yqx`l8ETpxiMkL{q|!juJQ15)0n>ot8x8s{8pss{n@78H#P2ZO-=P2yslA z@8S=)7t?PG>UgrpF-jBoTvR+4m+B*iVUXxNEh_gW%b6xV_(oB#Y3^28mUeL1n}o8# z^W*6AAXDa-hYL3a&OvDq@vQgHn)1909!>%I3aX+KIe4J!ay&2a@uw>?2%#7F<0`ge z(1=zROU!sp6c$Ak@02KmN&GGnhEMDE(aUZ5EyzdBGB5-Or2S{KHbziri~-(>K~Cyi zjcwXCryJt%=8u!HoX&u3-9;QNO$UOi&q>rx<9{Q zTBBPuB#imN`6x$vuN}-0r}U-CtY)t07w=e)^}U48Ni8B)go#F9l#w82?X85FCdUvs zaDk$DGPCXn7jTIpGoupoep`>7+V!KfkheHA+H#{}I$n@tIH0y6j|jLwV)KC=8zjBz zg5QbRjfoIJ9&3)LoAVShDO>0iGZlrI&y8|f>fKt_=$CTAhLCeZ9?Lgbj@=^PZB5`Z3DME=4Q zzJ@KCh+U_KYp0E)n+QZ-OT#0uxG>U-k#N(r9yPezf|@Xe4(xUV{H=ufQ@{S_1FEr? zC`47g;!Y(v_G@Grk>Z3x3@#GfcEUEBubgRT1-)=~pT^x2w=WKfN_EFA3k6^jwD;$w z(VD#c*k_@qDrrh~5&`SFJr%x-VQvz|gQdjAL)U}F1N=P3)5j0t`OX-HHr%KBl((=5ZQsB9 zD6cYqOv|Ne9=!bRB;`%^g2LIifg6mabJbAcdPE-9Al8y3Sxvv)o9Ue_ zhSl^n{aZnJ`^4j&P&K?iF3^X&;&IY06B`4d5wyP31Hernz=&rJfmq{+${%9rig~Nk z_lZ$>tt&OV3t>1p_ggUkpFMmU*vD2HuE&FB@FD3pOnl;+qZ~pan#0uB+;SP~wP&*& z`ym_~IUJiSN9+~yOpe=+a;_d>$(q;hCnHw+1!lX0tbbj9%-gD9c?rs7zS8P$+PJ?> zj`1A`C|Jh?m<4-&#mnlOgDuj&XVK`zli5vRn<3lkeJ{2G3~)iBZIOoiA;h{&KUx(z z;~!DRhOP-+pk^E2au`1tK4FTJjDBKxj=ad?CY?F&!@~Fl#0PgDD9P!V*y8a^Sy0|z zV2H&O_)MluJRU#{XOG~0y_u;>8tbAjr$e);J~1_#)o7*u#p?X*2-G8u)@o8ZPpL6(58#+ z`DOTGKR7J3U4Dc(cDlj!PZ_Dk$JskVAqN&0q(x+Pq1XO#XZ3PDkfaTbhc21nWmb~W zdwnXgE+!|Vk{|nDNOU(`x4$jmlNd{0@tnPIJDmvog^Lj_0)zm$(@698ku*HO!b+t6 zzX`{HsLtX)48~+Cd8Mrd?W3=E2N9ZH`? zf_wXgQ!ar8jP=u&%1qr0nfEZ><^#LJuFhf=xHD?5;vi7fPqp7@SY1-SFn~=bT=+f& zK|CgZF2O8_4%qAuCTgr`kZ%PKf4%&HIAJo5H(>ejsFVyFuE3x=AL+A6{WsF%au=uW#T<@@Iw{GLpnwf-BzPZnPge z--!B9VSSLnC4#iSYyK)j3<;HxBf$E`BKDRO7o ^6ctdAenru`&F&DwR(IbKXXLi zb5l(WjAwxHS6G(9ez=rnA}n{JE%Wu<`bS%Z?2QUHR+0bPvffG|ni9zcOYB=O!mGi| z0qgt2K1w`LuTuwtlp+??Z%PdO$BjNfL*M^=$Ja#2kITgd(1yPdyX|c}Mz!9uS4Z*^ zZ&TYUzD5~qKlv;p8f&m_$Z6%vJUkgD|K8YuHWue7r9k90MY!$);R*Q@yJZ$;dEo6x=Q99{pWtUle0qxm6n=7#8VE>$ z7wmjk6u=|Cx(R^I_PdVGB{%4x8-pX@`WFMi)tc;;!O^AWY;OZ(6G(U60{8-lfB=Rl zd7UJkf}#e+--RE6=E}yi0`A8be~N!a9&mXoNSl+Zp$m-~(WV5tFe++0=j7C<2IPq} z2fCmHg3dAmi0zsK%es!EpA$oy@U^aI%o6LOZ{a;rb0f~M~2 z&qga1H9+iLu;2n(G-_favA;Ts$zxBMpWMfxuu1z(8foy^oR2ybh&-!YfOUmD5`7__ zL?U$kW+f>Cy7xM5XFIvmKx}V21F_qkeLHY*Ol9c*+J*`2lHc^)3=1^bj6)ea_s$Ob z^ws~Wl^`%Af2#o_e@jsF*B>Hx{(kskD?W+CW6qn;YA;KDrvjt%o0h`IP4PQfx|&6V zC7!(2zf*L6-VTK&MhY))+wnQ%6ij|=9pmrNbYWj7I1wa362Uhs1sDw$4G#=h zr5B{6Ai1BzLqH3XUZ6@jJdWuD6@gTP{36c^3|m#ENgsh}bm1bP>Px>)|Nr`5h5e1Q zZtWRh$auz0|9{r}z6yJo$(|*8OA)CIB_V^RXn>vriD@GxZcrB40iLV*&m3ES#B%qU S*1y2)#^CAd=d#Wzp$P!=2qcOC diff --git a/umn/source/_static/images/en-us_image_0148244691.png b/umn/source/_static/images/en-us_image_0148244691.png deleted file mode 100644 index 833927cb641ba43ceab8567785333d0851347c90..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 16620 zcmd6Pc{J4j|8KU)*vS%El0wFyY}qMmAxW~0C9;pDWEuOOy{wTXAt4kq6f<^ZPqrG2 zeaJf2!Qj59`g}jXd(XY+o^#K+_uN0^yqDLj*K>b7AFtP2tf9UZJ?%N#Q>RYR>uBFF zI(3Q+3jDOuoCfaXvWbuZzsS6ewA4?%@8eklE+`+V-BvqwsyYcow4nm7&vxTX@bc=T<5vC%rq|b5paKz&A#L|*1kUl}&#K3q)`mwi zy(arFx2r(-z}ZKw8$*oI)7}R3t z>M;o)obZ7QTCE!#NsO(P#9j$vi`&*}1(LB9oJ8099g-(|F@lNP?#0Yu|B09LL`TGv z(#E||8{gfut*A&QTR~S{cr*h=xK0p;K!K3gQKbNlA)IHe)?8ft4|-IQBTvJ z`(hr!tTI*uXIx5FK>}^;WATLNB{vl{rs18hT0IVBqo-?S`#}1tL4>sugXKuf!I%3N zo77|6s?OkV`uaI8M6%#-++hCBCLSws_>Dqd;D*b~xb-WQjIFQrrqBVupl@@C0trk{JkO9w%uY0|Hq#TqiL6G!|s$(SCS4Fv`Bo&54EW>PmU<Wd z+ELerL=Eyc6-<3MSEmth{(b|#R6q4OBE|phFlf4HR3Bn9hQbD7{i1*oZ(<39UDEhg zU!l57)5pUHXVr&_-w`&8e^6lSCx6XLPyO7;??(ptf!4lpL`}~JD?tFuMT&@`wrl5C zuWpuSbUY%oM(e}Mdjn%Ha0C+>@w590{fwM^IyLLg#o9S%*LOqX4IrHn7moSSJM z!$rASpFcgIM#F5^L72Bct!m9^+jJsg?LYn z{X#(l*mQe8ek3L9?3gdQ9y+A@(CJKctMLa|<4ds!(^hA^(AlX-r>~i3Vy-PkvoX1$ zp@ZZ_r*B_A%c7hk2m?njm6o$WH!H1@(-AaFgE!0kMBr92H547nI#kIgU>#Q`ezSIU zniTa9fT^~jIr$u|gXVaMa)8;>uif-D>PuN68|m!hOq7{HO+I}><{0%Dlny(THzbQj zAYz-%^x1si(wcO1dW*}zuU*E2#c6>ECOsV%s9C@zWlr#z@t4ErGMQl}m%9;cR^je$ z$3$tF2qs$*otb55@4VX3%lG%^0-1-Z-AqwWKrNsKnN?`lR6!w=x|mHh;llHn{4@RI zsm(&Bd8-!AO76FP=~Z|oooJpYvHpHRidY!Sz?id$`+Rz{&h^TO*3+^UP!2M9>Wj;; zI*nvT`%HI;{3W^VrCu`R#$&Fnv2Jd2Hmg?ju+~A_7Ip9jwd_h9wBfpB5ax03cg2AQ zpRKh|%kQ^xWW?B^DnS(ClXD@X$ww6m!ORFS2;y;U!d@?aLp{c>$`l^x0&_!+PT5l- zI(=yan60XUx;T|20nxkqs+P%YHd5!MCz4KN-oj_aA*ek+dQ5Pl7F6q_f_Yv;)u5oJ)@u`T6=B_~G z=c=+CCR@ykIBprca>3H$A(0au;8Xz;Ks4Lp?Fm|}Jg$t5EV@h#;%^FsFwHUkj|1kw zI&1lhaeaGaesb~nY^NSOuJqenkp?k2fL=DRG9c{Abz1n$WLF4#)mspU!kWzDOUEEn z=eeaHQQ|qB51%?wZ$PW^gO`hv9`4dsTv92nG-7x%Ma9Fr8I||A%ZBc`L7DHb@b|Cz zeD<2?X~F~DWK>#GPRr|`{~k!uE&9I)}<53RHj(bSsjY$Y7YZ5 zbYO%Rfz<}zWIwY(Hzvxf3gP`dXe0QWEqAg;E8%rhy$lX-rmxcV<|Fgs;_$E3g7@kLP+FUrs+WG3;iir%F-{4JF%ebG-<{bqwWKhlRO*3MBDvgE*_PJ zF)vs3IonzSxnI9wh?CMvBclWud~#j7!|zwwS^FvZuu82V0hGh@uytB(ce%(as=jK^ z_}7d+uY5Kl!0cBy9mhYc3(0nQdVPzTKk@zfo*l;ZR?y1VPvAmrpYOD^-q|UMy&lPT zRO8g21E<)-sRc5wH*SeaL6sI(FKo6L02L3?I5L^L|82=vPMlns$EG))L(liK!CbWe zEM(lpKRI*bfW7QU|E#q*dCuvedb?a#dKJ#fR`?}Q(PZ5kDQ3}bonZ5&oZ$|fRPU- zh@FKrjEL5*l9Rh0>YlYmOq&nA5j0lW)svOSO8T}gHskb>?#8BO*E1$f-ns2AT}X_Z zos}DYUD~RF{k%y5{yv24vTXq&+$ahz*0$9clQ|qJ-;}~BMDY;@qNAZlwa}!WCCal5 z60Cd26Gu3xZMQKqR6w0cJwT^(kWyrzBE@Y()2xo3^$Qd0vN72LSEyUIUEU{0epK*5 zwTjBg({{TP0)d{aPbA$n&h6Q%ApY!aRl=>N5k>35Wsdr>F$xJx5Zw)hd+^YjRJY)F z&_f|SRq<674i@Y_&xKX~i0GQc9npdvb5Yp!ODLCujCi-aYi*|8fu)4w-Svh;oKvi! zb{0pmsO!r!m0VyKnv%nvtj+@-iY+fI8iYQQaol5G1A2kkzAx-Ri8aAR@oP0ekMNvIlho@KrtL7W!_^4uGr_FHgZE)X!fg35gLP8>7 z)D$*o7Tm}Q%-;rKyK}51ra?T=YtO)D&^0$+BxtG1V_PDSZjx`uO+o|bx7kg6tN1q^ z{A8Fr{m%{9zQMZcILB1-jlO*UOw!hgnpFua3Kl}yJ=y#+gL%2uo>8WdcI8s8^;T&_ zhA0}^5fl3E$5iM>*a~9k&IK%`!QF|~bB56AVy0!OY@i~*fr~Ruc@sE8%_=MP6 z+@SJJKZX>a{F%-hXB(ytumY~(&lv5_rn|kB>a+bm z=dk^8S)F(Lo{@y#SV>*t$;P{rj-PD1y$#j8RP`H5k_#=q{Rjper<4g)9Z&g-|9g)* z5nlE&C@?#^D(p;oR^_Y~J5Qk7#CM)5ST zQI7euOQ`DiML(fg*Ft&yl(Fm(-!ZGBY%P3A@Jh7h(}rJ_kbOGaK4Qdd6%VO}YnW=z zeC7!dda9#5JbUwbx(5TsGLOj$A5%eCC{qwI3h0 z;u6F{sDn=M-uTtq56V?46Ye$3pNm-&Oj490e&aj(=FtsC=9JKS&KNpTOL)H7IVW`= z9=fAJhHx`?o^{M5yo|g+9KjfnpIw$&&^lx8tj9N{w!$6gonW9FIYt=DDde!c0*YPV zHT)?+VZ0_}x-9!JmJk+OfgJNmQWr)!Tx!`3YcG;*PPZotC`u)d9SR+% zM{LFA1$h%D&<*0B99Xccp-?j~ZM@Psi|IzDnh$$NNsw_S5wlmN$f%8FDmKQkEX!iw#40@j;9Q4bI5kR7h=JN8y3ck*TPR$`j1_G zf0dR5O_qg3n~S6_t~SZ6VB8hO^!7!o8|(MDlqehiaRtU@cl)eD6H6-Yz5@NwI z{d}f-x7{ms>+HR^%=wp41&ilUTCLA{uBf{#k=>9g**Iqv;@7%5jqAVaFr_84r6k`# zqX)kk)3(PyL}SSNuKmX72DnWKS|xEuY{$8}lXp&_$s4Z(SQoGOEtDpBzZRvo3beQLBR zQi*$fX87b9kopYgvmLJ3x3x-rzFqQ2RYx}tB62#QB9q6{S!KHR?Qw|!zBj}R_1#rO zb(QSgg&vL&y*p;`^`HZ1zEZ*3dDWThC@<7&T60=MtB3hTF^*ur4MghmnZuvlCCbf+ zq%mB$vjBeLGGMo=+EezXIyXSf3-r}2sccZ}qpW_O+8Z;U4N`sNXv{%|9S^I<*I!oi z`hJNdw0HP&vO=xmO*c#VlVCeuc;T$;S>gXm%-;P4$$K|)Fx)1<^+fAU%}@px^K?}Fdnl`A#?w22sqzcyj6W0sjRHv`KWF`# zIfLQJ(vzqsx7=<=k-K8vz^W6_8?lwIIIL(Gsa7w9Ds4Az#nbcSZ)?ay??hHm3(tyV zRte8VnxS7GV?RwYStcsh6U+m3Q0S#P4QQI(*IXjVw*;`n)QjVFw+fd$kRi^ya zblKfr@*?W+hEsHSRmQ0u#u_H2$qRbTAdhDo&jk^=Y!2owctC<{sXkvqM6uTbL{1~r&KLS_rf2?8MqtroVJSW2{F9B zsN+-o_a+2lh@m+8fzY1z!v`v zAz{@+(i6ZTsQyj_I4D~_@WvWz(Rqe2@*2`Ce+~I(Wsa8aK;-2AUNSv^IgIy(O~C zy>?kiaC^?l-5&(R81{4fh=j_Z`xEA+AF)Al|7Hm$nsEuF4 zC-wO|+s)LK>!4XqIrbFBHO%I298h6BFtiOBV=NO}=8yPLId{M!r23qQj<5B}< z1ZDiplFxVQGod;MO;tJp4s(IU_dwv9blXkUo*Vbt~L@gh7qHCTf0kwic z=^4cD2a>pR&w4;gz*^lk=uDl^rQpSzVRkcPH?F_oYJll*N4|C$lM-q|L*cvr*W+ei zN4GNr!I58*10hp`QGiazUuyzLJ`S2Hd)>{MBm?s4q*yy+USF; zFvPA$P5BIoD(}lq8oq2vuOw4f+q;Un+#wm~q&;k!HEsTh*xNi(N+m*#x$Kk5b_0~^ zGe$E<6l45?t!G4tX*;XO_3n08TXo%k#!8TCM-H^03r?w!(r_OM!2|?PX=VtX7{&!< zcvnAhp1sS&qk!Xgk6QCXb#@IZP?=ZCyy0=h@}SpkzJvUy(nFQvAjr*Qo6bSScNO=! zy&{eUcyI%U6fcVmc~MC+l{@0?BNg<=J9fGoVI4)$sDPU@*}#~}{;k1&@6wPTpTJWh z_3OoNi0e=4!mB?_4^O4Wy{N#3-M2y?FPyIw+=~EA641N9satZ--F@}#ik=f!j;hKX zh0}fWF_onq`G=X7nS|`?$+uljp0C&1X;&1Q-;~Evw5p1lRNpl}iwL^n*t;)VBzM`f z@&1>WQq^uXb9=|fzvLFhFK_bW-6CLI6;6`w0&;#^eTm`T*AKKG#7j67#-?mpddpT( zoorV1CWcR*)8eLh&8DkxEiC>0JxBM6yTCLZj3a~Q?j9n?_Rnf3YFrg6@Qr-_e*5Y` z`dq<>X49wlf)8I>k(-~QuQLL>ZFB~Ti=2n|2j9|X7_6B9?~d(fuU#ngH_BLsG0oLbI$?j4c``A<23qbnAA z#Hx&@KWZQn3LEKnzG)fYdWB);_6e|Nw0__I8W&0a+_q8oZsdV#7x|U5Cj$x14-+XV z1U)Cs;mOYBc(8=eM?i*&s{rm;(ScW#P+VxZNt*Nf7BJ_IZ}FcZug@ZC}i^2C@-KN<>TQp z@A1Rsc9JwAILzS~1K)nvuuP&1BAm}O8o~if0n~gVLTqF#FU(nQ-e@F4$Ze*bH>Ztv zc9^KBDok)bJ(3-nr0!kp_CrlpdyHnD- zf#}Z_y*BaGh~hD*c?l{%pCgAXoQ2j+Ra6CbS_1D1}4oFR3Ega&jne7xgz@ zN2c9&7VQ{;k+o`>A+>LDj5G+Z4si12iv(VFn_y?kIZi04Kn)Mm8tI_mMuUt9caU$D z!y&GSmN>ymYT1(*$LY*IE30y4I-EgRfryW0FJ+zs!bO3;KL)8zLe% zs^OkC6rLvXR6fRQ(JniWyDb;=&OiWvsJ$NmM9@Gh1(H+Iez#fe>HDg)u3KK=G|3b< z*j)K|^ePQd<{N`9CDnZ8a7p+|=K)Z-n<}?ucY|t=cq=-e@z&Yr-^WuO-2XYs+(Xa} z3v6jGo{ykbD-iaeQ`+5erMK0NlV#I5UAPCCDvz8z`!s0zfZK)h&|XDrr4WqoRqdYv zH9TOOykHB!;NkUJ2~GyEWyHjKc;JWi$w~L0=VJIug}518xW5A+X&y_QwE-_jau{JQ z1u1PVPXY0}ow=3J+{&D*dl)S}200$qiDB*+5`0#zG-5O1kxlGJT}#%rWYV~SfAti) z7cIM{?#Q(jCBV3Bnu{j(Z*S;-<=*0aq%PPmg1f@PFWae6RVC!wVfuj*Vo?1c(Yn>$ zZ|+)xpUkAIqw9+&+Z|>Bj!T;!tZE7S&hM+0$s5}%?fJN3*Au5r(x^RR>{ooAyss9= zSetA09IcW~`o77NzR-1EXRNDsM8a-e3P6`ZaeR2T%c(w#l)U2``C@eXC;ZXaTXwlr z!pjj8*%5N&fRpF%QM=0zP`!iAVdqKN>>`Q;gEfyW69MOZ=li`JTxbxufSA4?ygCZ| zfIWWo6r0(P4LDgl=0>}0hB5{cI;z#m?8eBwkM#E2h%up%{+Gn1&SPSfT7?~{Z$Mgn zpJRfC*}7=M4aAtCpRL_v*=NdfD&K~+Az?t{rU77l-MGp#*pJx2wGLSNyvaygvXf7M zi&_Vi?_s&!RtOe>s&MHDQk@C7kU==uyavUO7H2^vgDAGt(LWTeQF|#BNlLp(N!ZN3 z>j?T_I;BFO>-i#pQg-aQMR}V*$Xl|aJadUJN3467Mv?DLIW98vM1W577`a1KREQG% za0A}^bn+Hupr6!4Mu6};qQgr|5Bi{w@0(A=W~tZ-Zp-_A$DF#aYcx)e&~`Jw{jn*u zaVxd;By?VEQB2}Y5J>Y7yNes83Kml~T;)vEE={kDm5Mmo!rVyTA@D)*m=o9`=x8yi zD3X8}p$FOzMJ zX&)@kj|fBA2CArx=jLJ6;b{Py<0yh^f)_`VohjhFilyd5AAMSh#!gWTFPu*~Hv{UC zg=R9+jcj2Y9t3}rMrT#K9UI*@i-EZS4ST^3I9)i7_*sQSU(oiUQi3xI0VNvaNiA9e z@pI0I{ht<-^h6L~QA8)Ni5C8I0Z=ME6^=lnFnH_dznW**zj}Kr&uTR4=wNnk$!{H? zT~EAFIY{PRqfAV8ek5PutF6Y%a)~*O{3H%4QxNrdpKDq4;l!5(ng_A@LK_YFZPt0! zb`Q<^BaU})dRY6zhu-;s@)l^izh#LQX39OdDGS0G#6p%c zGq3hj*D&&v+}Vq%kDHY_d`AOM6|C53bKH1Q|JK$*LA<0O8#Fy>KLwkyP)(1{^T<8Q zy`U&#Z5iyTQ&j7&4RpK4T+B>%Ee@ekcy80lAPTe_H)VVtHTzo|)qU$Z$O-qQOT--v zpWt{@$`was%)YD-^NykTg4R}Zrb=ee*Q5fKG1)Eta_%O@bUcP{cF@aJVF6nNz#)G8 zD~EUS3$)o(kO;B`q^F4E8C13PqpZw%7A%k2=bJrflvt-kLCz=6#C^%_Xb$LzEY>gk z3hMYZH_OOpV-o$=_w;4yGfh>3>L)gS<)#+?jb>jF$C9vD=oLXt&Xo*nZr7_1T`>Wj z#O{4Rv|q4aLtVnYT@SFNmQT!EWESttPj9*LNp>I_DM>6qahoii8UHD`A^BNsF@BVq zuN!mH^HG%&Ee6QUbo#Rj1L(%#>fX~cBS};^Q`PnJTa~fzqBm)}dk-m?ckKIMhk5hj z`<}PpS-8=Uemv0f_gsj{%silFUpY^59PhZZW!uJ&i?f+|cvbr21l62FBlfNBcpZH4 zR3P803YS>Z^+H`FRM@c9A?sx8(7vl|mx(joLm4VniM?CLoLhq5A+Zp`jzsV+8E_k9 z9b8VK1Qc45N3uIA4Q|zk?m=)|&s-pLiX=QLp=Fxbmm~H1-Zz)!s*I6AA@!48f7FnH z3svP`%Z^L^svd5u@D!sSXDtX0qC#}8BO~k+0AvYKT1AF^$7a~-F=5d=rsQT z?jI+U2p!VRLjeAV=TEJ0??06XN`~rL5*0*x*~t>%u1V|*=?RG?oFTDCe=me_3JGB! zNp(dScjeum;lY5fh5f#HQ~(HN=&=jr0Ui>rekKc$M5LE%#IKSln%^0M#EtwXU63w- zB&PX$aleV?Kf_gkRP%Smh5$7zEO$t%UI2|?*q;4YLbHslKg83&b?x6G2hekce`M?0 zeZ!C2%q5iP|s>sm8J%b08^*MnA0~pZQ-ra#jNw3Tri3$!5OIR;$(~ai=qhns}$4ibP@h#_VU2k7Ug`fA;C}^+LTYg0E z99s#D8f!^={_K3&6lEI={+$5Id(UR(<4t@8vz*WI-HO)Cn0=>9@x=b!7OC1#c86DI zZP#pGjlmIo*~&Lp>X51xzU~#=ELi4rN`jEu$EKIuOc{t5FXRt5Lah#b%_KX~F~w=E zLItnkEq*~SV+)}j(A0`Vf|tVs>~s6vJlOJBq(IS=-UDy*b?MUK3uyo$WGo>5L%dnt zJ~!-?fT3d0IZU;xT|g$InalaeiZ@IMu54H*m;N5p0Q(moMJ1_Gw9Ny%$>`LiJ!XQF zq|G+RyrFh;aU@#FHQ1HUZhK|49tc>&U%K^e@|4VEwmzjdrz1x;zSGc->~(LTsj|+5 z9x+m;FkVF9aG2{O2UaY;dg&E940$D|`R1nsdrnXd%?7O*)lv_+Y06^D&M~aAIpo7MIy)7lIR|E9aN; zWr`FmuS&w|n6k#l)y=2x^TkQCwLR@ZOWu*rTDx)4hMo z?Gb2hW0lwNX92mfFC~j}%zCQnhrrnNYnS{B(CU&8QG2obt#Por^N_x~Gav##+o%Vh z-Hc1iXX^jr6>j9*>V{*AVf=IsBehPF)mt;ag1PT*X{6KqdT#Gxbk#$+e?a}#xWtvK zka!}WxLpr3bYs~L#ao?o`;ldm+Z6{_Zg$E)N$xaeqg;I=B)n7gV=w*rVy&j42%`XxSxMLe%+(hdJu;<$WE0#>MH}&b~nScGZCVWgti)KJJ zNQRCP{)iJGpGgNcyH{jSd^p$kcb&Kc3e#a}!1j_mU!|Nbs1yfU>pxzd%X>P`#W5nZ zi|A))oiNBl)N?qud%H{k$q?A5QgH@3fz7wqNeq7gU(De%&?2y%kgT#lr;~#wtb8T( zUR$WX12_))^n<7KK8ZdxiX8hXf0w5*vL?M^f3K8}fpmJb7d4$omGa6v^dVRJ z{Ofb>IB>8M9b@2nLw+)0A%7^%t9vG3o85>Z5B3!;IX(Zni%N3-eMFqFa*}1{k7D5x zZf}y=tMB3OfkcvEh#73A3hc1t+BbR|Zr5%Y_pExuJwzshXedx1z$WCi$@+6lePDv@ zLO;uVpUjbRT@ygH`z>^gITv1*)m2!bsZD;rD4+@rm|cjo`U=#PQK=uw4HbQ|(MW365%w>4ua=8b_rc&xe*mW`VsD z#X@qv!0iJR8b9dQq51Y-Pv&$MNGm7`_WRb}mHs*IC8VK&SUDQ-8BXZNaZv+%On`@X zfnzGov^~8D4QatpzoSnCPtOW^ONK@m)PGfRR<#E8ag`)L6-j=52JF!G`ZA26^@WO@ z($MzN$FH-39kl{!H?Mz9oSoQvm6$+O-ZC3BV{-wrLBSItL(r0xe8k5n;B@Qp((C!| z0SvHT0~tGIbtUOM>uxi3G_ce1vjJZhscAqD@bSQMd+nCVbUBo){HwjHD-S3UzqGSz`oPBG%NNX5CKisLBmBn} z+Vy2KwoD2RbScNUVEIbpOf&qrnJf^nLo^<>$v;ytXo8fC!)g20_7~A5=Fy+8O!_`t z{I;R!yAYD3cXzo(^mkekTjBv;e(@b`GpZQx&R3>O`@@8_YtURJQ zawzXAqb72BO!-3+ks7t1q4>Rnn4(-zB6%CC8lmTpd-Ms+@K zNYfCO1!w;H+sB)!K5rw;wEdjU=UYe|nSP;RwxkS*hATfA?aMZPuqGb;M@@*JB4d!q z$v%Q1M(R(tEi%jte6TTN z$Y2&{3kLkByn@ojTzh0DaHD=JB1&SHvQvH1Lqy0-TfR-U9UYVU3dHy&y_jx8q@uUt zF=S3oE|(4M#ev&8sJANrI*kFk6%BzAL~{8(wYaBOOhIxx7CnH7W>jwt$WmCLv>Xq4 z{fDCtv?)SBr-P3M@_7t?-DLiT*yMlpJp51jGH)&PKd4`EgXMqV>;q?fjn{rh%4*^ZN_Gmf+k3^2@G3oysuFepE>Q478}BG75Z zop+%Lo=jfxCYArU$)5!u<*PS*L$Y;fbU3r_3M>SN&+1gTpi)xGP$QqJbOEUKj%n2O zsT(NvS{MX8``BIs(eE?OMG?bLweQxVL)*3%RWyJ zMT^IGs~(X#1gQT>J<@#-FzOfN%pPOUn4{R=XgYU;pMpf9`|lE$&67oDx|s^fvyCo~ zsOFxBdJ&1WFfuP59!4c^qkP7?G-||U=h`aBw@5;|Z32O$5q`y5EUjRt-j&#q3Pz(U z6Qiz2bKb~guNpHW#5C6A7PDAavSgBo)~D&(Hmd-f{>56MHORZ6eV)HTXL|PxV3@@_ zO`pt{7-_e^-B!vQ2fyK&$)14*ALd?vc!}ehxcgAbPq4MB;}6IoPL4?BBclAOrpP@a zK-DQ)z1&S8wDElUfj>-t#qI3|*|>!l5-_Z=<;jZT$hMjF3TRN)wbLwb*T+W3PGv;G z`osl&y(QyzxuVgsrZyNW3T!)otwg+Ql6|v#I!@(NjlZ^2K75Gfp{RH>WYCFo7pSG> z3Fb}hJeM~>ZeMp>`~wU<>-^iTI=^aqBH4&f=+K zt#~=mu%?Q(Nn?6{sFS;6m_76Qgxyx+CK==P5r{P7*FcdqJ~>$P6=CEHXrA>Qo_CjUYTU^UyCT5C<^lR*88KrtnczRYpi6G z0rLrJWe_$ivvv8&;?3XnWk!p*)SvYj#F0~kZNRY5{dx$KJ@D4>T~e-l`cE)iC?Q-> zE)c#Gn-{d-ph`WUPJ5T02%V8pjD~p~WUyE9NleD4vd+rG!1Ge48K3#-2=8`XT`Cz& zh#Glq3Y^!YslTFDeownBESf!_kJW2M(Ui_yn`Zqb^T&=a0y#oqIg+gK(d)1VNo~F7 z_P%y0(Us;BiII2uD8a}lrg=smQQZ7E z$e4@Z$yYR-4?AZSzw4~%SeDiL{x|fg>bx=!tbkpRyq8c9cYU7zl|7z1nuoQMy_ln6 z*im40I!y0f=!dt`wh#0R-8a?g!ly=yO%#zN)|jSPZq zc4Da-)d67H0X?C`>d1`QoH?x9pj}`BK7Tx6rN~GRJ`1!X#ZT%*a0+2z-k;|->Vc-g47>jy&H;B3=qjuR)$Rhw zVX=rsn=}CPrt{z&Kul5a<5#(X*-6AysGNS%d?9GYv_^ely zPUrwQj@!##cl(}F{!g2qJ{@3vjc>w>|A?1N8i3SE+L4YLWS~}^!N~qSO-AmS!`rRJ zF@EJD>d!esnor{P$v1Z^EJ(3NQf8TVh)rK!) zc>baU(gJDIos$|pCf^DoEa+!VkFiMx=-`u++{8%qw3m=8!|(3C+D=dUiblT@HW6ap zIt4-dA0*`ApVr+vldZvkT_Y{3MpzEUd|2s(1yl^b zHu>4y<$tTG+~P=TGH-Hk0b<^F*hSYsP?y8*w!<+7rZ72iC~o8@k8`cI5TNIKG2RI7 zGV4-Jp}mN(4x&T|*u(bqV(`cJ*xWPZXmIAyrgDC(+o5&4*Xhe9aUv%jiQr*jNK#rw z-ug}8vo#ZhO_tpPF<20l-B0;Kwa!cdHFIx~*5TbqyE{TRL{P2=@ z1?Yr7xbmhRUb=9TwY=a|l*wJVq_tAw>T}^YKY0MuVHR7NwWoHAzj2riis3y*#JP%R zYq;Dgj|5sp`80l$=Jc1b&|9W~*3Cty;?KN6j?cs`+PdxyD&GZGK%#yC=aB3YW>e|O zxMJ@#fBvH(f1@8XOYI%ur>A7X?1v?Jz=?iWKU1CZup&+}CKvkRx3^9oz(Kd zN4sMvM#BX%^xd}65j>{H9&rAA(xjgUvc|Ifns>r*xNOEo6}JbNTsJJS^+U2KN~Ra` zqMH;nK*z4yeZ?M__*^qPi%Aejtd+c{XSQ7`=Mh==<6Rqc?^qIt2}l#I(#Ag?%#f{- z&=h;#{M`etfEJUY*mu+2d|Nw$Y~3EYd$(^{H2+E;rb4R}XN}=%{&k|-L52Y7Fljad zk4c=FQ?$~#79J}eud)BZ4YVX~$hv0DfA|xNT9Og64a;3N=6@ihZY*qkg&ldr!`A!D zw0G=!uS024Bh(aU_z%Qj!OF-)^Hcx{J@CI*{=?<}gdiy!{2|h8{*xpCJ^fA+EKq>R z8Q9e2Dzny-*hJav6F<-)-~Y)(ipn3q+z6$L$~%n!2Y9U>&U`3W`ie;0 z4my%ls||U0KG>qZg8lAs!g-9@mSNEDh4B3@cr&!vJc}D8eeR$sT{@UzE1^2$(in8H zpGA3+g#_0=8I7<*LA$^=HylM^0bZ{@N1Bz2wauFIi27zMbuIUKKN zIwFa$oo_v0I#$twH!pl_*bhqdbj|ps{_fx0_7;qy%w<%LKeaLA((HViJwE81njM*2 zb4>M-A>56(LwSMHk&_?~IIJ01x_va_o59xcHK-r7<5&0|bTK@W;E#_Vj@DyWnB0=(S3*kgB|~ zhFY0uvl$X=U}hy^cUElJ7MVr)l8Q4}qdGz&Gh`~3>aj4YfWK{*`D3QU+z0s~nw+uf zqL*h1^ECGpVqxXVz9*5&F|n1E+|_};A9wW5K!Ex1FOL;o(Jo63q)W~qNy*v|ysX$N<%pALRL5m&Oo&I2X>d=u zcq*HfD?_c>n?HzK9+PmdO4>o~6uX$+OdNAW6r)TJIeR7!*^J8UIO!Ol+UiWhI7`lB z$Equ&8Rs7zKZ}Jd98q6ta43hFPT*&jmo>}RGWS<~S8Rb}YJXE6xJ~w2*lS~#wl-Or z%A#I@=zjBjS`uukx z1#~(vR{a$y*ng;JN57)@dlEmc|4AF!q=F3~Id>a9xRzszPx31eg1q)S!w2tX{r_!E zc3tK1%=$wH|HHEg%OUj`fE_r@o4*~z|1&yxJm_#02Q8sht9rRl``T{@cl0%n_|;GM zdeCQEg(<9HeoeTXqIa9s*00`fPn%ca*r%ZFrrR{0+Gfj9z(@3++5pZ-CeR9`lW6hf z@dPH@U|@SNf{FUZ4Dc`gqB?vX_;!|ipZlZf-dW&lT8*u1kepHS+W+yR`~Sta`2SaK fzwMJC2IoQEsrBV3eFy$R!6}`a`ZwOITZjEODOPn1 diff --git a/umn/source/_static/images/en-us_image_0162733894.png b/umn/source/_static/images/en-us_image_0162733894.png new file mode 100644 index 0000000000000000000000000000000000000000..95121dc65508cb1845932e1a32c57c14a91cc3e9 GIT binary patch literal 13191 zcmc(`cQl;g+buk)YLMuHWJnM_dKaTcO%QdoM2p^g2^lSdAUY!mB3krLw2WTE=)DZ0 zcLwK9e&>&~*7@VSXMOMYefL^fGLL7T=dRba_rA8U7pn4i@M-WN5Xhb93Nq>t$aN+N z=sY=c;Dio<(pBs<%M zvew-qsDX1}YeRj^x2B>l1m#p}JH0=WIbLV`b((yAOKUvdynC}b?x;LdtMkRq&si!d z{AMejXe*{KE9a=PKGj&rOVfLY`+kQ}rab#Sys;wbo_@->>lkbk4#lro_gUYY5QwoA zyvAwy_ZqKM0+*5831$JD6K*An6 zK_Jf-u>meFH_bJZ4Azcls_rte%2CRh_uzZnXtOL%4JZiSK%I$hlsXHg0n{bKJPdeBUs75WDk?1<+Az5Xv$C@4G2dT0z79Didcq)IEka2~mS{It?Z|jh zURc;$$h_H;#5+DdUQUcE95m*mL9KV(JNq0-FD^2=a)30zjAmtr)rGaOeH`{}+s6(J zkU(YfM=C2ThZw&X7i;HfB0k-~A@Z2cvIw9>kyB83(MSG(>oB-1465>)1cB|Jz}er| zCy>(H@_bIHsJ`B3I7ekkE^8?}!H|`O#XSVhsGHqykiPN#j?SmJSXN@7%c) zmyi%{-A@cJrNYt&Ke|v{kC#_^CoNiR&uX-nkuuMw9Q0$UU9LSPdrn(SvSSm z>(jmEmoHx~7EsgDV%td7T-@EODk{v(%m$rjhKGkoMzYoO;yLtJDjRp&-&W}Dy0>vF zySlpS>gw9r6`k~WYXvV>mzMI-=xJ(bXvoW>PI7<8o+wr6u!9YI`+We?8B$%Q?8$~Q zFEgli2p}o78ey%9auG>GbAE}qFPN;HGdikOsHJ4b_g*N{+S2kNf{O5VznZuprQI*x z_+_EURnJ;ab#-+mrSMKu9xB3xLZQek6^042tYv+6iYl@UQy$O}PG19c^@R#qe!l>* z{-%qgNs4gUZ)#Ff*Pvf(YEE;u7GANw^7U=7ut-*B%K!d7Q{{PW`1kLu5pr4Tc_Jbr zw{dXRtjeWU_=^x+oPvVrP0`m>=BP+IJI_U3>IsE=6hroHuS@E|a|K1E5q@he?h^w8 z4!J!~uR%)Qr94Xe{P}Zqv=nZ1r|H|bZxNp^Fa40KYi50>Ja74Eiev9i30P3cDcpi} z%*`3g%i};F2?{2dP{BgwvNE(i6{}~#reex`krB3B!x$mQcyLD@EcilW)-D0rde-oo zrLR_@Ufk!;<<6^pDOT4^&CE_4{WLXy?=5$?)4eXIi;a(8=^l$(B^0k(3tH&H4Wc9` z9}FUF9k`t;wD0rs#fxW?d{yx4kei|J&YM#b6BA1~{p~I^1?y^l1n!6k2xxgs&(5mZ z9ZZIzn;hl?d(E@*=9rlOHdLXOii%2fbhJpC9rn7o(y%3;sM{Z^Q}Q6Zfect8hR&K%u`J%!?@+dc|h+h*E6FE6KAgInH5R{Ktk;_Ri@wzDAf1qh( zl)jTZ^O4{NaUh5;{dI5S&BSwiI!#MEIux9;=oa4uzM zs{4-*l<{Zp(mlwOhi=6lC@Qe;;^i7;DrT#*#xg7wzYL663oECXEl{J`XHI4^bF4Q~fK9mHd0rmV2XJ`+<@J{l-dqU5Jw70R_apiq+n zeqJ6PjLFd3QKUQ#HMOvoV2(pRRIHJ)C-=)L>i7*Ay{i+ONzCds$XDieok+dHqJn}0 z5yGqyD=HD< zC!W%FJ=qiwg0%8|_j?6{KJD*P3EEAuXc}X=Zb7b3iC-K$Val?fKYtDuveA8O`qqJ$ zudS`^y9d=fkJb>qPaxGAH>aG1HDpc>$>y~!JdpO*){LaCoYTHN=FZN}yfw!}v=A)k z9I`u!pI*$rW#c@6T&xwza37b=q0XREwmNKf^xpr9@5Gvr~3 zx7Xhc{ndrI0wATIO(XzYJiIGI1c4~rj0U*jo)kbf?_~b}x*Sb?Sp@Ov?da&}jAc$! z&23`4?$8gS9kJNXGY5wsO>9nr1Wq;Z%c2`t6?b=cWo2a#kLrInl}v7~_N6H)D(<<< zZkc0r2-wB?8SNoh1~D;OIzo**|L4Kwh&c&Go{#tYX=!LMvcI*l`D)*5?rdiE80F~V z>Fw>^c_$(wLc^d$G;PrG_r~EuRo=hW0*g1(us7BnwT7CP)s&ZOp5O~bvaz!(tElw; z%i(s*q3+C_P*Kszja;#Q0P2QqySuwRk(9*%30VQ`Aj|-%K3DkN1&%WXr-@-jRTX+< zqyf9vefxbzZS5ImFiRoL5dPOmzO6hGre#A zg5C&%-%b3RfGw&f*YuIARW{=>DJj-GNvv#avwr8c$kkr+{Yu-(w#VU009%y)Z9^Nm zy}i94qcFwhRaC?^E_?c+iwwLPW=wfT(CDVC%k!2iay$8(5ckIb3^B#FqflrxT9lTk zm<^!b`1tsq9_0!>72N3VWsr;6yS)q_2asfK#?3Sb31wAY+~m{?6g;nTlt2+mLW6Y1rpzl{WjP{V_AHDP%!;S5(bv_38{H>i`&Z*SlvB1K0a3$k2lke_XW|i zonY2;l@4H%K}(+}*XAgeR#)X^Wy2C=WM!fDSfyHOYcManySwH3v$3u7KgMlhUafF~ zo55Du+uKvu(7=NN$X_nryzc{+(bV*-zUD{S{E?x`l~S{A5G)0SggQ!X0C014t>`or zahQ8Ix#Op-+=DPHW!DD~@a0P>?^BirLrFe9O-)S~jSxJCvJc_mL6sHCOl+K-NA|wY zhMo_Bq)}K{XwjGIs9&U>_gT>l;Kd(^#cHFAb#1EdT@W33la!fap9l!VyO}uB9%J|W zbF;Gt?eg)S#C6Tjo9r4BLYIC9+@OgF&T0StDu3$sSX&C12!fZ)Ut$N`wx*txmtgn= zV7PQ_$x~7{l%H`X5Iog@!`TzMFZ3UL;&TFc*2}9_NRMS=b9873Ru>F7)zRi8IeySd zBh|0wQueeUW#;dNdKHR^ek*UzgGugz%|k&UXF<&;AkddCDap#JNXv^uMC(969t1O~ zn)LSa`WMQTl$1#QyGm`OrKQ0Pop=}I<%NCxc<}VrH6|_q61o005s`^m*K3_uGLvtj z#N7@sFZ-8W^qQ@U8{}pI49P^dyVFFhfZ?sJtsy>vR0twT+4$7p;Nb7yk9x!es0i`! z@IZe6zBWX;0(t|8V0Tv+U<@%aG2ip^&3KaJvO2-B@9BAjz$J)~djnvMYVI4VoXkvE z?yxRp8vB-9(0|POdgkOkSh?P&cQg|H>>%ncnE1v zNNodx%yhB)kR3|wjZ~|XW}rFz*GTwvB?X1h9UL3TGex&LI>{EkksTIGV@Hv+T(xw! z^9)|dr)LTZ9htJ>f$!g67)00oqo$7n{}+<^|04PS--U$^LVs;Yqq(W+(o$!vYVPnX z`L*g*1OmaXSI#0NG&W0KlX9yD&gqZ7cA1l(&&I?QY(nL)eRB@k>InDu_g7bs`J2b2 zQF?!e*l{1yWK4DYZ;GO`zP7$zVa>>xW%>TP2R>*-NZ~hUF5tU%G-{Wzwseza>CR7~9pWXTARvBJlM~@=JM3H*wbRLcC;?={Y$$Db%kj(yvl2)KaT{$HLMvJ3{zEgI<`= zUJG1GOH;uG8FZ@NbAPk83n(@ThF)P??I;xxIQ8}P4E;{cXjDNuovgA)uemtY`0O2C zdzbRM!q8MDXMeSyK#75YfiEvlahX`!O?@ z1(kW-yh=!`6mI8`)tbrC(a}(lRmE9|Z2Q3#n@Prt&>u4O93xXxAbmah(;fRla95j& zo$QEBg459~IVB}IB^eibD@c+g-DlqV@JzB(=RD2IqIab=gg7G7&z9lm>Hey|#2F?d zgx+vYIx6ThoKt&WK7I7^vLVs)B^TL6mRGaS#AnAEIJ0Wn)B3}ZDz`t$0=9alZE$}y z-xrlroydP|sJP)s&)ZuRiZDskHuB|v{5WW_dULX>Sih>zn7a*yvY&07o_BDd)do#Z z&x)Ih48I+yZem&``zyV?RD|6LT+HBnBFHEy<>loQ;^T{SN?PU}2L2ML$fzhvL8HD@ zVQJhj@ZWfDLJg3fNI{CmVzJ{EH8`l{y`JVPYaWPQVZ_;3xTr{L^NDlTg`IV6tn$xW2C`<~eu>2(pY zjry=~RaZK@t}n~jkgE&F zKUhoxx{0JXlDxJL?0eXDELUiFl7KBZOK7Zq=TE`qLfVPr$Mg~aT7W}%*XV+mmv>`* zJymrziPvJusYWrI0YOGieivr>!t=w24|}z#CW#n~WlC?3dLCGweV`as7k+uc0)xRq zzX{9ce|^DX%98}kc!(IY5lB*wM%(%ES!Mg zZA$P|_5Q`daKizO{B}W*5`9B#L})0<1cO`Mw6Vv2l0~Chca6)My1^ze>vWu|4TPNu2n*Mgl`WR_6M+q=UY`u-B(|UmH{%u-PFk$~ zL^A$oyewQv5tDoO?p^$#g_GSkO7UVCry5IrF&>`1r7+S1rYAB?`ag^V;G9O~9=n~S z%=Er|t)r#n?OuN zq{sdqK@!Ib+V`@u_p7HG%xdEG4DV{uM?Poc*-EYbbcl|5`>A`ZWFL07F{r%G-x-4FD3Ex~-fpa0t+mX|7%t-6$u^VB(N#BU zN->njxWcP%5fKv?=jTt?xvLo(Ug|9OBgMT9q%u}-HI$Vx3VYV9p2ase2ev!_*&0)r zyb0?}qod=p^#Cg{LD!^Tx+E2B(&k!}KfT+UxlqE&&1af1X(w3kxwq7Li-5v|-X0F0 zQsT0uT4i^2a~n|l@dJS*snYkTo1XDLVizx3L`Ai8gp&F%GBPsKqVhCfE?}u>Xz(ql zYT$j2sc@#Ormk#tSvm<9OH)&sG5DC)7=N$1QL4E2Xy-mq(n2#|qPRbHFFSSL$lw9+ z5J+N6a-l?b?%ajN#Qtr7hoYir`!CLP`t@7)u?duoj}Y)CzlQvct9XCLAkOp$_a}Ef z&w=QV2Q@N0iCOhbQg-Y19&hljS{1kc%P=kzuU4ZBOjgHdE>E8hhEsUe|Dsz4v(KnJ4t)}pdUWI#Z}v7eXbNMIHH~p8m&5i?nwQaud$|;3g3RbU{>I10 z2Vhxi>wNuUnwr6HnT*dDKR?qKgT;w?kF@bqQ&A~Af9@zmE0AJaP>Hscw=Y_o_LBRR zY!L5`2Sr6a&|o10TivM!3({Bm)-+?0aKpg>8jShC%SD40pqU-Nr-1Ucq&2?SlO~p= z1>2RLzVTUMPT@_*G;4RPs+i>;xoZ7f!8?XgXv%|of5>f#)OGc2ot#Qr=P}}wDcKhj zn9qYJQd5Dq4t`(!_;vyoyxcmvk{8o(s?#=krb?9y5?^a;>)YEOE1W<9VSBucD?VPB zmPiy8;ao3RH>=Nyq6Fbib>>O^)=B-vJUJU4G(X~Ia}|TZm@+U+O8PrEyucRo zv$C#J>;;o7xJ1IMEyF_-d7X0-tXDvxfZOP&Jb*?Z`yU=2ZfUPwoswRK@kpQwY)qi!jdl;+#KGX`GN&RLPq*vYJyg7 z{GdRy@u4C0{wM&r479a#U$9sbkNqt+4G+gAB|R}z$#}6NHajtqoR&5{G?b~y`ihm@ z7U4O%1O$aB@uS4{*Cl#|E$m@=zZ_H1-Jd{VB_aJvS?EJ_^xb*J-FLiDnJK!}Ebyss zt3e~wgsOjbHrxH!aHEI&qs>%h)?~JG!D8BgQ0Kb9PgPuMYHCN3rue*a!H<={yu7`^ z>J)w1!EtnS1X1(MR^MMovp`)oP0X>y`gFn8{sWv7-Jqk`#0A5Ruqw75QY~A!&oQ{u z$*(eXwBh=?WAh%_L4|Ic^GZ*Hmn%S*mVK!;un#!5qC3_2IXO9J>OIT2Z`4(vL`<-QM4SG_0ircP}4a&~t1fs+v&Uhlf0^}hKT<!tfwjRZz>fs4w5XDPR(^Fl9nA2k=M_C=_7^5<^1dVN(M7;`_)tNb0+2 z$9%jC93Ul3eP<2`4aKcd266-rNIc%hTNxY>FS76>&lj@aQ-fiWUTg2fD78MnhoUW^?UOFuqrHs-XL2naTP&xV$JSC;1bjO}Nogdm> zIxVy4=LC5Hbl;ezQp7bGn=$B_#zd{S?_h`PN?#wYoXDzXBAz-esruUmS^k zqJGu9|G0jXvfUW}qenvgX1cxhS7VM#m}Ge^4};u@P1C|Uh zLY5X}P*VdbXkpn4aglHv>%;r_L9cfg9@h_h$9ss+;8_%OE<1^w?ZrMwh`zsnu&}UD z-v^NO{&KhAhB*s_)_J9shlK2u|@w6y$$%e{317vEdO$p&pP>XPSkKgnP={*>DM%6|}eh>kr z-ff(-^KlJ5!&meaa>|xt=7sMfWSC9sgAy@cSx@eJM-O)j;?yO!J zE8l?xtYf)bTVmXK?m|+qKT*QqIIG3%xssiC;TDs-J{wLBU_c323@*5XQbfLrA=&dlg8DJFJH=)RNu8^nL-wS zN`4Y0V_<%E3#Y$Lk`+=6V1D5Hrw&f?Ejp_2lArpX5uVz55D`HhI(&&E)d4u&=ZYW~ z;&9)QR{p9KPnk|RhKOA?cmH>u2I=JyA!N!83WWk;AEIud2>oZ@hT0?8~E4fLp_i{b+gbt%Gubw z5pM=q|87Vq1WV*kPG-lOH8?gfFfcUK!cEw}4-`*dUtdsInLWG?xsqmMel}R=*I=kN zi4PRu6Ch8_s{K>`DQKi&`GEo&Z5+2V#$_f+mzS4aR5HY+sz6mh0u(n5Uh~nk*VR3t zMfvV^G6SWKu$2V%ADvDuUBXr%McjI1d>n|VHU3wZpzb|!Q`mJ~)6K22+IGp!5L8Yyh%ivK*+(4+HggV`F31|H_vpR)U^pS4f){ z^-4<%Xe2WQ({}ls9`Ge7QiKlPk;XW+1c5dbP|GaQ-k@TASGR_M3_(o!Jvjiv$I_FTC8!4aDCLQ z8?E8_aZcdm?wOw@a#F8Qt8Q9io<1m2w1*4w3Bs^S)asbpYtHzWaC(K28Ci)Jm$g_K zddekhgY5vwsB#XTclNz|_bexs;Pb<|YQv)=h>A>VfYX5kBndO%fqcNs!~Bs&F>7!@ z8h}2W&8Zvj^4@pUw8HB>q9em;g`G?T_;!SxG*_BS4;F|{ zlw5|i`Q>2NKwZLQvQsB2v5jvmXG|9EByb|{-*LUrpusK3xrX~7NOkFZ~3jzkk=afqylF@`0|G^)lfdQRK{Sr@x=OnNzt_OPrC%_FM{% z+5lQbcD7GXYwX=D@aHZy%hVmG7qxlKYDg?z~E{)dQ1@@!32 zHqAH&zPjP7gFViZierN@p*x^!9IcTL8r*j-TI^+mJA-bk$SMvu)j z2CLTe9jC#h8d{gy&Xzcw_DK5K<&ev{TstB7<#fG!jUd5`)38h71)fq&R@}MkY=(Ac zxOOU-_p8I!o?%MPI6sGPi_B_%hh2KG4zNm`QSb{eR3n|5v5M>;;5V1sYt7)ki=(8G z{DrOD2K5a|oA6hN+DbA3a$oPw2NIjKKk(~t?;xWqgld0#oPf0&dfarn)ivwm{+MIj zmaR5xJv9Wbj}IPsLU}d(bhHGwBCa=871z^bBxY5cb0&FzK&|QYs+2UTMyOth#I!fOTjW7aWQ)2>J`pG%+0cq2pWl@xD8< z5<);}o77=tiZYXCQNYLU+eg3hDpU-&#ZgO5ne=;$`jd|LzLnjGPgiFqOq>21L7l5p zlngTtmSZKks69<}cIYDmy3+ydIY%qeE2LMj9wfcez!{y?hWo&u-P#c_p+X_C z!ENDD?Ae`sezxLfkG}oEb}UEd)7===k^QD$CM|SBx-}BVf8<$yx$W%Bv$gkk=a=NV z|A1vByn~e5sH{TqXsN`@ASBD+D!870%L|M*Ml*^Zh(Z)@gQCak0(q|4*nGu4vmvzr zn<^X@GPEviy6Q&AlM^unGrtAwBm2* za+F~2E!tRN_JvH4hmU1cjdj5eZ%G~Z_GWLnS(sshlH8oQnzYcWD?A0qVS(b;z>lmR zk3^!k17TKn8*IzXE{cJxszC+=saY2`s6KGwM}&=Eb-hP@zY5!TGa};U^Z4~)?EGrL z?^mIA?*{dbl~zZOhZ&WxioRI+;bH}oMM0~Pusm2IonShNmB$d}TP_8+C?;N3=4Ho5 zDh~vZ_7~-Tyg71(r2o26501um{fLv<()XRUBBK3Hf`qmW`QXk3S++Hd@9Mk5%MX$Q zAYNhL7BFa1Em6_9VOQqDa2Q(}?6UD=_30StZfL;3Fo8pSRduyCFzO>?ajbGe4*5xj_dgR!cpGVQu8Vw&&0CRMz)=IN zVRJaW%#AviXX#gm+woaZ1artht$*&A!v9`R@&8^{{D10K=EWLZtF|_fw5TeWa4Wn5 zMMjZfIl#~V5AJc|Xu&*cQf?A+lex`kMVM~_SgGi95bn=gxSr_us}v!Q7N;+`9j zr~qfgSKJ$A`_nabtGP|1L+n%e-%YP8l23Jzv+J*GCjCRpH73018v$&Y*(Z(IrSOeQ4^B+(>I2>$oqHMU zhTD~W;5jT;i)+!XzBit}>Qhra&qhkT)~(FU%xr7~mX-?O!>y=LdASa`$u2{5^V>O6 zB`Jwk9Nw_qCAx_qS!K?xNxv}jYAe|B@4h#RcRC7N89~Vt9jEnAZ8asIA^t+L;LJ>h ze~y<<(|!PknA3e)9BH9#mV84wY5<~-+pKst*4M*}(ZfMr4M>U>N4SZJ3Gj)Sm_Vlo z{#lj76CgKv!0TCb~8fB&zYbFRjD z6_{h0{#sN(_0o(g*lZkhBR-xYw)1mb+{oCNf;JGEt!!=isR#iy;|r;@8P6PEQ)bez zv)dBgt_QVefa1)|0PG&Jnu5<~msi?ymUBXrt zGW`B!z@>pX^#JYi`pui5Wnd5jfE$oDC^UeCM@UFWOibAb_=qtswMZmA4A&qgElpfZ z>|;j&B*Z8tSabw4n4whcn~9CeWz_qy9U4r8as-~{{g4R{Wbr@SOr|{nK0YQqF_CK5 zN-KZFuBy%!cnji^lAasoYqF;Fx}9&_aX1H{?%IdhNm4Q%=}IOk9jDo{C&P^9!o&wd zRg5^^#r4Ay@CL4v44qwwnlTWWk|q5wqZ#E9k7-fB+w4q>o|;m|eG4WgN%_8D5v#Re;CL!2i6$bu_Mg4Lwp||OMudnH|ND}qU&;a2t4*a>)@2_2=S>1p zv|FTF1Ug_2fQcz5=a-EDDGc*d8TenS2f_48OSkGg2GdqIttvYFQSObW=P4+E1C^q# zu5RsK&%<{=Ln8Tc;j6q=Y_nY{8pp@Z>z7E91?C0+ZSD9xqJedRc3Dak{3a=ShsbW_y+lkQTQ2)WX(lfee(uMfpt3a@g`d-)dyKdL_b6vmdd-!AZn!OIs)yGu zcJgvN<)oyfSqlpyd1dP-N^p-=H5tHYi!D(d ze$snRrAsy2YCcRl{x)FiR*$`{VJ9`WJdkp}WKz7nW23xX?cG$3t2${VYs_(eNtO>{ zluG$E(SN*q-r4#owe?R!{q5lN2fE{FS93N!>hMHz=2@JCO%OMC8ka+95KE*LnkM@y z;Ah>Sg`yhKebG6fl{boh1DYjud&_Ef2ZOEtvwn6N_U_aP$w^9MDWbg~Gp_L)nNQ}v zFp?}jNhZrmDYc!E{z|8N)+Y$351GF5)`?<jLxIEG)f%WuGl0T`Q9if*|msyQ*TH5Fx8CJ9y{H77o#@fm24 zTcm20-nOnK=%E|Jy9RFh`}T$)(N6mfO<~8C!gGUqK!Oqw1(A`K!K|g=Y9WM%SorC1 z?;t3mIw-@wJ+qot?9dFuz{A3-Lk{rbjk?~Q@DEWiM_^$T^NM2H)kpB0;!qm-)Qnqp zNY!$ruSH8Fl)*aE_fHQ#0bZYO0&{{W^9EB751V-_GvWpZ^oEbCS@rpn>}jyvR{r^w zELDd-42N+a&4xSXojDvv3+XNM5t*m3l)wjR6$?%6NGqCI;pCn>nI0HULaKF3EC_}~ zbf0L#rAAqtjGz(OqVMD2=|Gd1vlI|Y$|Dl4(UB-)IC748Q@=Xgvz3|Zv3FP{!Ze@A z^my|v?uAEoq5B(i`i$>pvz{Y@pEm_zz*4$R_)P)q_tR}n6|L(=Oq0CtnJx~> zUwj11ZQRrl+N?x0A3JSv-V2R(9GkU~dNHpH7;Ej;i%R z!_-2W%*W>NrH=b{G)x+^>D63#*5F|7c%CmKmP@(*W!~Ha6EbLWB@9Y~KdcTV47nz9 z8RNOZO}^~>J65YBc1!j!?|oH~(CJN5?3(kyPz0fh+q?zDS|eC( z_E1(v^FALkFlF3$ZeBHdl8PP!hVbvFANf51#tT2_+saUyZ`2>&Lunf_mD)by?dS96 z_wQj+KBOHa1Zit{v`J7)hA(Ab#sh{RcP=P9FEA_&Z($F%<+|i~X!8O!`&o1N_Cn~! zT|6sseoADhDyi2nYu895Vi0p5br#NlIGFEk%H_-6IANM$vyXT3$w8P?+J;6Ymg}3K z;x^NV19sJ|yk2}9G#l1#AI@ zs%|saCgilXJoKWUL@bVPWt8#no8Hu8*4c~u9ru^9$BoX?Lg>ZhMj!0Q#%LypH8{AB zaF1jjyJR1}fT*rzu^%-PGx9s5yS?@j=9R!Q%BkB+STnV`<9mK>0l=ERwfgJMCaEW; zYY*!dFMQWtk6ozKMr>UxWupW9<;7gc>$*sZr?S+IXInaIzAOm>bRAnD>wfao1eF0$A5EEZbD>aB-PWu(*ZXbK5d&Y^Fvrl>laCmON;-^1v+niiIkh|^NxVhuk zDd*&})s;JtbLbX#LQV9Mgu_2CJh$KSWg@TFlG+mgt@(NJ5%pWLuTY|QVrom1#;3=7 zbbg%_9q*))z-&+Wbpqhnr0V_~oGdUbPmaV)4_2IacdyFK+zxak=X6hQQT;l8ip~1Z zI}YWq`o2R_1E7~Wo?ZqmzXiO_?-{wW<|5t0Yg~2pV%=P+J8$WSM^=Bi)U(!LZGYAx z;HbwprtG_+RfGF%D!s!X(8FlW#-#eo#4Q~+%wM}Gbv4J#^k42jow{Kva_y_1r++?s z!AKuU^v=F;&{(gAvZZ63F(~`$bs+gX39W$*8-8P6`SmYRl{@x)vVwZ$JeSc>l5Z6k z(HHSyk&ORCzS}5~p}z%uXo{LV?{npl zY4!U7080E8V6#E`YvMuGj>CQ}0uuD^`n1sf&OS*2b;;u4CZMDXw9HU_h1nfiJO*IM(ErXvTT~&o* z>1Ctl<%A$T&^})%*-j8oh#32HWo7z#r$Eh=*ap8#(@uL>*fLzzO#%rA;d%a7y~*Ht znh`lDFQCVj@gaGWJ1I@QO6KD*A)(=O=h40L2Q9LPnqvadY|i`J8=`XR&8lzabVFGm zw;g_}4h&A0N%|1c$BotPCY<@=7Bw?`QghXN1!3rWB3%UXeGH>>LltaGw#KE zkCHnmcgR9^ok2YfzyHrTwR-nv`=RC)*7?i*R@L1)f26PB{uaOw#U)LN1e|5{*Oj~C z%PV)q6<6*`xb}R4z^Q|TZuN|fdQMHS)m%EOMKVv->gEzv{R8nWwCo+Y{q%7 zP-qM4YPF&kPPWG?9R2ad=E#X}mDId6?dPyQB`0 z51}kn3?$QImv`;njs>9Krft(`$lE)ZaD2hmhUGx#LBl z$*R1CAn`zT(2}c_EZLD1zpVK0&ld-1LQZcBIwqd4g^@5g%=Xl#&$*<%>1#5yfObYCO;wataz1LC-XCsQd$`B3x6SlIkK++})ra9< zcq%=xN@40iyP!;@vbCu6?Pl9!O$F<34xs2zmla3&`4JJ}2>6);$sHBSBnd}(%q5o~ zROxC1Sx<1Z=)_}Ls^HA|XUs_J#57*w-fpn9N!k`xe)r{5z&co{>trYd;EArvw%$-> zecu*qi zxOeHq3_(9_OlV<(bFsPJxJ9syF-e$gexOmp(hM%cD62nbQqiPyE%Y+l+<@5~jumS# zF32*?{7{B&Zg7>hH|XTE<0ll)s=YCStTU!A63|WsIBmh~hfTEA)r-mk;;5gC;H&Im z>)#W`b5gN7jx%nwACEtqw#MGdnmhTm)$~&KV5(2kT$yT8%kpU%KQ)r+HCbuljs}X& z(N8E2AGgcF>KYo# z?v&lATWzo8SRc9pym!A!+pO$G(B=-n#av5kE3-hpy4BV|k-m^Pnh6p}8-RgLoVx0s zlpLjOFNWrXuRVORyXLC2igZY4BH$I_cTQ}3yZJxmp#cBau(Z2Ds>a9Dr4Dxyx$3Fl z;(2cTx4w}pfD697^F+vfUamXHBgZ^)O39JF^fm|Fz4!9l5s~3SSb@T8Jf^$Uaee8KAE+QWtZ&PH4gh z?wLkzPtF~b2TzAv3?FS54}r!cu(Y64A)MXo)yOW~K9IAGz3r7x{w7@%|F%){GVwn7 zfFPb);#t_pb2P}arD+q{GHcKnfKYMpEgikH+iY*#e1JigXgy<>V(yfc8eC?_7Q&}S z5ao`ZgWV+K)FWx+BUy8~t&s~y^=@1W%kk+;vbN; zhV+9r&*1U9%R+^u4(QY+{v;Y-RI7zH3x-v zu~SWl%c1oJO2Rzfvcbe&6Gzel|CG>SXUFGIpHTsjcXr12aPboF|IY^MGD z$7v3vM|z06tgVd2o#h}6r3+TAB?b&x(RjG=nkCXOHfrRwE+KNA@Y?1i@;8EFfK$L)coi zQSUP3U^^>2OzfFZJshoZfR`^?VGr?)WwYsYhPEqXe zMM(rrpFJyJNpbywp?Cm#)W^&W2h*y3ygp42HCJW(##iXItcY8{!Ko*Vg-K^tsymI=mu0?6Y+SOHN@Q|4n|4`wwB#<=?0=x+IyTOd zR8uCCWMoYM?Ed_Ly|QCH?dAme9F(dKN{n@Q+nXRcL<8H#Q*or=4FSQ=aR_f>B3|$H z`C#vhg^sUqiIZLWzpBl~84ud-bt|c~8L+F#kx@{>f(0Mb`d*0r68e1XK!L z%I55|3Z3IH=onPBFylq3P1Xj8VX<)+M8bJeI!iU$b;bYDi6hFy%XVOBDu!wm z!|y(YMy#>t`VXWaSmVl*qbg4{06-#|nxFbg5$&i1ud5s+qwCilW{Wc~S3s-vjr9y3 zD?<}&eX;Np;--lv+{EOvhPYOvYUa?5&nD?UExtn#Yd66cTQ@<+Za2Yzzv_t@w=zWV zwz_qPsclb-L+hhvKdEo42)}JGbk!|a`obXVFBZ`n42Hq)J;PQ&A0G+Q8sDB9My*IV6wLCR%%w9?blM3Tm?Y9aAaE;2hHp&&|H9)P z3Rd{*nIL?`LL4*I)YH~`6v zWnm`0Kl)l8ka`6|Lm)`q$d&~!92K-~gIv2~NO1RY_n~Dq498b3^H-=?WR&Zz%kFyV z)&f^I>&5RUd&Ikv&O~KcX*q~{amSv7)g1_hyqeoyl7d0nGnQH}>FwHWaaQ2SyyTIw z_ONXE96JkSNu6}tE3^y{;Vl5qJ49;K4nVXlQ&5MoheJx**WD=vH=x1Gu|D+WKeCPh z3n2r%m_aQA2`YNdAGzHCT@gUB!*Q$vCwZkF0N*a3M2I5YxD0nUcWjs<(A@EGMpKXR zx?Pf^K_d0T$=Xhq5=R!*9XiyTeatyqJD|vabenNV9wrECrB`t9O8BD_E`1;&^g{cH z*m>YS3sA7)g`C_jt0}v8`)xJwA^3znD$V_<&3K%jW*+P zt%j|F=@$F^GPz4HUf9dzOsJr`%C~-aqI12?#PEjv_6|MYHy*#9PTqIHYdDeLCBhIE zN}!^W_Lbfr8JMN-G9kY!xd3P~>Ah&}tGK^`GcbL>Oh_VARe%azgoA}}0kkjb4KmOX z!rB%0{h`GJ$v2JVZ{@~HJCZg!1U;1gYQ^7XyTbLQ4M8@!ML>2W6}%wRi%?SY*{H?r zhNZ9P7H>lrZg;N?u8#&u@5tJkwDIj`+-uwf_!MQuV<~)PKD>(YvE}2vHaoy#10g4X zN;io9NWY|0`xBx5*G*MDwlsT*vq^ffLKywSFwwr-6S<%lrp z8UjJEh@3bVwY;?G)Mc=WW`R6TKl4N&x$tG02H1D#O&r|y^*ez(*7qf=A$){*XzcsP zjOSUZMk|d_QbSOP28%PfjZxV;Su!uHpcebo(Za5?o~A-H;aJ8vHeGG%-dkV}zcLq= z@XyOy>SFwF0lOWK9u>%L+VukJc=UMEaV;HF@JvjB@Am71c2=N3Z?PF|aDk3x`jm0! z)acbA)r9wXGWls29@~@};DB6GPyf7kQ)GqSYm-Ts`}y-HXQZSkub6-@k|=7+|1P(A zn8h5zOsXHwy?IQ}s_kvB5m->=pZlJ+hiQLJW5hHS%S2d@ChjI1W`0&+ zR;JWR4#al3-zR=;zn+7LlsW|x-!>}Wgs{N+f# z9@k$LjVTPd_FO1;+7W(c3#IPMHV3)th7@2XT)d7TA6vaRwrko ztd}&5T5BbJRY4mC6(Q9&rJ&q#0|$zzWcgPz?~3(wT?=QOlxGe6m z$xEB)#UEo$pXo1FQyXvR4o%IZn_JzZ>s)*z;#7HwoHZwY{COtwOk&ZMQ2r5a3aJF{ zmzH{5*E(iFJ1Zu)?(2Bxckx!Xf3<1r2YyjLHn8%-YA3NwE z^@OOttz(q--~h2_k{YG3espsN&fVbp&<6cC=NfuIw{PP9rJX$OqVgIy536QYqstLH zYmU>7kxE%FqUFxlwy12THehWjQCS0Ml9SJy?pmyK>GuB#@P6&EjRQJaW7#6$i{1Yp zmiGSz>+)}y=7GO{nh$z&On5!8B4k&&*OM>rl+_xI-`l2r(pckM0gD+O)MGy3T{MV~ zGB2BJ^d1RaWr@`-qhEM>d8tyb&BZOue(OReo;`T*pa2MipFmH@4sj|D5%5s1)GZNyg(=*RBfJmzxB*~w$#@SO@m z8lwe;^6{(Lf-a%$D-735k0tt;Uko~#?n?%NO?H zJNTC}CoHaH+bG$(USq{o7HhQ+o_yBsHv}}kwoJVvadAge@&ZX93tb<#PyF@ z^Lg*GGm7#i?$~;%xAR?&ni)oS&8$xC{LK%Q@jy#%v)oqvypK#yF`V8F<9U~GJtqj0 z)U#IMnV_UIi9UnB;#r4$WneA?XKn5jywlRZ(`VEQ#J86=cbrRsko@kgk(ZL%c+2LF zBl7h4`3F!C`tFu&m2I+u+bW&0 z{2j7f953cJ*d1B}pfuO%^=B`8LQgTj|m8OUT3Grm=nyCdIGfGOF*Rq)RGb%n? zVBsd24_}EEc(n+;sF-Co=KM^{%JRg1-6OzVod4Bb6sn;uzKAJ*jVh3+2Yr5JcGJo^ zu#N*kJlzb0V64iKrLK_|#M#^Wn?KdOmj3!NLwm9%XmAy{xD1O#@lkUVJ;9-&p{}jmjsZP3Q&I z3DK`7lFgm>_X_8LjA#|Ke&{@QHgc6l z=#8WmU)jV*3YKG5yaZ&hgxwWSa4(pzaJ0Ijoz;LGbBz*;XB4fo9r1ab2c4g2zSYqy zc|%k>2OJ=TIQNm3p{P2~m2Pl&944gs>ey$Lh{O9aeo3d zXyw(8FF*vd@Yek?y{zmi8N8CHPOr%aS~rIfNoJj`=gzrV|2XAl9gXU7UA_6pgr)G* zCA*~0NA0yf9(52a-c|eZB7}ew{B{A$l+FPH*-Jd@=(IukM5Pi1U*WA!&8!x$p=D0n z&oQ?B+>G@}xQH5zcA9m%dqh2(QRW`nKn?M>e&#Sa5;v~uRX9O~6ToR04x7*>qDz(| z&)i$x90ix0t~#qEa9faYhgj!xmWi`Gi;GkA`YJucYZGSHZZ48x=&*}MS&^_>Jnn$) zLx98|GopM%if19?gAMJyPbz6<=w*!+Vm0~paq41Y9l23|7sFM9Ocn&C_gPtk2{h1l zbtaFASCqeeh$!KPyK5|V*j273mNcl>N}#i-(R}9*weas@ zf4$zX5Ma8(56RQA8zVS`Q{R!2bnj@+xFe=I-;s_winkZfaS$9kaqs5Le#>IKJ~eI$ zmZXd0yH|72+5xI3v|5iIKYHxlu^IIazs<0P>$CSsc%O|&;<5g@bnaqIi*rl7u58Z0 zSw`*ET?#kCCYg0)Qc%nIv*kRFvA%E&U-@!atk#PZ_&#&MvfofKBgzL4(WP^c6)Q1F zR!k*$;TE`KS?s^|@Z${uK;Fa+0>V4Z5w+5FX7}5eZ?xZd^Z?Mwa$x533e$BSZ0S&P znO+Y{DZ1e-n~6@me59s)|MizE?JI-}Wj4>BK6jsq(F{IdxV8cyGyU?a1@!1fRpkz~ z(a{ASf%GJ5)xva_?>{%eej|^0CVtQ4FllMEh-{IWGB;#H03EYy+epHL3%?A;{hP^! za*I_a+mq#G53k!??^YmlVdv>lqRJKe&D8e}YNlxg>q|VWu(A2{W{`E*qjgwxQXcSZ=9y zfSmu@S79fqt>flVn3DpZDRGi zbKegvE4Vj7BySK?5U)wep0i1v%*s%@e$ur>r-3iqbY%6ElhK0k6}TjKLjb7%(n+mW zt&$K;3UMLo%9QQQP>iP)xSnt2r+Hc!^cfdV5PCCb(iaJ7J+&ZE;VsewrWjFs_~cUZ zr4bL+)s-~gjE%egkFe13dYdyfZQ+Ft?+mQUwW5(b|ulq`iMQnKihuRHnz!a!) zQvuFx33?$Oy7NjM7pv~SniZ9ZpTJiZTduKPNKNDcQn4T&Yf->tgGJ~9=^QeNapJVB zNLd74=AmOmP;H$D2wn>GGcxnu*x&ep_42#)&XR<`U9E%N61mM#=kH!X+8|Z*!Zas3 zfKD6%bmFz|skZ+rz(4^u>fvqyst0=`dTOB7;_2A(;s#xS3jEiAKI(oyZ&p$lXu`BMm*9R|Fi-4gE2dFVEE|cHl1JC2m-*X zo=w{g5UbB#MPPrvTBi^EbYAXqZ;`?L@IU?de_K@bf0p_9_n4A@!CD~1^PxK0kV3Wk zC&c>tdd}MY=-oa}v5rHqT2hTMl0kx2bYP9M0a}QG^>95!Cco^xgCNAx3Vr5cp zgDDeL*EB7oDk}?7$hwEwfGAHp0O?oq*QmBAhY@)@{ZUvS=Lb%$MN=W!;2()dY{qg!&9@*3G=ir*Xj@|D*eLE#) zit}Uh+bmK`X1_}SGK2$XKFBMZZz~I@m(^5+7N*MsjD-sgs`ZhSZw4!}NL;ucHQE32 zki=^4i)~cSpK0Nf8gHlGER3cIEHDS@w6;AV8#V)ip`WyXN)z0Tx*P3E^+$&Sndwz1 z_?ITL45Ej$D82DqqHxHtwLH}pUH%e>9nrAGI<{;Zzmb{7HUK_IrWqYIhU{=9;3)p1 zRupEcjY``mq*V|DKdmI;X1DV@^;6(%_0`lYzn3SbV5ak~$1+nz3%KPqpZhlav_w(N-yTGX)`Pa@t!W31-2V z(OxT3S0EuXOf=Xx+kVCGJDB;lc-5&;Z3p^UjapL29trHehHNXh0Cz<+duwh}XZ=;eoZE8-8!D06 z&m7B!R(BRJu~eS)0mMV$pVs`(?X<_G!pcsoy%fiaL+STqoR)TeiOg^LBU0)<&>0eB zYsa26CW39|!(uZL(}kv`fxRbOFqta{JLV>juQQ+?JZ>$XdYuZWjN1CnV}U@9k#7fd zE?Pl)hv)!5bL^3d^3pklU)sW_`qE!*=Ki#WyzA8tda~)467eRG4)-|y-*sG7Rkh^b zELD1XRs8XE6JYUs0qNo7Z5LEt2|(Tk{WEzBhzb6CN+0f&%*`{x-OC`DYJjSp>0>DC zd6%ySgRW$dc%=m4tx-`%t8?t`J+gBd+;cxbI?lkIlPz0 zm>^$VdfmInHyeZsV`3JAFf!wt0A|EK#q-U(U>GJKNncB^8)0;4V%ps_HI{kTblb>9 zUYmy>OSQ+EV!LQDjnr0p?w)y(TNBD+NreWWi?qS*IsaNa+O?!LrZ)SEK~ zkMs)JsqQm`m;UM=qoXg{j;vRyCm;G0wD~@>d=sr1+i2!MS=cIMKbb+Ti1Q%Ly|`(2 zE_h{;9NukRHD5xTgm!_{!$asqKif?w8tv4%dHG%jLff^JkAt}8d6n->;)V~ z7D!wXNNKDf_8=e-GG$F56N&7=asNcnD6h}AjeoayRg%z&NDIsM4M*X4DuSWDWb89~ z>tvQC#=BsA%7T0}5ww-{U5JvuGSs!U4 z_Rs_0<5AbV?@D}gMQH*Kgf!tMnY{DDUB4rkB?S66NoeI!;1p15Nhmc0^&LsY__|qX z6ksO-euR^EmwW-sE8QA*rl%@w4{Uh2ESmVPTtiS6U6^rym{i+~2%cHqi;KeGk-fOk z2%3>;I0nPo3eN5zU2VC#i@3#Vq(I|6QXPAVAOy2Qua=Z=a8 zJ>oIqMWuR2Y!%13c4XkBV3%b?vsoI0O_(&U=1@Y4Lc0#8ZDW0n1hJ!dhD9b}W$r>Q zs1HPRUvb1JE6M!5jO^P^m^)kQe+jNqeWdg;64r-P9&7x~!DS>=z>5{K@K?R|>P^Ey z?1ilEuWu%*THJl(F7wB++?IuumU3Ymk0NB7m6~uqK-OA?3$Xa&$YEaoXMT!*1!jN+ zkcpFn{kYU|MU-zJMm)Dr6oT?wQ8`f~UDb0u=tmye>6wSGXfQV<3Eb!1bE) zNHfMP3rFGGGrXEYYe!<$8Qt~l_^JhReVY4-PW?UFfv|=G2qp12DegsVVQ`gyw+cV5OCKd)A zp9UQj7GVwhurd#P^?jOLXW%G~C5|t+JBS%qWL3J?hs)XQJmTv@!Euplw@a(0tzK0I*- zIqFdh&R*cFlkW2GMo3P_b9F<3JV2FisN_2Y*aVL`qvR{u{2rp2#&!alYgE|EkF-=* z9VuhoXtM> zVSj`Z7q3W$O}B?Pg9Xo23F9=yfWdZCl`cC;+%OX3EcV6}Vpy7?h;}4>{0~R}(q4>m zLCeqSF(dEeXoG6+F@iMkp(C@_XdEnWKIp|D`Bp3ch&mS82R)Fs<<|tcVKUP4@{+%c zGI8+Grr{#uocOYZNsM(bY&4p&*t%Hmlka7vS6C+MV^#T6&yyw)7P7j4_9yF+lJTK1 z*wHXgSAtD@TVE8g&t3>acyo@!+z3QjN=+KADlNrygOF>&83DF@xkjj|I<|;Acys#1 z2&wAju@qkd1dw;WlvF#!h4EsOpEg2_W=dy^O$uGEWq0fBVj&z6!3wtP4`ZOy@O!;+ zY%1%yzr=U&ykJ)+jm*EQ>P~|E;A>91xA_N6Eo491-)&Be0mEJlCXUv^hIu#Cf8^wCS={ zEVLTZ0I4_&Mp>NYjs_MXd-*A}z0)Z`_e^7enwwjVP)r_hWrZ1QVOX+|$TV*vM<%K> z<0W4|rhe@Ye*+qiUdHND3=xGEMEf^HHl?nVe~<4}Fpp0~LXR{+z%7Li`Pq!dm4&bV zfT6r$ShvtNi<^qvc2#btWdSHelDyH@;ns2J;NvoXPmFAhIv^swy>kAuWBBB@nz zJ$Dq?X1(w6L?VbTeS=F`ExecjQvD^xEnU)Y>uPZT!~qlr{|tBj>&IB2LQE9nqo8i# z3ILdJ2lKce-^<(PDrUS_s-a$9RSIfmvv2de3#~1K@kbf36`-oZF5w(KTFFrz&|(dX z0$pY{0ZHefrl^p*n0SDNc3P#+>x}W-UEo8!c;g-cB}z?*pCAtdLZ(I2?*08~jNDC`ee#h8Ls6`N0UH1()9&?tZ*5VrmG3{g4h zIYL_n>W4%4hpWNaLEa7*fs&1h5THh2o?B@VQ(al@T~V1JGy#;a!&PU+efz#h=iSNs z6*W!Vd-pNP9*CLt(Upahh>bS@C4W?I$_LeP3IL!%c0*H=I-oK{P6md#KhL&LL!GRH zmQ)}u=OTmdYDY3ZcQ!8TMhzv$d)^zH9Zk{ipNy@(3RV6)Xp_Xdsat!xZL)TCLt8n! zp{;SNf`35El@xYS&J_7+Z1no$I~qe1bJS-z>ORmz=heCd@EzYFyEF#JL$JLituJIc zrbA7RS^EUCD(QN|qy@mdB(2&@@?+*b3LL%CR7Q`~kT>EKWqvDzE&EL&O%I>EH~v*g{` zD3L8a(#5UCN-HlMc)sH^2L@dk^QjdPKZB+8ngkI3FKOZUWp83pYn{$4 zczJ;tl{2Rg*pfM8u}$fSvL&JkC@`w3ta1mc7l0Yx>iDg_S0Z-_X_2{J`}UFB2T_;5 zDs{9%1_m)DlJVBKyR3@%$EF{PDpZMu0gEvN#izX^T5uG-Y^!bFLQGpOr-3P;L9v}L zx;h()^G#`ZgN<{%AD#NN%g%p4Q~MIx>NU@}giYWa2J}_|^!FKI5z7U7D4!q;J)}>? za+8(THenv{E!;`?Ge@kX=+krbCYaLBZ=N8w&Z6s3&2?J&RXmziurmv%iF> zuii2Q5z0KmS8_Hj(<R(4QW#gka_ zrJgpv-d&qJW5u_v*B_Q7eLmD!3sh3MI^C^Kh($GMJ~NBBp$?`>tv-RH zvYlE6*>6Q;w8D++7a=Rlx6IonY0=iX-Cm>>=t}2Fghe5Fh_6hD8QG~XAF#ZUsu%O- zDg%BOeimz2?BBas6}q%>t};~kZE^?MQEbF&8pJRh$YI>w%h%c$>wJXyvFc|?v6eBQ zB9p?9soez)tdQW0{wjU43!)vi$G2sWx0SW6g2;}K9R`6huj>k8mdxiGryUp|y|faO zN=l$0c_n(1c#6fryfzDCB=$k$KQ}HK3A78VfXD{Nv1PE;{1SGU67fDw(W1tM3zJmL zb1|Qnn^6G@>ug+Xot!qL{5=8SySyvxHm&W9#ZArkhbK3^TD~5FQQo4znbXPrqh8=h zO1YJGZ^OOT#f2yJ*(UT@Lsx>#sVUR@p~p$>iy>QrcaChxN~2m?hZWD`L%u{?kLLHn z{F~LdFf|vsZ88`{+)adGMVAjcceK>Y}E76q|eZU8$Q2%lfUm!FV zu*@4<_7jw*y%?dGTPURnZhMzD7s5?ElaC&M81h_XPeMm<>*iZSa*5fo3a~Jset>QK zDV4cc{<8ZWqDsFZ1)+Rg^Fze_lyoCW(gSX9+aJ>ujYNHqA`31b*A}nNTz7OZ`BpZL z(aOtfcW5)Dn3F=Dx?{?U8Kt7wp+P%(Og@HQ%;IwET3oNGlA&{zZ8Q`ks>g6Ey32_$ z-;Btp(+CxNGnWLF@TeC2WQDo-&TgJXNn+^UwB0c1Ho?m>-CXqe)I77B#80DX7sQ;k zGEuh`uvtLJHd^abP9WPQTK8c@)P=3&qoKY0`Di+3xQc)l4)(R6)?1gBFtU6%I84?T zi19zv>QF%O!}1$0-@eVfpCZcuH8IM|k&rxwJe~Uv4L5gYTe_zVceIZ)*uN_Q62-Y1Vc$?+NE%+Du5g zUT~49F*JxEzS_JiIAgkV-HrU%E~*{@8LD*@e&1B029$uCmAQs_LldBsPJNUC1WKOE zkE-Sk)L{o<7AJG76I2Cds=4jwyt>@z-P&o)#fiqqVRNEV@N-%u5%&3UyLt@BDZdQh z?Tm0>vPT_s@5^wJ`CRmy^+mYleCo+ItK`QVIIFNfW>Jkk{(K(Kcfi!yRr2#m2xKtL z1o;@}fI^NgRygLrrpXH)iWgIXvzitHEv8dgKAV#^cIx<;CgeLNN3?ColEq z{uKW=7mcj7D28;5DtKNM5229^fl4--re6A^usjYkiXTmn>BB8lfK1aW0IA~03483r z>Z4wo4p>YDVP#z1xWLvE8w&MD?Sn23Z4%ApQ($`~gQK`=TQzN8Q)r+=LtgnNNp+@3 z@FbM=93%niSZTmQPoq!pzto>%l(Mq!!|z7sv$h%gY*NS88fQNi-6I{ZL^ES8CA$7A zK`2K_8I92^ij^Nt997$w15p&Gj2gl~K?$K%b*UO9+&b{`nMPEoIPgsGa^F75YOgcW zR`b+r;F>~NYoY96T!{EXwGgJ|gu<)dr^h>e0q_BY)EG`aibZ0hJe*IJfK zi(?xDqaf}zgjwBVWo2~R8dal)U4m(m)^%h_E1W8>1}6{CzX2%qALKJrWcX~OQ<(Sm z&<2D;Atc|Hws==GyEul#^(AwxOL6`Q(2+qaIMXi3l8Xj|K`my=PCiSYt#Pa;!Fg!$ zdCVhUbSWrs)&D%!Q*%UVN@TrLZma;A-!@XpiNw!^&OY9E`?Bd(v9QhPNdzn@!YA?c zL~%P%n4=eeB|gfz+@r7fB9S}A=eAvY6;YaJPayDaW)U*P=@`5lr{Og4wK z?(jX@xxHyLBP@_o!9KeRjVF#yR*d4S9G8GKaew?T{KRX%ha=60G_g<`@)t(7%P`mi zVWvDBDduX$-L=w}2 zs1%uEtlbMPNXj@+%tA&Jz^KCg*=F@C4J$l-PV@?er#xv ziKAxp8IwxLt$>qWnl3kBfAt`5@4o$P?#V#6)+e!A;asI8xGeqgr+SzD&C$#&J}e<@ zR}d;*U{xHnELB4RQla^NDvwl(fPai)FVJlI_uxYE(4?LfrZa?AcW9@(U^p!O&OxB$ z50a@E8v)5tj8IGTi~T`te96p{zHm*M)H^u$XV*8~JJqrIX|R!u&l*zW>VU1YKWdj` z_s*`@W*ocLr+0;WcUAujj*l<#_g7WlCKha~#w`{n>F&Z7!MuPmU2Y<`CD~zXLF-=` z8MJY6fbyqpRuNEb`!xgdmFJRRWmfqkRn>pGw>IeEeTJb&y}itZB@4s*knYiK)hbQ& z@oh3W49G=qO_y`0+sd4Wqfec_<<>+PvdNkRgR~rEa^_{;o&{Y|ykV03!5Pf>T?i`5Tn>~;j+DN=9;SX$q|d|#_fB0+yI75{O2cY_mD!9mUy z1iFLwz^<^K0+}`3VyjJQk#PFMnzNy*g@xvSwPFRM`eO&b7ej^Szu~#8H)uJpDAEwnNZHbihNX)Tj9pvpi- zR>8`k40!KEnrGOT=s|!2UhFA+gPY$;ld#%pIF2Kix$K>{pEk?{DiB^^v7`v6dP67U4ndrD zsmX0 z3guT}20fk0*}3Jd)WulK!|82Jku70!#6{9yTW{H9pL>dcwG20`D*~Wz@zD~;?0IIp zvVaMPu=F!PTJTuD;69B3?=hTq5s$hYowSR>-bI^wT-I+%a$gzT0_@5d4fpioUX!7-hf_HT}d)~HE63>$6{OYMg_@}7^H~ZA3~(~{3^uw-WY$gya;-pFGD+IEJ+)Qa5D=r_haIw3E9P>HW}E#^r$X#e8n2)VuMS?Rf@gFPcb3>|i`u?*tE zotWl5lbOAJEUs(~U!NXSs$6M3#3zrjinSvaA{mie4Q7ootZ8>MF)@`pLJ@q8HvIpO zEq$#TBiRk9#w{FZ_{Q89i4pm8E&aR_B>|DgP$a7+ck zlJn{(hmCxD$}P?8J0CqMWZRu86+}N|gD};7VRHkj z3P`FaTT92AkoQrwTS`P$>k!h)hn#(I{v0QpdTEV&ad2>oA*0&`y8!utgpIs4l_MQx z&j2?zw^acPm@3x0r2I6)dF%T{3SnMwPSGw&J-jY27WcX)RA;P|)L$J8a2KuNlKbi< zmVPoG_#iS}+ZiDfoFr4XA1p4AD1jcaBh69fq$-;H(1v%RTm2mO%1got8-Gif0&)X*%E(GV0q0RzeESoPWo!Ks^PYo^obw;`9Uj5y7 zhZIJWyypi$lUbnj`K-k#vTC?3=a9n7AjUf!#7~sIzACTHWih->2M+^5VmdSKLWi)~ zBvQB4*fiSw7Qgy+KclbkS`s1JB`97qVcI5X>mlzonEdL+T?1CW?d1&=gZAl5j_`_w z>RIU0ApY)q_|FUp|19D6^{w&^v_~k7Kg)J{%9|mSof1U{w7sTAXFi4UNEAXt(930= zlMI)}iKZ*!x?5Imrj;{<+ff+vda`V)yN#6mJf|w)Avc37;cN(aAh?0bI&uzbg7&M zkX9?}Ajt@A^p8-%`)?{@KalFqfGN5%N2rdSo%}b{l&7OzMd;^8xZQK3SF>lQGU26m z@Z6>rVue{4ubqA|KSk6|amVhC67iTo06?+DQW7VlAcvE&buRAFyGj0-;hRCs@PN{Ws$6f^JThmUIfdiZ(ashZlwm}}*Md^XT{0tZ-kR)lH4s9u$z_PjH z6O$W<6uB;{{`#3tEiQQFWd1rV<}4=T|eL4qLYaXW0>6R_kP^x&CIT*~b=I(I*)(bVJm zlrZz;bJo2{FznQ*h1G4lWL18zKd`m{b*23{;jSCo^M>;+lL0-528dh>&!0F-A_hCc zh*>}bxhRDO-{ZcxPaa#17a&(4E07(tGq9`rcO~*VVJsc=T3Kkb&uCem_3&+l+D)|a z{)-N({>D6i6%a!Wd(e$)vIb!~END2-?<9M~IjtC{BZI)M-*Mt$PPW=Lydd6b``)-{ zW+G=IWVEw*uVEHLgBb1TKd0}SLpVTOHd?TESIf=#cKv#8aT#OnOSajLGp~q8A{HhP z>dB6AZd}*8c4?F3J;~6DK)@XgoNX7U?E8y^@vnY9yyqpbHtyUK0&Sk literal 20352 zcmd_SXIN8fyDl0)zzHH2njl8!RC?1%QA&bXP?QeR35ZAykt!{KGO+_HO+lIvLN5Y| zw8RFeh?I~72oM!1NeD$qfP|1eaL%u+Ykxn^b-umU+Up!I93pR~LOLrl!ap zuvW&d3rDY%K6#N^?PY$kCA^K_Q^j^lcbZBEzg<~vsD zL9MHw+7AhUKtj0-;7b$N zZYQ3D@@Uqg_T)4WFm_i*SMhva#NwCN5no>2a6I(!O-5N2ZoLGiwnYyY}^VU7KOE%r+GeNN4%-ofmb;Ka>xd3V@O#58W!q zy~)^B1OmNkEt1UOQlctTQc@lzM34Ra?9+X)9REiSzWoQUJWi)^T6GoJOv;Q7x%!T?T{J2|qGk5BifZ+r!BdULX1>sd_!gtC?U__g~)A4~E^z;*WA z$jS%ngkvUaUy_qmOIF|QwJwG6h%ie$%MG7ZfMk!n9=d7`S--+z!T79|N9pm0J2rmw z5Sx%(wqy6p+K4$SZ~i*EE`e2bDxEhtXvcXYi?eAahq-$8eZ39c_)0$&o1+ao&=icw zEn}eLR6Wieqq_#hDRUPK)nx|)co{Z(x9{g?-U-!ZHBp>I5ADf zCUUV=)+Fo3Q@3|IB8g<23P^Q(fDy;?rapwf-si+*@smE)Cw&X*$=0N8-OuX-nTBR+ zCoJ7pFRrMaST0yCohgV5sdq3cnWgGJVeg%djpbWD?(qD@1{feV2=&^{X;;Em*@WUs z>-cYbX+stE>N&4rF;iLed-oGw5Du1BX<0*g5qb#u)Za|+-h7BzE|x_4&r%zrmpWyu zK;Z;S0~DCQ)}36z62c9H7x~oq66Ys@Pb$^V=kjwB*K>%*!sYAh>nj_}eRUgtLHQah z1_lvX=imwa)kJ8=;u~>dyFO_Yx&u2gk(i-7#}e~GD#RrXeyMi5(CWL$L?pJ!_lHLi zr_%Xr=~V)OxrvVzoRaKz*&XDdU>p>kd^B&iZ{FOJ2 z*t|;g#A?j9FMsap+dbkJ7lK=#R?`>`bH!RgNHZDA)@8kU22RV!02@|QU#rLSzO3?e zS2T&&T!*ZgrQgL=nU=!+3+ZY3q!=y}>!kcaE^Kt?nxPB5lt!UfX0uQ75X-mUOZ|{y zM<~p$& z{xx9z!qk_Mi~Wp12C0S^bhhvQ=B2wGT|<582`eQuE|s4^)VISE`BdIGwT4tho}7WK zwp1dHD2LYgNi9H2`uMbar5*SotL}ch^+hrdyV}aOcQRUNWz=T5rPC=}=Miri!I$g! zoVuzRKWF{}raeJ_Zavi(dU~oL(Wei^{ss2GE*V*+f_T9IGoMiAuk>S^wY}X2)r%4(aQ>`0 zG!V%;4-6hHteprQzcZXGnIcQ`Qw}4!z+9cb}ZwnMK!|zxW zOOLZ1<7=LB=QAC=E z2JAXrIaJ~YTlQ?^8-iC!VekT;znQfcXLVN0O6*c-J;|6`gdqj=%+miLVST#O0t@&x z`VF|@F9CD!s$)18`&V(R9f7$dv?P=o%cvo?KYne^lzPzgjDPJVTJkAlTQMctmXh>i z$llsf**rg(nfwJ)Xz7F}1#0pbvF$9%RYT8K#d7taSj7Oolnu+U-`Jz~NAW@ z(F}Kd>+$gEi?Lh^)wAXTc74T}TfExog!_?2??6pPtu20iy(fs8nDwTu_5kgKBR^8w zl44u$^vXc&P+(OIN5X|sNUBQIt$ZlOMYCMwh!EO3`54eY4O{M7L1kRWbXsG9frrUp z1RVAnMsOItb+dK4lkAtn6V*B3BVnU2=l{h;+^uh6d}d4ICM^=(r+$WQ7-D#JqI@DzjOLpDriAZp)&z^C2H^PKB|V$>SuTC> z_P{cqpki}=!1%DXyUHAe@suW1HmuIu9 zJ6Ve>>1BM?(3Ga!c_BwjqRg|zO{F#KTbf3L%9>ibH$8S5FsjKdO19u4f5DdAwA48~v)xH$v~D z6({QE1Le33qZ_VC{mYXGBl$SwdQu3FfSXQO9u&;RNLzn9Q4-Ck@vefk>bM%uAh*li ztT@5Xc_OeJUQXF+>pL>4z}y5_eZCQ$u7v?BJbTbUtVM18D2B34#Vv7%_gTsihS-%Z ziUJ-e9-ADJsP>k?~=e*)e8a*(E}09n?I;bEw_x)86XKCCr$b+}mtcHJV_@ z2HS65d17=j)>5EyUN1*{*V_s0*nIjQ)%tM3Ar)Yz;9_Z!+(V;&%(exmKObT^sLL~l z1hovZC*if~5R@omcFPRDmlMu)ZRLZy{Hg^kpfPl18{P^w8y_~NTRv=Bz5Z5h=QKy- ze#pq|@A56|%9jsVM|OJY*Ed(RzHUex-?@mT2jhA05AQic(^nKmK9FH|_ci}H12eUj zmcN?nb$qt`a8#j_ix^ILe^@9JZcZ4@WNFu;Q(Jus<2EVPP;A}b25lwg2r{ICrgpyc z#!08dod=Accp_QEtboX5i*Zxq2YkvIF&oao7o*hGj-jp3@MgT?)S?QM>BzdNsc95 zZrjc;OrqIJ`-~V-O> z9ZN>D8)(?YAyNL<)t`o->p+q2D-ORC1+_t+98VCpfPv%Y8nWrIUJ_lBPD9j`uNVZ*p|3e^Er%vW{_APE))jI?Gm>>msEL0yC9rPYm~6XJ^=n>!soYzoPxH;AeXcrEvzl5`ZRnb?R#2{YiJ~F6*B|qiUMiNETvJh4v+sjAc|ocQ0IikII1o41}V2B)RZ>0jceQz z9bKUxxP@}53F6jR{+zZkqbi#m8?mPW3jV_X{Mc#_CtMKo0HXXIp`dbYjo(|QPfxG? z?jILa9Lae5UCh=JJM=&Tb3~c4Ur~IVv{r@ZRMGj3E>8x3ap6|*SkNGmZ0nB~t!D%a8;z=+G#7jQ@rJcZZ)MwC-=L1>(rbk*UP5Tge1zk}q4}iRK(C zpXYzR%gpE~Y(}sXMSn|iOF_i-`p@-8_pfm3XY6=3iMLpHLBbd7?uw{@#%ZOs(DODN z@x7p=tqjoqW9`T9o4${RMc*){g+QEBNrGjWJeh)!fi>8zJ7D89aEJ(KB^@~ZC{M(l zaJwTMZ2Z>;Cy)<4!2VcCeTw#}S-vg_DJKu=*A|olflLqmfAm=VRLn-%y5OQw)ZDr5 zG)0ArPoDw#eAD%XiHNUnQeI~UWoKs(0OrUH&V z3WeeWT^w_KDwzQu2~eW8TTWRJRaXL(#QFn7wDm~Z(`yeUQum9?REE!dc7#cv{*~#s z!yrLu$3<18qw*Cnc^=k1>? zEd!YW<#RocyfMapkbR#!@DAhG{fgs{WOq*o!MLLzeS(6Rb04!Ybv#Je_xF{U(8O<1 zk_U`m2I42#;S2!dv1VwQx+s9pt#nBK?&=BGIJfrj*HGNM$Q|M~kx1eX*Yp%IaUmRD z=`*1<9&9m!kv<;GjjZN36ebi-hTi7}_pE_X@b1Vp#jcjYRT|bN7D%&it!ME~w+O?%g;;z)I^5BCT?QnWV`Sz5o#)H7jIwe7LvFFoU|HZTGpIdtT{qHn)A z&s{+XRE8)%kC9Q+c;}ys)E@1s-y1!bo}CK*hS7&O5N*L{_Z1n#sqDU+4-}J~G0+S# zo9FsCYj_$M1S)w^Tx(iEw;C)9Q5-E3-ZAh4Vm!1|{F?Jck99&G!+$$%u++2D=Dx2Uk-I8JZlSnO?<@<(Rj zK)akxdzo)DEGn|P)_Q699jkMuo8a3!J4lzp(xcfraod9rVBIe)Pk`7rWsiq&ED zInYlz1le0-&`ruQdhPc9eM+uUAcEHj8QnB!V6OW*w%|G^6<5i9*r^&=U{IoO$6?dE zusR%_p3k3ij!$ra*Z@O-1-9q#ld#v~prrG^ntBHg6OSgMsu7tcIxVE0YJ1jDdJLR zZ0%j-OIDH(a84!(8unXXcdB(iU)RBQZH;BAov|Hq$m&u`wUw{xmlTxhzaer&+!~|< z*EqeqXv^Xo_7|Ow7S!q0J^R;t0785cwXHm1H*gaGl`K;fsDy1(DH0NtN(wMfqRR@1 z%_f0_y+(oNXMofHRdd4bqR$1E0hBg7&KNKGml(iYUZ7y$Rk&Er{i?Xtc}sC|@nls~ zeAx+8MZ*Xc=4i9JM|*Urj&D=bLY_X{wc=%s_j2keYsA{CBC=~i6SJEc8uHJWwQk8#ztM7^}n;E5W z-~~9cZm|0i0gJERR2SiP#_(Wfj5U3WT(T}m@cd((4wukv7;qS2+0sZJ1Taq?7}N6QPg zOy)NqaZ5wmr`}#i7~{=TN$25cU6rhDDk*!B(jB!@2ZOzqZk3v7KdKv#^dKF#VQ5WL$d;N&C`# zkTsu|L-_2Y>d|uSNlUJHc<`S94p7>xBRvm1Eb+%+7>xiZegwU!b{B+oQx6ZuHTgf^}m(+T}}cxSX6G zFb8``7ip{vOREv<)om;VK4OKhWD2N>>_<4i?+-%?t5~jnwd(oKDZ#)IUt`{~C0>ng z&GQH-ayr7|`b5FtB>ARgEwolCXETIPJp3@{@ zvjE3m-1tB; zkG?5_dJICj`Kq-k%82TTYqhM)SOgbH8n+~UPd*=lleGDUt%3UNLNLy_;+vg1cj*S> z07iuOD=^k&f>Jt~7D7YS+k}N1y#>Tx1s^nJ-3JLr)E^McJMcv-d`$zXBD9d@jAjKX91J;GJZWwPltv!y7#<1 zK!aC=ZV&_R{wG!P-+WYb$Hkw})Y2*|F;BOXI%DY@@L=%o4nb2>Q{sTYtCayc)So?8 zoJAXfo#&g(_J&obOC7baWut@Ywu zP#);axm?8~$&ZB(3M-UM=~*soEDpzaC`n}oE6CKIh6lG8rW^lw|1qclB>ZV-hf`#2 zK&6oA&K<7Uw_H3l1D}Gfx(G9j);!n2ou2x>g;m6%GEas+*Q)JW3jSD4OjJ@R z@{CnQQ9{nsO28Jhv6f66t2YR{cwjBq!l`bjd`E2^Xev2FSdNMd882AKgA)jo(ZXtj z8{TjoMGMg*i3-*|9Ca%Xq0BPcr9xzgT5U3LeJ$|w)?3P7dDOxWBIUoM?OT`GnFqjQ z^ua7NH(Ti4>nYhD)CF?c3BdN7J@gRX(`+A?B5PUKmXhO!2uK=?jU>|EKl+XAfqbkl zP+5_VgFb23N`9R3+$4_eKvl^5tZ57?m}m?7#rn;kli*aOYI@h~*3Y>X)d2fnzBb^K z7*}JNw5Nsu>-@37&MmjxVT|~UNSnD{_WTGFJHcg-4@j$>Yfd#HiK^6F-OazQbdUt zVQwp>mx?-S;Um2j?1Dflr~k(ub?pV{!wo(G3lkk%VSKXcWay9YA9S~pcGgg#qEVE) z!MKK|CMw_P`X#1}jLaYgPN}UL+br)ultlV_yxrmUdDZ-KT-C6$n-)1LAt9lk9vj)S z?jyq;B9@Z~odYH2gj$cb!JiU{+7T=Q2G~b?$50%nEs{aXS`Vb$%BJ9u+{n5Utk)!z zVZ>~|*JnMP_Gm51-kdQ31i1`$C?&GnjA_g|ilyexlVx*+k^)SV0#7Pux+m=szSFv^ zxc>@|xY`nxJH2{7U3%NbFBf|Bh4lg&pG~hnw7qWZQ`j^%Ki*bH!PQt(K2*3_F>C4? ztUXc#O;8%f@A`|pzP!DW_PW3%u2P>~Wp+1Zza`t>Id1Qdx3PM3TnRgCw_qKAf#BE&BX17MkH5ZzKLt+Bj+~+cI(`o1fL9N2S zY37KVJ=c%yJ3k(lQ0P+_Oko?pLy}&!%;?m1j}jFdn+Mq%pH$@5GjP3)Hiu+1bS+Wq zfqs{--I3CjI^I+xr;;m}_HNykB&wxtP*;Iyi4ikThzs;dZ%$DBor%w0X3oj2FA9SQ zfgZvtiN3!79lgh6Zy0Y46$aM|r^L7Aepi>h=dg6* zM>oWPIvks}|AZY<(8#k}!mCZsvat^bPIn&?QAyDg*Brg2R@;NA z`%!$vuI;5ZCUtG&K3lognmMPIO)9Cn+Tt57@R8jKNtQ-93BGD_HW08#4%YfUd%7m0 zqB6wAN7>uxgB!OsQlZ(_jb;6pGZDS>Qo_xgb{Bu;1O>|QBP^{fe+ykAHhBP@^>oFK z|H?vsG%-(5Y+3JG9Uz%#wSat!-`|#T)H3ZnIB=Sq)h0Mqw>GRRZX3$Wou|Z=?6l!b zK)BMK2^BSh8B|L38n~TnD{mva=g`qYCtJNcSjLXY15KH8HA`46l<1a zZW?-_F8lt;bIVOyy;T`*R!t^wC(0u7NB7uTxAalnX2vNk(=#&V8beR?dtwcD zwy4`I$+;c>(2K==f8(y@-U*Lw+2lt0CxjS17PpaUzi1B=@Ou0*1*?JeOx#0y1<^1K z=r9~$$UMe%G5wKm&8+Ofd1famQ@T`e$ymaDU_oa~Qw;EYQdzC_V>hc{7dUlQ6${=R zo|#s_AK*@Ks95(qcZQU~S2W~yxM>akfP5N`y{yBKFB;Oi^<+#pqwTUUVF)+R&VL7T z9CZRcDV1116qe_AL#f~i%h{Ry(9eyDo+U!76^JA%m4aFttG!lb?#)h;3`w_%LCX z{LyOgY;wI-WlN0VZZ6A&Gh3pr?B$pTLb0X3LQAeM zqaX7d#nT-xso!8NlUog+yPw@-ay!)Ixi2rMMB9+o4e~wt1|l>yQ`KR)>Wl4gfMiCG z^4*JU-0-z8tIh8AE`vXP7A||K#mM>2ky-6#JHqKVbG{2^uCbO5g#nu!$aetwm+t>1 z$-_^r*MD;Y^Dq05TLFp$TwfEQ$Y=tR0Y>1==llTRUw>FU;P)z-V56vDovB!Q4hIVa z<12vFOll!nbAb}r2LGP+loJZz?du(9ZD=?K$U0p`@W(u z?=#9j&Od9{9P{T!4#9+Fk(%ST-AxZx@A#Ij+w`l5Pq<>)0a&GPEfHugY9L0)KynEfoi^(K8YF!+bKA?^d z5tk5^JmBtP9q{DtvIV=bpGIPyh*N#)}X^hi882nh%D5883XI*Jrh9hkbys zM{CXbdu;vz=F-+<=%0QDfP)BTK_8J*B#kP9V#n`}6b>P| z-qkgdJ6hn?k>J)BnzFet;JHihPq8X%B!Rb;q$-?H+! zJMDBeU?3|r+=o(<3?Zg>ZYD|YAB+N9U_IV&ypRO_urk%~o^G9l-7>=~$Ew;bKJua9ln^YkSTCz$ESP-Kq* zpz#)ZKX;g6&A$BFqK8~lWx3t|`Bd`*9@}Myz!4yZuj#E~Q0kep!^2Cq3eCi01td84 zp;6h75TY<|NjcC*pz~wlBE#&JPGBJ=J99qy9q$e=_&IZJ${`ZjxOiEb>(6*$I>|-F zR1SiUB(!lRKE6ZNGlc-Y<9F$z`prm*8erD<3W)9XamrpH&c@a109d#p@E)aZIaVM9 z`Xv89hqmi~Jt&IL-Q@D)HF%2>;NtR#m08<+x&B+Y$ns2|@A$1`q9sG6IaK_KNb8=Ir7dLSyVdidE=@1_T}546kkLbjX3r#vXf7k*(CRipQ5ZM0DXKyQC+QOjzU!R=&A2AdED8P(u(TPm}_t(_ar2E8h zd@Je)jMFVUo2f> z$fmZ)$1#uAKD~9c0Ho&$*ua&p@s7CbjwJ^)IA%$%urTF;&@ACnb?EWDgq6ev54{Bx z7iZ5(2kA}Z>WZI`_c_Z;2DX5r;854^Eg;s4z3Mp9$pT&Al3-q7O%qz^kSWThR?`$D z(YlFsn=O4sOM$VE=$(~=3T}vN)`(!<;j(+$vt=>*I>Yhc&)+cL4nALB9SgT6Drwc# z>1&cEma@JkV2;3cu$Cc)>3|8 zOnUwPdL+bGni?Tzr>D5x0xo9Vas5x6$5R{kp7-idD9*{y8nLV6#>&}y%i)Mx?`37) z^qW~=IZvvI@4vubsB*kk|E1WgIEGURdVX-v+dF3F^CXzZ`n5?sB9MHwV8Q2Ep}5W4 zX~cJsbhkYC*NcQTsT^6rk!ku-DI4x__{}kAG;UVxX?7|y;I~?Q$ogQ+s3`M7Ei4pD z`J`+L*Z5Zuzl%aq7{VR7kSKQN#z*yh@=94@r-AHQ!yN{`q@)m z-uMJfKWt-sz|%2j*KUkY50^zw1>ivvMb0`&z77C>ay%_)7&kl4>}@;4>slxTa(Ps< zT@;cxNUTaeTSpKl;twHdo$4sW!HhifB(wajRXin>V)ne7lc4Eg1r z@9WbVSJvTEHy=9Ej0K1M{o4m#W+?2{+w|Z6xNNB+9YoY6b>dEA5}3)O01Kb<`8QK< zO#s^Z{LG5>nPMLszj$_N3wnYjiArjuf2red(}*3Qcjm?2pr=&HhRs`k$@)xCC<*Ck zT>IO^fmNiGR(L6*)(!+csEA6ly+Vqzu!Q)p4NcD^)zt7ca#!NBJ})C5EdOG|42b`L zEO_4qPBj|Tg>*Jp3|TRopCJ*;;Y=Q967$@9xq0F^p2@i|6W}%~%d~$6UTy4+2h72- zb+>3uA}{lB?p3hi1Ln$2lDJ#$^hjRud;>`ls#9M0@G7l0W#B{p>2AlPHY&zzl8!(i z-E#*w+TsQ{9@qm5L!c7 zcem@=9#_iC>NOT6-tzYZ93NuNU?B&5QkyY5eBw<6hoXBgCJl-=(mE?**xxV)&k_kw zflYL)ex2QQZ1h&IQS_o$b3DZ$XCgB;JTQ0K8#4v0?n*fosl(rVgm(aRNk_<2mva?W zY7Zp*^Es(Fxz7)%)Acbju@6#|)$!v!=@5I(1);|<*bWS6CPy6qX z*N5C49bS{^R?R~ntq*a*Cr~goeSP=g;Tz6Xn62`V%4;R?8Iq>ua`l2f47qd_`9K-4 zGoJv+G#A)p1a~nRu|pYRa*U3D_B4jQs46`GTxc!;{L?=?48ggTiBh-DXzys=E%wiU z_|NiNufw6&|L!~qUZJ6(i;7)9JxoOX%BD7YW^-nK?nCBiG^%hzHSjTNF=BIL{q^>g z(Em#^o&Sv{0oa}PzZ2kPvatBj#qFT7^ez=%(e0mf`U*i2ppv>OH@CQTxlGU}!GGiR z%~~I#dR_bD1AtU;iy4Su)L_eiG6Q-QkdjX$BL1S&UHW~iW9b#>!HJHzs(uHj+`1@* zeSgvGGMQ

Cnx!kJ4!CL=J%#N99g@Bq|}ds&C?(?YXIehJr&QjjHfCCyTZ?eUQ8mJdaI(#sOr0C?^Js=)|fmu$%R{zUd9*p?{=^ifcyso+IeNn5TQzzC4eT zi4L<6%%rAi`YliTP}9A+{X>`1TLg)CEdh%|o!JB@@I`=1*r;*CUg|@q9CW(`*W5m0 z9HbtIUf0*gGswC8`Q?BzR12x{b;UY2L)I=iw`AjX#KM zw?Et}%vteEWcxWjiRIAHRY$-6UbucyPpcf5`4gJ>fs6l9C$RVLIsvnrH~$b!LGQXu zK;AiOXshDz41#P8lzp2HJ4>Cxcx!xm7wNAc=Be+&SmyOdfXh$!%%-60Ho0ZU{vVde z!=|a`l#?IcC6&&cFE(cktWvND{QL>~q=7J*_~5)iG~3k*6_bDi@EkR8_356FkryZq z9dAIg=9TWt5$=a}AR@KiI|fAWQINegP-6%`1xtnKhF}>HDd(L^hPwFuS#BXEPvVne zH!oT]QlKciMYUoUN%`P>Ea#iHZay`F!uC7;#ahV1Rtmau7w^mo}SzwL3Bg;Q%E#Ac=~YcekK& zrkmZOCFAu`uaBIz7N}GmdtZO8c-Nk~12J$R2ZG^Yc8RVjk(sR9yZUE8ly2=av4#L( z=42=62t>D{sT$G~@$KE+2tJRTu?)I2v@DrTDxzl@#x=M7N-|0*WW%41)vVf;Wg53L>NyYkN)+8%f^Tb+i zP`J1?rAcQhM^pzAD_M8M_%7HW_dDct$cmpBP~B4JaPs5isqep+S|$y8)fIgM^b7l4 zZ}T6%6#g{`s?qMu9Rz}kk)}0gUIR!k7##05U|3y~eZ-Vi$1J*%E13DN{@YfiO#y72 z-RN7L3cGFD=oY%vKpK!Lx*P{;L^GXHeJ47hJ_ms+L#x$^IE0=DjODBgW9sHZeRPBX zDdfN}Cl7sq7)j;W4lfpJR*I{gkcqbt${c=y@qogR>|+062mmK7H+fpFa#IH6BLPZ8 zn!m0LweI2e9hrJ#Id;q0$PJCCBRkt~DLZY{$6+8s@%N5A?y20$twKXuwp&O=m*_Z# zpu72S`hjpc>!Pxn$B7qJqEAA$iGdo6BB}@do~~RkToK~cCr&+&QdnxVz6H`d5^+W~ z;j9<|NLIaMBKB3S`MqK8Dk=kE$F52O(g%%M!%MV4f={~1rExYkQLDNxwwe~@82B5Y z`Q4IC{9C^5Z+=lmR+eyI8+SZ<8;D@;Gqg0>Et;+qxaHY+P!)-b99kNnSd+g1ogLxV zzMb6-l)-|;{=1J!JGEfAXIni7xG~jx&&yu?gJ6_@0_b-|(m`Gv|G!Hr{*ML)e;c@e z6w4RBe)8`=Ia9C);QOk+c&GEE^X0B+G&!#? zKJR~#2vp%s@r(!br>CbcVSI;_S-ob~09O}Auj2Ug9#D2!DmbZ}ZrRdStpC(jTwQ4o z+0s^&^_Lv{UUzt%rM^Q|Du6THo99F-iJZNcfnbouLEFkVFKU@8!YeB{oMjOlfgoi_7(QUjuH`v^1)fLx>Qx)4BKc z98**7{7*@R$DfjlBPCNzi$`VZ`$ytC&i<*XxH2rQq^a;$K53+Awf(cXWh7AVbCMCY zH8dNV#vZ<$!Ph}2>Ej04%Fnv(TEl#G!kYokvFI`({B@^U4~>AXijt{)@YD5uUEg)3 zsXbe-CBgZL`iM-KJ*`M8IbHCPaGATxi~drwbNk1k(~KAO!he%iY&|B#)Fe>}wc4SK za+|S>oiVZ-4fpd&`hlIO-f-NXlF_Qa6++>rr*m$}gP%0P+XS!bYGW1gA%a75YKoZ~ zS%*42H{cle*#;XH0G~JEo|i%Zio%OMW#*8xczEj$`lcN#b{5$2$Ajk3%)yp$RU{*i z9P-s$39@YtI?OH}e> zd@9bcG&-=5Bx*m38B_dAPz zF_jbN{BAEG_C%&+e`XkV5#$Ag#6Q(oKke|pkW(b@NpgAR{HL_y-+2A{+qYl&5aCx2 zgujcy+*>0m$vDs~sExI@C=#|-}E%k)a*MNi_Ct9Ka zvOR&QiDpN+2P@*J9uERdf_%LXiO8pjKrNYJuirH;ma^7CDBq@P%f_h4*M~zc^mPN) zv^LK3Fjgx?I}5#zOJ$vZ-Bag8Rd*P{_)rDBI-F$zTD=Jx%4o2vjS@aAvahClx^vg_ z4BjS>>y(|Y><{+|37K!rc*H5ixxDNryZ_B-e@X#a5{#Sgj%vwLXrWqP?r?&-G4QtX zkQQ%lb>wLH?p2o_wXuK#YKVJ!b5N_9zQrg`c)Q2bCGQVr=XacJsnR?9_1#V99s4;G zb+94Gt^Fl5$lQ01&kz_KeK^D#)|^hd-qwl=IQnGjjV!3z93a{{_Xh3I&z-j(bnO!T z6;MI>ghf0~Qx0s#K0N5!R}Yfr4qp1neT$oX7T&+a3k)P5*%C}_HdyD*uXaM&@X6)b znSi+1&%ybVMNH_{H)gDgsY9;$d+s-{&+M@YaB3}m9YPD8k1AKBl<`)O`=dJR5eyU4fEM@dgBxSgDp@RbEEH6Kp!&YL zO@S3o=GLzg(-52QO%lq60V*2)`L0SKzZ+=UL5ILbBTdApmY4WgciEzi&F`ZDuv_rP z5T0SSVVR*)pbyfnty!epo7r_pw&=2dy%#~xwDV!fI;8wbD^q0~QMml&0TZyy16>cs zeaddC)liw%@o9_%s4;k4xV$W*0^k<|;*Mb=X)<oS2tpInIH*u->k!vaPFYI3+XyTd@r>vFr;fy!@(RR|e3~HI02lLkVie!@gSfIkrEZLI)T{el=&tCsk6+fuaYNKXCW44@0+wYTiPx<`;w3v+t#Yj3)MnpI=bWAW2_uqdBz$!R%mIg-Y?p4j}c*k(AM+QJh^ zVtD}tIRiKnclrVq>F(-S;HObjRBg>AO?yw49og+;jsoB2AC_MjJ2 zm%jkI1}%Jt+>>A)u7i4Mt}c5O4)@4i;K!dVrL}m;kY!heL8N4$&;|(R2|y7D2xN2T z|2M~3iJ87aYoOQ$_;KLIzU|S*KU2B)9QY|`pGn&Kt#VIIL-4N#-n)zb{G-@?(9ct( z9G$oQ)%?w`rdt=0IwLJ3@bdyHmG#?g{yZ_|-?>zm%?yqoY`B4kK0FZr)>7g5PJW$a zX}GmwF12vlA|y7bwD+7UwO3Kh_&~( zRG5sfg<(jZ{;!1|mP8fNbIOBN{%E7PJ<|feIXApno(9!A7%Z`}xzKBB4Az}%6gMIvs zzPe0aTgG{EH-z0#8MaKa`^Ur3)lECXzO6F^Gk`)N@VzjBN-^uF^?H@Lw}8-JN{Gk zcje?+1H(F^39P}?V$OD(R!-^1Ui*LokCYz*7SvV60*8#9Hb)N=vr?4B^~KJLodXIi zal(q?SEGb4z-r)QSL3TAJC;%r?!Wi}&zL*@b72Gy30RywccYxvcp=wMphs}12NvBf zX1x^U2?jbjl?>D>+pqij%-XsvHq>XeDf%yONGoTJy83UOJ-4;MyKD%%iau>|QrOkp zY{fIZu1PP{FGN)VLgyF0m(SUCvetjLmHpWkkla-cx9z9;zk5-SBr%}Rmi&SP^plEebQ3#x#h{MN zOb4Otw$nL&JLdGgV1>7HBa-Y?_tQQ;mb4W!+dTC(cc#u^8P(+Mm-I`y2tYP|5!}u$6rvy&64DfxzFk28jbG4S-qOZqs`vNgn=>R`)gP}u9pA`M>JwNLN zjE?-Nj>R@g`d-)dyKdL_b6vmdd-!AZn!OIs)yGu zcJgvN<)oyfSqlpyd1dP-N^p-=H5tHYi!D(d ze$snRrAsy2YCcRl{x)FiR*$`{VJ9`WJdkp}WKz7nW23xX?cG$3t2${VYs_(eNtO>{ zluG$E(SN*q-r4#owe?R!{q5lN2fE{FS93N!>hMHz=2@JCO%OMC8ka+95KE*LnkM@y z;Ah>Sg`yhKebG6fl{boh1DYjud&_Ef2ZOEtvwn6N_U_aP$w^9MDWbg~Gp_L)nNQ}v zFp?}jNhZrmDYc!E{z|8N)+Y$351GF5)`?<jLxIEG)f%WuGl0T`Q9if*|msyQ*TH5Fx8CJ9y{H77o#@fm24 zTcm20-nOnK=%E|Jy9RFh`}T$)(N6mfO<~8C!gGUqK!Oqw1(A`K!K|g=Y9WM%SorC1 z?;t3mIw-@wJ+qot?9dFuz{A3-Lk{rbjk?~Q@DEWiM_^$T^NM2H)kpB0;!qm-)Qnqp zNY!$ruSH8Fl)*aE_fHQ#0bZYO0&{{W^9EB751V-_GvWpZ^oEbCS@rpn>}jyvR{r^w zELDd-42N+a&4xSXojDvv3+XNM5t*m3l)wjR6$?%6NGqCI;pCn>nI0HULaKF3EC_}~ zbf0L#rAAqtjGz(OqVMD2=|Gd1vlI|Y$|Dl4(UB-)IC748Q@=Xgvz3|Zv3FP{!Ze@A z^my|v?uAEoq5B(i`i$>pvz{Y@pEm_zz*4$R_)P)q_tR}n6|L(=Oq0CtnJx~> zUwj11ZQRrl+N?x0A3JSv-V2R(9GkU~dNHpH7;Ej;i%R z!_-2W%*W>NrH=b{G)x+^>D63#*5F|7c%CmKmP@(*W!~Ha6EbLWB@9Y~KdcTV47nz9 z8RNOZO}^~>J65YBc1!j!?|oH~(CJN5?3(kyPz0fh+q?zDS|eC( z_E1(v^FALkFlF3$ZeBHdl8PP!hVbvFANf51#tT2_+saUyZ`2>&Lunf_mD)by?dS96 z_wQj+KBOHa1Zit{v`J7)hA(Ab#sh{RcP=P9FEA_&Z($F%<+|i~X!8O!`&o1N_Cn~! zT|6sseoADhDyi2nYu895Vi0p5br#NlIGFEk%H_-6IANM$vyXT3$w8P?+J;6Ymg}3K z;x^NV19sJ|yk2}9G#l1#AI@ zs%|saCgilXJoKWUL@bVPWt8#no8Hu8*4c~u9ru^9$BoX?Lg>ZhMj!0Q#%LypH8{AB zaF1jjyJR1}fT*rzu^%-PGx9s5yS?@j=9R!Q%BkB+STnV`<9mK>0l=ERwfgJMCaEW; zYY*!dFMQWtk6ozKMr>UxWupW9<;7gc>$*sZr?S+IXInaIzAOm>bRAnD>wfao1eF0$A5EEZbD>aB-PWu(*ZXbK5d&Y^Fvrl>laCmON;-^1v+niiIkh|^NxVhuk zDd*&})s;JtbLbX#LQV9Mgu_2CJh$KSWg@TFlG+mgt@(NJ5%pWLuTY|QVrom1#;3=7 zbbg%_9q*))z-&+Wbpqhnr0V_~oGdUbPmaV)4_2IacdyFK+zxak=X6hQQT;l8ip~1Z zI}YWq`o2R_1E7~Wo?ZqmzXiO_?-{wW<|5t0Yg~2pV%=P+J8$WSM^=Bi)U(!LZGYAx z;HbwprtG_+RfGF%D!s!X(8FlW#-#eo#4Q~+%wM}Gbv4J#^k42jow{Kva_y_1r++?s z!AKuU^v=F;&{(gAvZZ63F(~`$bs+gX39W$*8-8P6`SmYRl{@x)vVwZ$JeSc>l5Z6k z(HHSyk&ORCzS}5~p}z%uXo{LV?{npl zY4!U7080E8V6#E`YvMuGj>CQ}0uuD^`n1sf&OS*2b;;u4CZMDXw9HU_h1nfiJO*IM(ErXvTT~&o* z>1Ctl<%A$T&^})%*-j8oh#32HWo7z#r$Eh=*ap8#(@uL>*fLzzO#%rA;d%a7y~*Ht znh`lDFQCVj@gaGWJ1I@QO6KD*A)(=O=h40L2Q9LPnqvadY|i`J8=`XR&8lzabVFGm zw;g_}4h&A0N%|1c$BotPCY<@=7Bw?`QghXN1!3rWB3%UXeGH>>LltaGw#KE zkCHnmcgR9^ok2YfzyHrTwR-nv`=RC)*7?i*R@L1)f26PB{uaOw#U)LN1e|5{*Oj~C z%PV)q6<6*`xb}R4z^Q|TZuN|fdQMHS)m%EOMKVv->gEzv{R8nWwCo+Y{q%7 zP-qM4YPF&kPPWG?9R2ad=E#X}mDId6?dPyQB`0 z51}kn3?$QImv`;njs>9Krft(`$lE)ZaD2hmhUGx#LBl z$*R1CAn`zT(2}c_EZLD1zpVK0&ld-1LQZcBIwqd4g^@5g%=Xl#&$*<%>1#5yfObYCO;wataz1LC-XCsQd$`B3x6SlIkK++})ra9< zcq%=xN@40iyP!;@vbCu6?Pl9!O$F<34xs2zmla3&`4JJ}2>6);$sHBSBnd}(%q5o~ zROxC1Sx<1Z=)_}Ls^HA|XUs_J#57*w-fpn9N!k`xe)r{5z&co{>trYd;EArvw%$-> zecu*qi zxOeHq3_(9_OlV<(bFsPJxJ9syF-e$gexOmp(hM%cD62nbQqiPyE%Y+l+<@5~jumS# zF32*?{7{B&Zg7>hH|XTE<0ll)s=YCStTU!A63|WsIBmh~hfTEA)r-mk;;5gC;H&Im z>)#W`b5gN7jx%nwACEtqw#MGdnmhTm)$~&KV5(2kT$yT8%kpU%KQ)r+HCbuljs}X& z(N8E2AGgcF>KYo# z?v&lATWzo8SRc9pym!A!+pO$G(B=-n#av5kE3-hpy4BV|k-m^Pnh6p}8-RgLoVx0s zlpLjOFNWrXuRVORyXLC2igZY4BH$I_cTQ}3yZJxmp#cBau(Z2Ds>a9Dr4Dxyx$3Fl z;(2cTx4w}pfD697^F+vfUamXHBgZ^)O39JF^fm|Fz4!9l5s~3SSb@T8Jf^$Uaee8KAE+QWtZ&PH4gh z?wLkzPtF~b2TzAv3?FS54}r!cu(Y64A)MXo)yOW~K9IAGz3r7x{w7@%|F%){GVwn7 zfFPb);#t_pb2P}arD+q{GHcKnfKYMpEgikH+iY*#e1JigXgy<>V(yfc8eC?_7Q&}S z5ao`ZgWV+K)FWx+BUy8~t&s~y^=@1W%kk+;vbN; zhV+9r&*1U9%R+^u4(QY+{v;Y-RI7zH3x-v zu~SWl%c1oJO2Rzfvcbe&6Gzel|CG>SXUFGIpHTsjcXr12aPboF|IY^MGD z$7v3vM|z06tgVd2o#h}6r3+TAB?b&x(RjG=nkCXOHfrRwE+KNA@Y?1i@;8EFfK$L)coi zQSUP3U^^>2OzfFZJshoZfR`^?VGr?)WwYsYhPEqXe zMM(rrpFJyJNpbywp?Cm#)W^&W2h*y3ygp42HCJW(##iXItcY8{!Ko*Vg-K^tsymI=mu0?6Y+SOHN@Q|4n|4`wwB#<=?0=x+IyTOd zR8uCCWMoYM?Ed_Ly|QCH?dAme9F(dKN{n@Q+nXRcL<8H#Q*or=4FSQ=aR_f>B3|$H z`C#vhg^sUqiIZLWzpBl~84ud-bt|c~8L+F#kx@{>f(0Mb`d*0r68e1XK!L z%I55|3Z3IH=onPBFylq3P1Xj8VX<)+M8bJeI!iU$b;bYDi6hFy%XVOBDu!wm z!|y(YMy#>t`VXWaSmVl*qbg4{06-#|nxFbg5$&i1ud5s+qwCilW{Wc~S3s-vjr9y3 zD?<}&eX;Np;--lv+{EOvhPYOvYUa?5&nD?UExtn#Yd66cTQ@<+Za2Yzzv_t@w=zWV zwz_qPsclb-L+hhvKdEo42)}JGbk!|a`obXVFBZ`n42Hq)J;PQ&A0G+Q8sDB9My*IV6wLCR%%w9?blM3Tm?Y9aAaE;2hHp&&|H9)P z3Rd{*nIL?`LL4*I)YH~`6v zWnm`0Kl)l8ka`6|Lm)`q$d&~!92K-~gIv2~NO1RY_n~Dq498b3^H-=?WR&Zz%kFyV z)&f^I>&5RUd&Ikv&O~KcX*q~{amSv7)g1_hyqeoyl7d0nGnQH}>FwHWaaQ2SyyTIw z_ONXE96JkSNu6}tE3^y{;Vl5qJ49;K4nVXlQ&5MoheJx**WD=vH=x1Gu|D+WKeCPh z3n2r%m_aQA2`YNdAGzHCT@gUB!*Q$vCwZkF0N*a3M2I5YxD0nUcWjs<(A@EGMpKXR zx?Pf^K_d0T$=Xhq5=R!*9XiyTeatyqJD|vabenNV9wrECrB`t9O8BD_E`1;&^g{cH z*m>YS3sA7)g`C_jt0}v8`)xJwA^3znD$V_<&3K%jW*+P zt%j|F=@$F^GPz4HUf9dzOsJr`%C~-aqI12?#PEjv_6|MYHy*#9PTqIHYdDeLCBhIE zN}!^W_Lbfr8JMN-G9kY!xd3P~>Ah&}tGK^`GcbL>Oh_VARe%azgoA}}0kkjb4KmOX z!rB%0{h`GJ$v2JVZ{@~HJCZg!1U;1gYQ^7XyTbLQ4M8@!ML>2W6}%wRi%?SY*{H?r zhNZ9P7H>lrZg;N?u8#&u@5tJkwDIj`+-uwf_!MQuV<~)PKD>(YvE}2vHaoy#10g4X zN;io9NWY|0`xBx5*G*MDwlsT*vq^ffLKywSFwwr-6S<%lrp z8UjJEh@3bVwY;?G)Mc=WW`R6TKl4N&x$tG02H1D#O&r|y^*ez(*7qf=A$){*XzcsP zjOSUZMk|d_QbSOP28%PfjZxV;Su!uHpcebo(Za5?o~A-H;aJ8vHeGG%-dkV}zcLq= z@XyOy>SFwF0lOWK9u>%L+VukJc=UMEaV;HF@JvjB@Am71c2=N3Z?PF|aDk3x`jm0! z)acbA)r9wXGWls29@~@};DB6GPyf7kQ)GqSYm-Ts`}y-HXQZSkub6-@k|=7+|1P(A zn8h5zOsXHwy?IQ}s_kvB5m->=pZlJ+hiQLJW5hHS%S2d@ChjI1W`0&+ zR;JWR4#al3-zR=;zn+7LlsW|x-!>}Wgs{N+f# z9@k$LjVTPd_FO1;+7W(c3#IPMHV3)th7@2XT)d7TA6vaRwrko ztd}&5T5BbJRY4mC6(Q9&rJ&q#0|$zzWcgPz?~3(wT?=QOlxGe6m z$xEB)#UEo$pXo1FQyXvR4o%IZn_JzZ>s)*z;#7HwoHZwY{COtwOk&ZMQ2r5a3aJF{ zmzH{5*E(iFJ1Zu)?(2Bxckx!Xf3<1r2YyjLHn8%-YA3NwE z^@OOttz(q--~h2_k{YG3espsN&fVbp&<6cC=NfuIw{PP9rJX$OqVgIy536QYqstLH zYmU>7kxE%FqUFxlwy12THehWjQCS0Ml9SJy?pmyK>GuB#@P6&EjRQJaW7#6$i{1Yp zmiGSz>+)}y=7GO{nh$z&On5!8B4k&&*OM>rl+_xI-`l2r(pckM0gD+O)MGy3T{MV~ zGB2BJ^d1RaWr@`-qhEM>d8tyb&BZOue(OReo;`T*pa2MipFmH@4sj|D5%5s1)GZNyg(=*RBfJmzxB*~w$#@SO@m z8lwe;^6{(Lf-a%$D-735k0tt;Uko~#?n?%NO?H zJNTC}CoHaH+bG$(USq{o7HhQ+o_yBsHv}}kwoJVvadAge@&ZX93tb<#PyF@ z^Lg*GGm7#i?$~;%xAR?&ni)oS&8$xC{LK%Q@jy#%v)oqvypK#yF`V8F<9U~GJtqj0 z)U#IMnV_UIi9UnB;#r4$WneA?XKn5jywlRZ(`VEQ#J86=cbrRsko@kgk(ZL%c+2LF zBl7h4`3F!C`tFu&m2I+u+bW&0 z{2j7f953cJ*d1B}pfuO%^=B`8LQgTj|m8OUT3Grm=nyCdIGfGOF*Rq)RGb%n? zVBsd24_}EEc(n+;sF-Co=KM^{%JRg1-6OzVod4Bb6sn;uzKAJ*jVh3+2Yr5JcGJo^ zu#N*kJlzb0V64iKrLK_|#M#^Wn?KdOmj3!NLwm9%XmAy{xD1O#@lkUVJ;9-&p{}jmjsZP3Q&I z3DK`7lFgm>_X_8LjA#|Ke&{@QHgc6l z=#8WmU)jV*3YKG5yaZ&hgxwWSa4(pzaJ0Ijoz;LGbBz*;XB4fo9r1ab2c4g2zSYqy zc|%k>2OJ=TIQNm3p{P2~m2Pl&944gs>ey$Lh{O9aeo3d zXyw(8FF*vd@Yek?y{zmi8N8CHPOr%aS~rIfNoJj`=gzrV|2XAl9gXU7UA_6pgr)G* zCA*~0NA0yf9(52a-c|eZB7}ew{B{A$l+FPH*-Jd@=(IukM5Pi1U*WA!&8!x$p=D0n z&oQ?B+>G@}xQH5zcA9m%dqh2(QRW`nKn?M>e&#Sa5;v~uRX9O~6ToR04x7*>qDz(| z&)i$x90ix0t~#qEa9faYhgj!xmWi`Gi;GkA`YJucYZGSHZZ48x=&*}MS&^_>Jnn$) zLx98|GopM%if19?gAMJyPbz6<=w*!+Vm0~paq41Y9l23|7sFM9Ocn&C_gPtk2{h1l zbtaFASCqeeh$!KPyK5|V*j273mNcl>N}#i-(R}9*weas@ zf4$zX5Ma8(56RQA8zVS`Q{R!2bnj@+xFe=I-;s_winkZfaS$9kaqs5Le#>IKJ~eI$ zmZXd0yH|72+5xI3v|5iIKYHxlu^IIazs<0P>$CSsc%O|&;<5g@bnaqIi*rl7u58Z0 zSw`*ET?#kCCYg0)Qc%nIv*kRFvA%E&U-@!atk#PZ_&#&MvfofKBgzL4(WP^c6)Q1F zR!k*$;TE`KS?s^|@Z${uK;Fa+0>V4Z5w+5FX7}5eZ?xZd^Z?Mwa$x533e$BSZ0S&P znO+Y{DZ1e-n~6@me59s)|MizE?JI-}Wj4>BK6jsq(F{IdxV8cyGyU?a1@!1fRpkz~ z(a{ASf%GJ5)xva_?>{%eej|^0CVtQ4FllMEh-{IWGB;#H03EYy+epHL3%?A;{hP^! za*I_a+mq#G53k!??^YmlVdv>lqRJKe&D8e}YNlxg>q|VWu(A2{W{`E*qjgwxQXcSZ=9y zfSmu@S79fqt>flVn3DpZDRGi zbKegvE4Vj7BySK?5U)wep0i1v%*s%@e$ur>r-3iqbY%6ElhK0k6}TjKLjb7%(n+mW zt&$K;3UMLo%9QQQP>iP)xSnt2r+Hc!^cfdV5PCCb(iaJ7J+&ZE;VsewrWjFs_~cUZ zr4bL+)s-~gjE%egkFe13dYdyfZQ+Ft?+mQUwW5(b|ulq`iMQnKihuRHnz!a!) zQvuFx33?$Oy7NjM7pv~SniZ9ZpTJiZTduKPNKNDcQn4T&Yf->tgGJ~9=^QeNapJVB zNLd74=AmOmP;H$D2wn>GGcxnu*x&ep_42#)&XR<`U9E%N61mM#=kH!X+8|Z*!Zas3 zfKD6%bmFz|skZ+rz(4^u>fvqyst0=`dTOB7;_2A(;s#xS3jEiAKI(oyZ&p$lXu`BMm*9R|Fi-4gE2dFVEE|cHl1JC2m-*X zo=w{g5UbB#MPPrvTBi^EbYAXqZ;`?L@IU?de_K@bf0p_9_n4A@!CD~1^PxK0kV3Wk zC&c>tdd}MY=-oa}v5rHqT2hTMl0kx2bYP9M0a}QG^>95!Cco^xgCNAx3Vr5cp zgDDeL*EB7oDk}?7$hwEwfGAHp0O?oq*QmBAhY@)@{ZUvS=Lb%$MN=W!;2()dY{qg!&9@*3G=ir*Xj@|D*eLE#) zit}Uh+bmK`X1_}SGK2$XKFBMZZz~I@m(^5+7N*MsjD-sgs`ZhSZw4!}NL;ucHQE32 zki=^4i)~cSpK0Nf8gHlGER3cIEHDS@w6;AV8#V)ip`WyXN)z0Tx*P3E^+$&Sndwz1 z_?ITL45Ej$D82DqqHxHtwLH}pUH%e>9nrAGI<{;Zzmb{7HUK_IrWqYIhU{=9;3)p1 zRupEcjY``mq*V|DKdmI;X1DV@^;6(%_0`lYzn3SbV5ak~$1+nz3%KPqpZhlav_w(N-yTGX)`Pa@t!W31-2V z(OxT3S0EuXOf=Xx+kVCGJDB;lc-5&;Z3p^UjapL29trHehHNXh0Cz<+duwh}XZ=;eoZE8-8!D06 z&m7B!R(BRJu~eS)0mMV$pVs`(?X<_G!pcsoy%fiaL+STqoR)TeiOg^LBU0)<&>0eB zYsa26CW39|!(uZL(}kv`fxRbOFqta{JLV>juQQ+?JZ>$XdYuZWjN1CnV}U@9k#7fd zE?Pl)hv)!5bL^3d^3pklU)sW_`qE!*=Ki#WyzA8tda~)467eRG4)-|y-*sG7Rkh^b zELD1XRs8XE6JYUs0qNo7Z5LEt2|(Tk{WEzBhzb6CN+0f&%*`{x-OC`DYJjSp>0>DC zd6%ySgRW$dc%=m4tx-`%t8?t`J+gBd+;cxbI?lkIlPz0 zm>^$VdfmInHyeZsV`3JAFf!wt0A|EK#q-U(U>GJKNncB^8)0;4V%ps_HI{kTblb>9 zUYmy>OSQ+EV!LQDjnr0p?w)y(TNBD+NreWWi?qS*IsaNa+O?!LrZ)SEK~ zkMs)JsqQm`m;UM=qoXg{j;vRyCm;G0wD~@>d=sr1+i2!MS=cIMKbb+Ti1Q%Ly|`(2 zE_h{;9NukRHD5xTgm!_{!$asqKif?w8tv4%dHG%jLff^JkAt}8d6n->;)V~ z7D!wXNNKDf_8=e-GG$F56N&7=asNcnD6h}AjeoayRg%z&NDIsM4M*X4DuSWDWb89~ z>tvQC#=BsA%7T0}5ww-{U5JvuGSs!U4 z_Rs_0<5AbV?@D}gMQH*Kgf!tMnY{DDUB4rkB?S66NoeI!;1p15Nhmc0^&LsY__|qX z6ksO-euR^EmwW-sE8QA*rl%@w4{Uh2ESmVPTtiS6U6^rym{i+~2%cHqi;KeGk-fOk z2%3>;I0nPo3eN5zU2VC#i@3#Vq(I|6QXPAVAOy2Qua=Z=a8 zJ>oIqMWuR2Y!%13c4XkBV3%b?vsoI0O_(&U=1@Y4Lc0#8ZDW0n1hJ!dhD9b}W$r>Q zs1HPRUvb1JE6M!5jO^P^m^)kQe+jNqeWdg;64r-P9&7x~!DS>=z>5{K@K?R|>P^Ey z?1ilEuWu%*THJl(F7wB++?IuumU3Ymk0NB7m6~uqK-OA?3$Xa&$YEaoXMT!*1!jN+ zkcpFn{kYU|MU-zJMm)Dr6oT?wQ8`f~UDb0u=tmye>6wSGXfQV<3Eb!1bE) zNHfMP3rFGGGrXEYYe!<$8Qt~l_^JhReVY4-PW?UFfv|=G2qp12DegsVVQ`gyw+cV5OCKd)A zp9UQj7GVwhurd#P^?jOLXW%G~C5|t+JBS%qWL3J?hs)XQJmTv@!Euplw@a(0tzK0I*- zIqFdh&R*cFlkW2GMo3P_b9F<3JV2FisN_2Y*aVL`qvR{u{2rp2#&!alYgE|EkF-=* z9VuhoXtM> zVSj`Z7q3W$O}B?Pg9Xo23F9=yfWdZCl`cC;+%OX3EcV6}Vpy7?h;}4>{0~R}(q4>m zLCeqSF(dEeXoG6+F@iMkp(C@_XdEnWKIp|D`Bp3ch&mS82R)Fs<<|tcVKUP4@{+%c zGI8+Grr{#uocOYZNsM(bY&4p&*t%Hmlka7vS6C+MV^#T6&yyw)7P7j4_9yF+lJTK1 z*wHXgSAtD@TVE8g&t3>acyo@!+z3QjN=+KADlNrygOF>&83DF@xkjj|I<|;Acys#1 z2&wAju@qkd1dw;WlvF#!h4EsOpEg2_W=dy^O$uGEWq0fBVj&z6!3wtP4`ZOy@O!;+ zY%1%yzr=U&ykJ)+jm*EQ>P~|E;A>91xA_N6Eo491-)&Be0mEJlCXUv^hIu#Cf8^wCS={ zEVLTZ0I4_&Mp>NYjs_MXd-*A}z0)Z`_e^7enwwjVP)r_hWrZ1QVOX+|$TV*vM<%K> z<0W4|rhe@Ye*+qiUdHND3=xGEMEf^HHl?nVe~<4}Fpp0~LXR{+z%7Li`Pq!dm4&bV zfT6r$ShvtNi<^qvc2#btWdSHelDyH@;ns2J;NvoXPmFAhIv^swy>kAuWBBB@nz zJ$Dq?X1(w6L?VbTeS=F`ExecjQvD^xEnU)Y>uPZT!~qlr{|tBj>&IB2LQE9nqo8i# z3ILdJ2lKce-^<(PDrUS_s-a$9RSIfmvv2de3#~1K@kbf36`-oZF5w(KTFFrz&|(dX z0$pY{0ZHefrl^p*n0SDNc3P#+>x}W-UEo8!c;g-cB}z?*pCAtdLZ(I2?*08~jNDC`ee#h8Ls6`N0UH1()9&?tZ*5VrmG3{g4h zIYL_n>W4%4hpWNaLEa7*fs&1h5THh2o?B@VQ(al@T~V1JGy#;a!&PU+efz#h=iSNs z6*W!Vd-pNP9*CLt(Upahh>bS@C4W?I$_LeP3IL!%c0*H=I-oK{P6md#KhL&LL!GRH zmQ)}u=OTmdYDY3ZcQ!8TMhzv$d)^zH9Zk{ipNy@(3RV6)Xp_Xdsat!xZL)TCLt8n! zp{;SNf`35El@xYS&J_7+Z1no$I~qe1bJS-z>ORmz=heCd@EzYFyEF#JL$JLituJIc zrbA7RS^EUCD(QN|qy@mdB(2&@@?+*b3LL%CR7Q`~kT>EKWqvDzE&EL&O%I>EH~v*g{` zD3L8a(#5UCN-HlMc)sH^2L@dk^QjdPKZB+8ngkI3FKOZUWp83pYn{$4 zczJ;tl{2Rg*pfM8u}$fSvL&JkC@`w3ta1mc7l0Yx>iDg_S0Z-_X_2{J`}UFB2T_;5 zDs{9%1_m)DlJVBKyR3@%$EF{PDpZMu0gEvN#izX^T5uG-Y^!bFLQGpOr-3P;L9v}L zx;h()^G#`ZgN<{%AD#NN%g%p4Q~MIx>NU@}giYWa2J}_|^!FKI5z7U7D4!q;J)}>? za+8(THenv{E!;`?Ge@kX=+krbCYaLBZ=N8w&Z6s3&2?J&RXmziurmv%iF> zuii2Q5z0KmS8_Hj(<R(4QW#gka_ zrJgpv-d&qJW5u_v*B_Q7eLmD!3sh3MI^C^Kh($GMJ~NBBp$?`>tv-RH zvYlE6*>6Q;w8D++7a=Rlx6IonY0=iX-Cm>>=t}2Fghe5Fh_6hD8QG~XAF#ZUsu%O- zDg%BOeimz2?BBas6}q%>t};~kZE^?MQEbF&8pJRh$YI>w%h%c$>wJXyvFc|?v6eBQ zB9p?9soez)tdQW0{wjU43!)vi$G2sWx0SW6g2;}K9R`6huj>k8mdxiGryUp|y|faO zN=l$0c_n(1c#6fryfzDCB=$k$KQ}HK3A78VfXD{Nv1PE;{1SGU67fDw(W1tM3zJmL zb1|Qnn^6G@>ug+Xot!qL{5=8SySyvxHm&W9#ZArkhbK3^TD~5FQQo4znbXPrqh8=h zO1YJGZ^OOT#f2yJ*(UT@Lsx>#sVUR@p~p$>iy>QrcaChxN~2m?hZWD`L%u{?kLLHn z{F~LdFf|vsZ88`{+)adGMVAjcceK>Y}E76q|eZU8$Q2%lfUm!FV zu*@4<_7jw*y%?dGTPURnZhMzD7s5?ElaC&M81h_XPeMm<>*iZSa*5fo3a~Jset>QK zDV4cc{<8ZWqDsFZ1)+Rg^Fze_lyoCW(gSX9+aJ>ujYNHqA`31b*A}nNTz7OZ`BpZL z(aOtfcW5)Dn3F=Dx?{?U8Kt7wp+P%(Og@HQ%;IwET3oNGlA&{zZ8Q`ks>g6Ey32_$ z-;Btp(+CxNGnWLF@TeC2WQDo-&TgJXNn+^UwB0c1Ho?m>-CXqe)I77B#80DX7sQ;k zGEuh`uvtLJHd^abP9WPQTK8c@)P=3&qoKY0`Di+3xQc)l4)(R6)?1gBFtU6%I84?T zi19zv>QF%O!}1$0-@eVfpCZcuH8IM|k&rxwJe~Uv4L5gYTe_zVceIZ)*uN_Q62-Y1Vc$?+NE%+Du5g zUT~49F*JxEzS_JiIAgkV-HrU%E~*{@8LD*@e&1B029$uCmAQs_LldBsPJNUC1WKOE zkE-Sk)L{o<7AJG76I2Cds=4jwyt>@z-P&o)#fiqqVRNEV@N-%u5%&3UyLt@BDZdQh z?Tm0>vPT_s@5^wJ`CRmy^+mYleCo+ItK`QVIIFNfW>Jkk{(K(Kcfi!yRr2#m2xKtL z1o;@}fI^NgRygLrrpXH)iWgIXvzitHEv8dgKAV#^cIx<;CgeLNN3?ColEq z{uKW=7mcj7D28;5DtKNM5229^fl4--re6A^usjYkiXTmn>BB8lfK1aW0IA~03483r z>Z4wo4p>YDVP#z1xWLvE8w&MD?Sn23Z4%ApQ($`~gQK`=TQzN8Q)r+=LtgnNNp+@3 z@FbM=93%niSZTmQPoq!pzto>%l(Mq!!|z7sv$h%gY*NS88fQNi-6I{ZL^ES8CA$7A zK`2K_8I92^ij^Nt997$w15p&Gj2gl~K?$K%b*UO9+&b{`nMPEoIPgsGa^F75YOgcW zR`b+r;F>~NYoY96T!{EXwGgJ|gu<)dr^h>e0q_BY)EG`aibZ0hJe*IJfK zi(?xDqaf}zgjwBVWo2~R8dal)U4m(m)^%h_E1W8>1}6{CzX2%qALKJrWcX~OQ<(Sm z&<2D;Atc|Hws==GyEul#^(AwxOL6`Q(2+qaIMXi3l8Xj|K`my=PCiSYt#Pa;!Fg!$ zdCVhUbSWrs)&D%!Q*%UVN@TrLZma;A-!@XpiNw!^&OY9E`?Bd(v9QhPNdzn@!YA?c zL~%P%n4=eeB|gfz+@r7fB9S}A=eAvY6;YaJPayDaW)U*P=@`5lr{Og4wK z?(jX@xxHyLBP@_o!9KeRjVF#yR*d4S9G8GKaew?T{KRX%ha=60G_g<`@)t(7%P`mi zVWvDBDduX$-L=w}2 zs1%uEtlbMPNXj@+%tA&Jz^KCg*=F@C4J$l-PV@?er#xv ziKAxp8IwxLt$>qWnl3kBfAt`5@4o$P?#V#6)+e!A;asI8xGeqgr+SzD&C$#&J}e<@ zR}d;*U{xHnELB4RQla^NDvwl(fPai)FVJlI_uxYE(4?LfrZa?AcW9@(U^p!O&OxB$ z50a@E8v)5tj8IGTi~T`te96p{zHm*M)H^u$XV*8~JJqrIX|R!u&l*zW>VU1YKWdj` z_s*`@W*ocLr+0;WcUAujj*l<#_g7WlCKha~#w`{n>F&Z7!MuPmU2Y<`CD~zXLF-=` z8MJY6fbyqpRuNEb`!xgdmFJRRWmfqkRn>pGw>IeEeTJb&y}itZB@4s*knYiK)hbQ& z@oh3W49G=qO_y`0+sd4Wqfec_<<>+PvdNkRgR~rEa^_{;o&{Y|ykV03!5Pf>T?i`5Tn>~;j+DN=9;SX$q|d|#_fB0+yI75{O2cY_mD!9mUy z1iFLwz^<^K0+}`3VyjJQk#PFMnzNy*g@xvSwPFRM`eO&b7ej^Szu~#8H)uJpDAEwnNZHbihNX)Tj9pvpi- zR>8`k40!KEnrGOT=s|!2UhFA+gPY$;ld#%pIF2Kix$K>{pEk?{DiB^^v7`v6dP67U4ndrD zsmX0 z3guT}20fk0*}3Jd)WulK!|82Jku70!#6{9yTW{H9pL>dcwG20`D*~Wz@zD~;?0IIp zvVaMPu=F!PTJTuD;69B3?=hTq5s$hYowSR>-bI^wT-I+%a$gzT0_@5d4fpioUX!7-hf_HT}d)~HE63>$6{OYMg_@}7^H~ZA3~(~{3^uw-WY$gya;-pFGD+IEJ+)Qa5D=r_haIw3E9P>HW}E#^r$X#e8n2)VuMS?Rf@gFPcb3>|i`u?*tE zotWl5lbOAJEUs(~U!NXSs$6M3#3zrjinSvaA{mie4Q7ootZ8>MF)@`pLJ@q8HvIpO zEq$#TBiRk9#w{FZ_{Q89i4pm8E&aR_B>|DgP$a7+ck zlJn{(hmCxD$}P?8J0CqMWZRu86+}N|gD};7VRHkj z3P`FaTT92AkoQrwTS`P$>k!h)hn#(I{v0QpdTEV&ad2>oA*0&`y8!utgpIs4l_MQx z&j2?zw^acPm@3x0r2I6)dF%T{3SnMwPSGw&J-jY27WcX)RA;P|)L$J8a2KuNlKbi< zmVPoG_#iS}+ZiDfoFr4XA1p4AD1jcaBh69fq$-;H(1v%RTm2mO%1got8-Gif0&)X*%E(GV0q0RzeESoPWo!Ks^PYo^obw;`9Uj5y7 zhZIJWyypi$lUbnj`K-k#vTC?3=a9n7AjUf!#7~sIzACTHWih->2M+^5VmdSKLWi)~ zBvQB4*fiSw7Qgy+KclbkS`s1JB`97qVcI5X>mlzonEdL+T?1CW?d1&=gZAl5j_`_w z>RIU0ApY)q_|FUp|19D6^{w&^v_~k7Kg)J{%9|mSof1U{w7sTAXFi4UNEAXt(930= zlMI)}iKZ*!x?5Imrj;{<+ff+vda`V)yN#6mJf|w)Avc37;cN(aAh?0bI&uzbg7&M zkX9?}Ajt@A^p8-%`)?{@KalFqfGN5%N2rdSo%}b{l&7OzMd;^8xZQK3SF>lQGU26m z@Z6>rVue{4ubqA|KSk6|amVhC67iTo06?+DQW7VlAcvE&buRAFyGj0-;hRCs@PN{Ws$6f^JThmUIfdiZ(ashZlwm}}*Md^XT{0tZ-kR)lH4s9u$z_PjH z6O$W<6uB;{{`#3tEiQQFWd1rV<}4=T|eL4qLYaXW0>6R_kP^x&CIT*~b=I(I*)(bVJm zlrZz;bJo2{FznQ*h1G4lWL18zKd`m{b*23{;jSCo^M>;+lL0-528dh>&!0F-A_hCc zh*>}bxhRDO-{ZcxPaa#17a&(4E07(tGq9`rcO~*VVJsc=T3Kkb&uCem_3&+l+D)|a z{)-N({>D6i6%a!Wd(e$)vIb!~END2-?<9M~IjtC{BZI)M-*Mt$PPW=Lydd6b``)-{ zW+G=IWVEw*uVEHLgBb1TKd0}SLpVTOHd?TESIf=#cKv#8aT#OnOSajLGp~q8A{HhP z>dB6AZd}*8c4?F3J;~6DK)@XgoNX7U?E8y^@vnY9yyqpbHtyUK0&Sk literal 39790 zcmeFZWl)_<6fKCm1$PJpcZcA?-QC^Y-GaNjOK^wa?i$?P2_9VMkbAjr2p^353wt8^mKsp@lFyX~$ps%kF@|*_*PR<7mBkK!-Dk`x_Y__LQ z`u9uD-*z$IZd6_<)PKIf$m+s?z!eqw4wnDd^8Rzs|GxeI?&rHnT}Qtrr&>J_wY~oY zqy%Mpza?LsuLpK47*zFtk=}xbP@vFdp!hIxGxf!W>&p#cROVN|J8cg+4B1e=<2?)r zdiP@)_QwJKXHRN}mlOuTC$@Q875SqZ>QG)6Wboy&U-s6;B`?-%0(yh z_ZkJDiLV40DqiT>+K$!(*u%P%1_{(5ApdNNUk1`Ia7B}?@;d3A>!Ty+0zn@v$-Tbf zx=$aQW~j)AAuFXrNU}V}t$>BcfiC=yH{|fqLS?-AbPk5{h7|Jb{l2#IyzsaYGA6*1 zG@6eulmj@-yIaH<0h`sixkk@gj%ATxUz6eDEeB%+F?x_?lc#noCP8M*DSZ4UzaQed z?AfwH@@+>59o^Fx+UH^@H)(^Do0p5u*d^bvZbgW}XrccGmhzKp+kfK_&Ocw~ytAjS zXw>b-{dAkrbGRwPkkU=UYt1*gpHgT2;jN5RgvLeBBJ_X4Cj0PxF1q!euM-KSbu7Do z@G@YS7!~hho#%*sH8J1nBgUeP>wkCnzi#cf{b`d?=Q4uDL;T-`cQHfJr;IQk5682o z9xuMg-s9_ME?hOz=w z6-6&Bwsq^l$VAdH$@WdAl$|gB9&Eig7Zj^o8zE_CB@alAtBx3r?U2-F?#LP{URvulGam@q_X1SsB z`s{EI39!ME6sqJLkFsq$KSdTZ7qZ)@TIxI}W&2SPA8Kj^-|BU(&qqhj{K*{><&}nb zy4X1*t2ysNTF2)`sBuAY*v~7!3U7MdSNCjKjsVN{kEs7_1B->YHCHL}>v5ax@(}U2 z9Qv8)YlKhJu;({mm;#cRm(-Gc-rjjmi;F!@{654-kS#v(>;2hFIj~1>U&!;~eihb} z?iG%gjgGgj9USK^cn$IJAAQ4LkoV`dNTWV5O9TXns@rcd#q2~ zzb(d_W$WcX6lv=|Tb(RbgRtndBA&KtcZUFeUy&?IZ#PlPwDa7e>2;#weo4+txkDbz z`?U9N`33WZScsg@PakdQY;1N)yMA>&0{>FLePXX^Z{4S>BAaT^$f5tuZ_w`fr%le= zk(H}sD?z@8mT3wHPPA2dcbh&Q4NxN6Y8Z*e8oT2?7B0IZ24(V>9?U_%m(~k>(`}jiwF0f}W!5Wv%SEGc8 zYj)4Kk=|VGr*f8e(fUT2ulrQQouJ%`ggOW}Z-)E-&!Q zkTSq^;(A&RbZ1Q^Fv&WyMB^aYT(_h_I_@BE&xf>apBBSB=3lU0&*$B#rS0+<8idj0 zk8ug!zU3L~0FJL8^@Jo|e^w*BJRwV&K2784pY3$2WOBa*+0@WD*h;}0t!RCZGA)># zs9R4Q4fl;nMzy4}w|o2YHfh|wM||f~-Wb<`gO`KLv9le%VewVhH8%=o%|@N27H}Pm z?&T7d%ahJdtYIHV#AVhHK67-+dFx)DbG91$P-MUsF-h2VC(bqfo;o#c2nRYQckgHi zPsM2wTgEV>$nHnO9Ly!Ki~%iibLN_TLB($`!&ag6OBiDHI5SeMy-HtPp9%?6>niDX z=2|u4lEC_jt^IzcWx+tyV2cJ2UvWC_{O<`aF)q7^U2+(^gCg8m?hIa3B!F;5CS}|& zb+-JDgd~*EN|jyocMpLrwG|>Km6f*Y=BO?r2`s!H!o9d#*>=uae(RwfmGOihqq+1n z{89S8O@k-y#?^E_fmZxlK1BSgX7?gh^Wd)0*I+!<8sq+px=<@pdhHyqhR%|Wbwexo zcZI!MUZzWn^Y&a*B$SKdpIt6ZmmP6Y?AE8v=ml?}^OLp60~z3OST!~7W zI@5O8kcbW0hdKB_+OZp3syck0| zq%qDkKl>yVFjTeTq~AfnTT>%>==Z5M=D2u5$*j86JwMcHN4JQ)+;h+VRx&+OS^0e9tvP-TX6sXew@q6OJWXSy`^FC^pbifZH!Bx5?TAhb8b*VY$~$E)HbHb}JihTzw@y8U58BeRJk1{B*&U@1xT{A! z(rfBJ7(1L!G0{_lR^)y(%2D>YJ}Y&^cel4>Ln>`MINTYZun4Drdz-_45Cw*jOy-+U zdU!-Ui%kj_N`uLcRMy zjul8AJ-1DlE*)fYKh0pz=2*Th2&{#tO4xLj3h@ri_fG1){khB8mk_R#26a6P70|Ck zwU#ofOQ*~G7DQt?k@)8c)I`#n~uy0;Yd2unK%PGTnH7%Tk672Pab zG@4d|P7gYW_U^JWetm40hJF>NPgy9U+SXueK22 zMu=PmabwF=m){=TXnQ2mM!TVHMx#oSG;+A-~T!)1bMlr<%Bt#zg3~)yy@5SsjX9?6PLzV$b&#V z0A40)B>gzvJXFYy_DDeBg;JAMS=A}w;; z9p^+I%eh|c$R$U+x#HjjgP^;eC72Yo7hbLiDq{>sD%;&#~K zTUMF%oLpVJzq3#EgDi&8JR9?-zD=asAQM+~y!jcuzI4aC8nLypviE9Qjom#5{;rXL zSyi3eHw%BWc*Pf8&_jLMHOFklG;^gk*9zky_XUl~@>%*7H;9#9Z`2?L-L5%ADap(1Z@@Rwt zLOL{Yzu9tmYMoBJCvEx8PIbFKg>}C9kiVR5I1#YNbBbnt8jN}|J$DRLJFKa)L3l73kcc*T zak`4Ti9h9)w|iLv zzH$}nB!XFg+Mn0D9YG~rG5GO!hvkKsxUP>o?|m(tK_7K^dL1%U1IbPhJh0 zKSkUOCt_Wk3pj{uJoUP?_H-!p^z1rm#^_BzeMI*3lAyBIsFlq+O>IY7sB9;YK4SZ0 z2lq-@t4OoFKoQxWyt#Y@l$1Q0-q&wpYV_Ngix4~cdI4%3ek61pmWb_&EK^JB{`HUR zH+9Mc-jxcfsstN8-}_hfD9Fa93zExrdq)g+xT(1FPW3`p&8r(4({?Lpba4$(V}q>* z3%kyUpq+ruZ>m<$K+bQrNIztw8t_&w$M?*i`X)n2nxvd&8qU4it~C++d~QbGj8RxC zsgr$-$5;)F!fOp_)}C{%JC1@KaBz ztdkUrwWb3>V_0FjT5?{c5si5q48p8G({+mU)AaS(+mXXG-LJA!HcaXr;1n0`N)1xh z9o}da?MS@4u#v0Tfcdb=Ed_?UAR|@Xq?gzGA2WKQ4PF>)wbPq*T!;%BU(WMkP1sRn zK;A-qFeCyo*8CHNvrpYvSGDPgdKFw>6IBdMuH_GX3OLd3HL0;jh)ki%Zr)HQLyHg1 zIj!l{jr+JX=@3hcynx}_sLiPcYYXK@Et!(HJ9sYZw#>>SU+hrK^m|NzpMOLIX(%tl zB@G{RJA1S<&o~`Fs31MbN#wpkuXKl_=J1h%*VdaHQ)ke;5?3ryF*ZnR1%<;YD+&7p zmn`mRMHU~6YxWMceg+E9M-C+hd4&Z8-OI9?jqOu`s@%6d?`M5Q>D%AGs({BodC8^j zB@^?DR}xx6 z@H~(N2(V3l)zA)_F5vkigHlgNbIx{I#($}S;o2}BRod9c&4_&`L92LsNHS5{={_7N zN~==frJ_|CRohXViWY8%7PBkAp>{6{(eY=43pt@Pu&RaYd1>Y+jCc$a-1FD(Dd$NA zPgOKG$X_I0_NyQYfv~C?yLldRMovBcK>1Hkk}wr9n*Fe(YdRdqo#X!yJs)sS$6fysLsu2>H42p?6kiLzOQ9DL`BlL6knqVekz5pfijko^A zf?$2>3^TftFm>U_TS{{ZLutp5@U_;W&!#kWtZ}aJMGsSOpD{&whGm`NszXK|<#dN; z6VlbMc8WDSRw)6pg?9(L;)&$lyY>qgt3PjBx_3BbC-L;gLQgZ{KkUjSh1eHA=L=C2hwihkC1q#y>5%TqqQp8GoX7I)cZ6R5D zIlEnr|~Z!@D!u1D(iJdO%+bqvF-t*!4N-x*9z^wvS$@O#`B24w@TTdf!O9cXkp1eA zkr;YJlRsee*zV|mCHa$|=Da+bP=eQS4*en)aG^l>m7k`n*Io-BDWC1MW)JYZXw3z! zakZRtaJd|VMMY*sH#0m*!qshVOHdZT_Etq>TJJKCv0TA5h69iY_`J0T^sAT54rKb- z;L9DS-O5dNe+aHq#4{g2CZ3>}aXwB9O%K2x?5yUK!%m;0+kB#j@^+&>8>JFBd@ zbiOOGefg9_suj+f`$%RLWpFq1bp6xWB0eyipugiFtG5JYkly`u^^3PzFjLXp7n*ZM zYRY6b+s@md#myuOo#ZVPv}rBGkd=L#C7F$yQ)5xD)hgZ1xxg)msWO?lme z`eTWhE^6f65Kd|Xjm?HJs@gxFN<~Z%Ya_NjI6Rz6NH+D6cQbdWG!}bK-}Wn3QP%+T zx0P{{(UKau+h{f->B}Rz!rSqhgW7ykZUrl1icHe3N(l!MqKj$Jg-K-Fsp`iQ{h{3@ z@Vim3Ytxq3$x#}?vbQBzJ0@v#?3g7l67 z0`i>gx|6DNfUPG!UE2l7tH4Q<)aCgF3FZ2s`rfz?&DxUlabR$@^@?w|UXpobJmz8} z0%9l%k6hGa;tbkm$qlgR%*s`AcCz*5bILgEL}b$8e7d?vv6)=l?> zOnYe@lEX>r>^l(By;!F`xy5>pJ}gFTbq;%)_bsEU%<#PBSZX9or(NwBylA@2+5VNJ ze)QDo9{;!iHX=v6M#>rS0vVLop)+WwtI&|}T10aMv4;L!7!jn^>ILzJ#R0QHYe!c3 zJ&5Xu38Y}HzoZB-%omE7c3qf1)p^Zm+f|Vn*sK1Wl`dU#OTi019-0rptWi5QfU`I5 z6Rv^NC<=))QEJ-v;zY4JqUFYvF>N&vTyts-iNE~xHA;*>UGp}YwLI2mDtXZ^y`|IC zy9C!4o;Ql%OnC;BEV@0aeZy{ZA2KU*H+kOT{-JDns2Z7#v-8Uf5m(!(H9P)t_`;sB z?(_W$`*l9NDlvE%N%e;D#oZrLyrI-;?y$xgZQ%44;ls-q+_bD#gI)QIei zwdV2wu3YK#n@HXWTFs1SzjY^gom{rjO}~d%(T+|OqqY)eF(08bq1A#u8fePbx({x} z7uu+P_G0w*#02CsunTo1g7jvxVYhyZS3&g z<5q}6KD-WDcpK^(D9siOxG{Kxb(JiONUz?Xj6E)YsbdrvkC*kHQo)}grPhvo0nc#3 zQyvWn!_fS>gOf?OW3|Ubd2{+!-p{tnKL_@R(c@gF_2`ZF+Ig32bXWb%0a)zT8qVcr zbf5!=wYIS>ahEMn0JOh+bHl+_i-t|I$zHaT-gwX&02fbBrd+5_2&|n_#ez48$-1S2 zpwc4`on5`OVXwaR`V2JRtwvY=T<^-deX9PkR-D?^Rw%W2eL=aiG9OtN^0cJ)oznqTFVa$o zH|h`Zj4aYO1qG1*Y0omZuwypAiTryD*p&aU|&B7~s)f^43~SfTvmCBzCnTgkPr;w+dNqQ> zY?V568mFqAj>@0acinSxUX1tA-6XIDg{@l(kQW!pRo%T!*yG#)deDw2H&xAc-X|vD;3y zeOw+VpWtQ8GH>$)?R~YT1pVf%v#LGuggS41I?#Aic9~k+oRa?q)ks5`dFyFyy_k20 z=rwB<@$zNBJYif(VX|9u6o%RQxDTa*%C?RX#qoKMfA5Q-T=BipLd3Cz#I6_iJ+bhc z#*2pIpNo9t(8^P<6XS|MLA~G)y zl%mNE*mDQY>XJ)z&!TeF*xdBMxM@aD;~RI&r(v0kHKov3?~MYq!dOD?^Hhwgu3j1L zD5*#)T?(Z^xz+E4kJDj;*^iZ%*+OFZfk%d^&8{qs&xcQ@>Uz*VLHlD3n@RK1mTHeC z>~Ye$byPLStuk9B6~FCF8o)6Ec{7mk28E^%UhS@5@3lSG56|z$H6t`SpHT5_=6rni z!my0BBhV0e0|(hy^aF+dU}Z9?JT6T?-YeW&k7Zk>1{dBr=P6uMJil;3I*gW1-M?5{ zRzyEWcaLG0uhnCt&si%&4JPa;LqHjEEaoxCYJkmyGbwccHRAdq={j$S{^1AHBh%q5L6)H zuPUQI=Bicc)X3HvNm)6su_H$zTJu`{xak-tsu#o%Ac*m24FXO zdCghn!_zUf&oqM}3nFI$*Xc#`5X9x`DT2nk(vy<|)-cDqQeW7 z8co#s?&ZX7Ud5XEP?u2)+p|mo5Epm90|k_1U_!9^e`qeAXq#Cjo_HLM=^rf_NV@ci zD7{_6AHqyb6+mmea@t+|PvNou23Vgo94HR|heFi>0}yH!Vhvi~pYq;u2pSkdfrA0g z66`}ed!X#nrPL9LIxYHF=p-Zq!vrW`^ws|HY7?$o~JuG8vgw@OLikTX+q* z!%DCYtel@tf=0PR!bma9^RbB<7zdGOSOADHVw$;M@4snO4Ds#Fn5{9WZL{I zX0RdMlMdp?ChRj%4148V3IgcWX*67D$#{sAEZa^xJ8hjV{EMB>k> zAmyTdMfkM2gycQAoMUFdj+OoIxw_K!9rc{y_`a{MsNow^h2h=n?vIHH2b^@AqDJFo z&t#6rn({3G6N*yBf9-L?!HUv%;Pw6Vi=-#TOq;68nKy$&>`J_B=?;b z9ga0oW)>`JPWYJ*PaT^|bt<1LGZvy&pi52Y_OR)UFv4W@`IIqRb6qzO6fHn|n6Gq5 zH&l+zn-s^gkmtUBv~>hdqv-|0=zG;A^glO*E;bm9tFicVk8=+WQs+JQMTidqEQmJQ z*Panwv3J;Qdg&2NrdfL8rgaNtFAASeqW&_NBEgISs3SoQ4s;x%;_oE0T%&jiBsx? zf5IUlG^#T_$thFZt%V4@3q`?FF>uJuS8|V*{OMwxzWjjndzYbpbR@SyO%3?)$#CsX zRaz9BNgCTG#~Iq#zIYxc18)i>7)X;Ete&UHS%)nBc+5^>nx7Awc!?&N1%e#yB^s@I z+8wD~2WMTLStdqY9q*755YriHWve}k#)y`?$OrQD3EY;%vueVUg_V+$V0xbt5?l(s z6wSjF@%v8_#Fj&72_&i)b(JX}uKKW)x9>rFtt3Xg%bRd!`{N1~T0d>%tWQ5o?>n1O zNJFzXln7SuXADHHPa|uO-9LPmb_{td#D)D7Pv?!Go%>H{mQ>2o4WJNpnFqQKv}V5`{CwAQY(4A)Z( z_tn`2ZHrntD=a3=LM0ViF@i2Z{D<;q)*ZH@Cg^@01W7N~`_Nv%KD3r5x zKb)6y$FYZMDU^gWdf!*FMrFv4;RibrpY-R<&xH`5=OLIQn>P{82V-sCToPKg;J>Ki zN3cmBBV&_t7BFc8Ki(C>?t$+#;z*X}=-j!P7iQ7PAR`(d3LA(~J ztsSAc#q`fD#McPGS4I+9H-JK!zYmo~0@2*33ehtp`zSOUN&)~b%i%ihe|i9c!@MIq zemG*z|B&7PWDvL_7=6qo=#M_NBmiKiaaI10;{uShKL9~0A@vSP{~PJZV`uEKR_rs6yUkw3=t>)fzTyn0Jx=bo0s?iuKa)sBg+5J zm}G)BM7tUVb;!Rf6ou?!g7bW{7m;`D+i7_mV28VQK@Kt;5YVYreH|vbU9S2hV;j37 zLIIz82POc2qq>>g`Ao7uo(_508>aJaR(rY4-QoEAQyZV~tE($bOYQFZP$mU%ri7EB zRCFXJ`D9IdXr8OsXx)JbERz=Zc>q5pOPK4MLY2y7g3w3(wX;aYw|n;bvGy7S1Icf8 z$s~JRx3p_8buAyTi!q|UIKNPiF0jE#KLN(dNK69@O@7}Q)F!~@gAnLC|KsKWhdDyi zrDtjHpavvYfA`W41Ownfo1kN7A2n$7?eF!D3(18aHEgn*fCd;(-zDx3H~g53<3|IG zCgGibN#-3;10u*dSsY^C%HH>xxkz0{MjyzG355InjROl9)YLA~19QcSv%Vp$V;36< zv{H37gJa6_v)P}5;yOx!l$SCq6M(V_<&9`}X6p4E;SM2yAvPspcD3mf#m@zJ zTw4u#N)*L))nQP}`P5zzuFs1_)RH{dr1@?pI8t(FhQUiF95Z9YNPBQZqMv|%GXZ19P1x}-vGq9{K!Ux z%o~E0)gr1ZzaB!%qKaI{QPIWdz_~2s?Sa#RZY8qzY9x>CSSh@=Wn>E182l%h%~?;R z$=++}c0d?x<<3A&@o6?mEIMzZ#d*js4$t}1g`iKQW1dqd*6o$vIJG^U_Sq+?h-)~b z1zoJ;>bjr!I4m|2{Wpy{%_6Esyz~)g_Nkcb{oc-Cu?u$02ewESCHKA79!VmZ4L}wl?Yut?KXTEgn8Ov(aOL)R>hELGGS<2Y$pydvIp`;H4l(hF=gSMCk0vDM;8T4vPGaci_5q zrp6@zn7at1L+4^DlzU~w1?-_=xL;_DhCLcw^R@{^KOK6??Obo>pHuq?Zz{;?9A+ij z&RM8yBH&62UA(ji;W2q@%LkTVu*8yPR(Z&3nmlY?8Hm@*?kV^MnMr8RbTwz123$P3;O46y)(gpPG26}Ub%-3fF-1F6;OLN?*_lGhwd(h@J<)~MXSznM7o99(arfLS0 zWMPNe*A3HgdazFl;BC_E?dIZp40d*Mp%1kw;3G~m3;;nEB1lNEZj(M}Dqz1fcDW>O0|@5+CM{EdR=Y8KM5?h^6WRO z(`qqj#`!clRqMjDtdRY5G1j%Tf^A(+tW4|fbX(K3+)fe~Kv^U*<)H81?_xd#s9kCL z8-31;K62Z^pTH{wzBXR4uBIr}MlZX-i4DL}pUK+Rtre9mlvwx^7Gd{lK}O^=S(PX! zn?)$mXo{qy2;HLq8K&Gh` zU3pBv^m|G?m%j0(K`$ekjm9_!i4Loi%INWzk6>v=DaK6H)q>L#m!1*p7s08Lj+8Bh zyuL=Z#EE<^4tDKNLidTo)!NF0dYy|q>BrPxlF z59w@rS0Xa~2kZSbtbQ8u<5mDMV7*AR0ru(CL@4Of*jL}=bOBA4!WSLR&~KjfmnCmY z`avH3EzGBn%I+>}Uz&@AKMv7&R#^iH*#$93#vo?0)m~^_w3eEbN*(wVpX}5-r`El^ z1~I=~$$>V(aXqe;>aHn6f$Wvw&%C;5@v0@BYB;}`_ooxcSj*UsSet&x zSdHMz6GV*wQ}* zwbvV5!Riu&WEGvgNo`Y=)8l5rm_5EZG|}B_1Himh#c5mzL&e@UJdK={+?-16->? zdjAIi9LTbR48J6|*glSC0YV=G2+QK4v4~Qgac>j%y6|Pnm}kKIA)11{97i=!!o0L|>4v0J!%Rq2mJ&`ht`IP^I{Ic*zGK z%<+}>?M{dap!)#8Ieg{-93lTl-~0nLkmsQ2(iiS*!oqx^vz_2L*bG4A0h(-=T92Rr z5XVepgx;*7*>Vp1V;l~N=w?z}*tw#RS!-D>zW1MvkDEA1y~3?v+=)a7obZiPymIJ|6iZ^J4Hfxz>>^z z7+^m@FRJYSa}dB9K_k`vTaqt;XcbS~B>u09r~m*tW1EislQXFi~ zPqh`dtv1&-VT+b^gp$WE-NHKf<}GKbzG-G4HO?L5cl6lf6X%6B5)zof)U*p|WH&(C`V^LR$m1HccXvuC}neO-DmiH4L!@hd8J-|iS_G=u=$ef1`;1~K$L!)7Yk zfJm)KsCg@qgHr6-P--KgGrGGUT!;ARf0T-F~2u z$j;XNVQ8u?j%Gc~ZLY@P_Jk=dsHUdC*wVnkI^e6;YB}aKoA=c8F3uxFTd6r0>qJ!8 zxB|A~ehBoenEoX_pCQ@iAzYb%Tg^j6lOloWYQcr8WNxGtP>h^R#}HJP8a;Y!1u#-2 z5_(jx!0HTv1P>h$2tXAUvxXERqjpO?kjg4Yv)no}|8xe~cXmq}(OoY2DU{kBmsjrj z`^yR-MK2&C1R=RZqs!4JObpvkl}HEePAIDTpTNVLFWEtT>S|^U-lRj!1f&tbP+}5h zh4F%v(?NDRh6g`MN?P`oC`@$N{O8q6yx(Mjio!^}G?083C|GMPI{P550jOhn)KfbK zgav0sx5`}jsamxsJhA|w^yN1X-mCNbS1SMx+BUc%T!H;vZ!Bl`Z1`yxN`4pK285*# zP{$3;X0B9M(v2Co;!&K4KY5MVDmc|HNpHcZg7FXcmj?RumMM(toMja5e#2^DEe$`^ zdw6}xld7&wWKFf5!&`o2 zkJhaP8hXM;fzW=Rd7s<$QQRWEm*`XN3&u}An=yG<+J9Q*nA(bN?{T@3;nV7|r~?3^ z1{9*KxXxW}#l1)z!2ic9?;$Hpm=8W@b};YA72lZ|fGL-{R64+)U+i^@@=PniI~>?- z)s6v#Wy4(ccTa#o0US?&w+}Hy?e|p|{W~g;9d^46a=6&ahCPdS*X~&nCR>`_CGPY5NUZPIXQp zb{7AMxhtL$yj8M94TFJs*-bcD`k1f1n`X+%oTHv*j)a>|JtZ5iU=JyvRM=cGlZIEr z;1GZpWhK6 zVzc0tQUfsUUzp;T_X!Zf|8MI7@KXYbMjs25Wd>lMFyrDSxepvr1VCZ4j>WZ-9}Qu` zfQUT>$HMvF>yH2Hcm2Z#{|k+>dGdT>hO|b@Hc-lKTAj6of6tk5(E}V^so%`qF@1PP zYz6Dwx`|)T7Y};T;sqr{OED=~&C)DuF|REW}gn7 z1HA9VO1`l^kI110NMq8b@{4MI3SE_*V{wZc5e%fgM#`GUD*#BVQVvb*5uDcQ{Eo3= zFd#XneB4MaP9)yu4$B0#JPQ%-`a;+MWy@a+6wCEqa+1sINtA+V<{}!7I@|SWHt&4q z5Q`rde35bMM|Qa3iU!rn%`BKm~_CP<_sUKiWsB z2!qMkt<5;}<;j_b;5!x-1&%1gDFXA8mEht{ z^fsy#45awp4eZ6etzX@W2pkX3a#>_0NMr$TS%frDpjJ%S(r!;!m>pP~mpcrhzz1d} z94X3{EvE(qAi6lHpLcA_)4tNn6+yNyvVhXr*ZZ)hna<;;2rbw=A)0 z6}68n)rjYV{5w%1dj}Hlw@5RIY)*FqR6!di09)cCa^XXYds!C)C#p(cMJ@mOQYi!u zI}I1^F4Y|6i}9$lD;!`dY}Ek%S;t0k^HX1!E>zMnYEq>?C?;I0tX#>2sM#?Ja1@z4 zhir3}HILLKgG@!ZUN`vwT)@wi*^>6p%i-+&MU1`5$4EN|em{nTWnxQ(;S##65|c=QLet#s=ZRBJKJ4XaM`u#CjXIpZUqr`kdcwCuoRKeO#C#+d0*G zcWqJI6b3k{Ay)@Xlp&DV{BW&r!~6XR7~ z*ODGgAy8mF*}%$Igvr3r>f-S3B}BK!qDhS0S+xH|J{w2CyQ?(m=sXaSmARzKz(MRB zthN0jklHrH@s;7bY?yg~Dy6jZ!>MfA12VdKkEhcBHNVGmJI{AXR(9k9=!aF?$2_V! z(Wk+@ILJ>#LfSK$m8rbulZP3@ZwpT)l8=6E4M8=rVFl z+%1>q@9vW4wHVcimqt>Za;=|giFwPy*#jKPBZhU{Tc`R+bya3htzNtViKdpsByKYR zqUC_DFUMiKNM7PP*~Yg~`A%AjdF@`%k1dpf&*x}&_Fz>h9(jEVfnQl5{4CRh?E0Qz z^WB2MFs8tSHq=g=zmOWwc&5-p@M()vWqy&5WfgcL;_Rdmi;U&s+)MD@8fB6Ll$S`N zNj)|a0#zwk8ZLN;!XI9;*;*(VKQ-&g8rJ4gbbC`w?Wb@n#F!vGwFFcLf$GFEhSbP) zDe6r-&2e=qdgI~tl1qlPluJ+vT1@lMIR0gAE#MOu zFHu7Rm*0M7WHvb~e3aKVJCD46f}c+8a2}G%z*(6{C0((&j&7D(PxBJ>LzzI~@3mRY z#}A>Pzz_x|ryt)0tGtKdJ#9o;r_lbYo+7n&2&*c48k*(8u;^P^!3XmUu~*n|SibBy zH90emp%r!30L9aPqPQ!iCHsYS!UME~#vmxXHg8}a@@^BzzeSfagYbons44y|<2tXE zaiZ4rvG7NVf||cYH~~p0{Ngyjor~r(bG!=W*}%;Dno5AhDc_&b_C-|#MQfzZyug^Zss^!gkHr-C$xD$}n!FTZ>qGYLeRw7RbU@s7Uo<!&gvkAYmDF9SJ*TH+sY_|r8bLO=Q}2uKUU9b~ zScOOufi>q6Px<;A5F;4;Uoe<#oOckg_u|%3fDM(_ys0G|aRpXa+W=@$meA$h+ZY#= zdy%iYaXR+KqY-R?NGYmg12SV$;A02)!N?x@2$4-g;m5SUG#gNImCC>9r;3e<7qaXS z5i|ge7r8atx~WmWX8IlN!?J0;30i_+)JaG6`4u+Le_jhcbok*um|<_&r|)E-Sm1ti z#&fDRJ%Bwt4{bpS&y#v?X#YJ7%%;5w8}ly?FT2HcvE6jf}_g1oe8y zg>_FYf!iH3&)+4KL&CiryNh$FweVRjV0#hXt2Wq{s67k6IdZ%!sZ#PXK54a^Sqq9s^ z=GCP&xK86rv7o~JxtaO`&!RsZzxdy}me_(uWJNgYx6W?hGymqSw5XC(?)WPkV}Spy zci7eMUHl(^*CqxL1iX1H8S%pMKejUPUDc-_h;9F%2ni(sNV*nm()_;zs`4~ZG z&HabqF#*qoF~D7d{peHs1;FGEw=y_-IFn5Nu|6}q<08>-*H);65(Wvj7 zXb+~y?SF+1)bC6lGFRD03YJ6vo^cJZ*8<)-`-c=Y1pKWZ#iUI&nvdoEZRG9i1@v?sOy0^|_(LUx>Rit=o^9kD`Pp_0P5{~xCS(Kuhg6Y)<<|yZ z^aVe^i{zcMg~ynNH1MbE>NZBy3#13%Ka?=0Ec24+L7h&-|6k1dMzfViR!1|o3L zTbc?S_xtAV5y>BXZde*5@M%+|iViG({F6cv`I4p@yhtIMa_}6n90p>3wfF{@qUdn1bSZZi=mk4Bs2^_pnzab8==C-ngmNWV)y!z zyDvI<#rS_lp`_dql-LLJOCVo-FC{>___}oxVwTcjPLktSAy#ARZ#4`1qf8_1sE!qi z_cIk88|&~X@3q!m>)Fp* zdmo>K^1ZOH{DOCtD=lRjpV>$K%#bF?mVTl3vz&`Vf-(T(Hq?b21^Qd|0@N)fK454t z=$?IQBgd<*)?KM`p?CC}Zj3xKhx?zRRuewfvFU)1n0Q>LpNnyyiDG6b*1DMa%3Hh0 z?3%W4N34^E=>FGXYm0M2~v?C*;)B!7P~s>~_T9hG{7 zOWDK=CES~r!?Pqa1X=s=W=wyfgyOvn<#D5`GR?cxtz;BzNFnwe*!aZOU{cVZ#^{r; zoyb+W_+u^s(=+Op(%veid;&Dk&nf8RWh0kf0}bXx zVJX=-BZTVbrd}gUg(if8FsoQE|LFH(F1F`rabu6wJ7T}aWvhi~8gWTW%37c)^?8@Z zU>h6#jfSG1(RT$BWQd;{wmfS4$UvXf9CMSf&}WGc3|%I^r@N|vOjyn${3>NnJZ$GS zfLM9nLDOautub6^xa0PcsgJ*l(TL|WnQ8Bk$C5Tl%&P|u)GPi)lQI5|?G@-Pf8#y% zGCH>1fEr=Bbn%NP>wJ$~bGnkt`x4k}9m$Afy(iepe~)9u+YZDWoID@6Du%Uw^Dc~5 z)0&-`Tl!&S&!79u<%ad|nxE=PQ*U(yHH(4JDf(CX_9MUNnCA?gs*PK`wWibf`+Fz7-Fb{~8ZGUI6x$S2GU zi}V(Ww`g9X>m_6|QMtAgv%ht&Cbel`;xDG?|_h~<-wd-Hef8KMt?d_2>4 zG4p>aD6hoUnF1ioUagAfH^U230-pO2kH22-=6{y15N&@H?M)G-(kI}#|Hp{Lr!u%~ z0FVgBGy6YnSPgsq0!Q0F@Htf|ak?Nrm+IA=mjbPn3)L->OXu8+)iGdhYf@HM6uc%?KJZ8Lf6Bh|`-7p=^Kkc81E%o1!SXk_o%#@v?&3^B z+1ne%FGKG$|JanI*4T5aF8W!35XD1{t{cw96_{ci`C zmh?rlvXe8CZ6L+(Q>WV9doztiW95V69XHzKA(LYEtDsDQ`>{9FV$e~ThisPUFj|~$Sr!t;n4Hs zwkEKnOO#c+pI37bJzhH@fnx8q^t@z1CH|gG&i3)hteK4WOXkG`F|Lj^Cqp>|Wi`k% zTNE2DhbaFsg)f!H;vVDf-Iwf`nk;na67Arf#2DcW3rq;)%Ru=D#Z#fL1@HE>VrNGo zmln+;ay)&9zWJcNMglKfENvgXu%_2i~FToD|k@|C0=h(d}Gs37; z=OY`nq({LHFZXfC8|?)YWGYp_?33to$>DR~+b4IDZ5)y+FW%oF-eir`|1`{e+`c}# z$!s6DyX!RIa<-JKF9m(0BkaCF@~Vfml&YgEw&c}GRg{v~m+tU zJTk#wnBIY@7f(kX=FDbhv;FoBWJ3#5eJ1{1zM`_Y^}9IRTxXQ|Xxesp3xv{ytTpJ@!s|$dJ`Y@4MOZ*C!VbE+>_m-;kG@zMdNNfwIwNs(B6rXS>l+d?n9r(X$bf9RXG8LY1B(H2b z4&A;VM|eNx0!`Aq6A>OBlq014`H`Cct%o1-Z$DJ>)%qaMwAL9yV&CnAaq$|Y7lRh( z|0-vMwluv48puL`mS8GEMJ40hj-Rank+kiJd@}i-L(O;mGIM|Rx1B-S`Qa)Lc&VYBPstL&@oO5O1^K`G$wwq=fmeMHm!j9+oI?$_p?J5un!x_F>_flNVPvg zJjg%n+s+lw-aevHawaK5z07FD&~zzi#XNdRc#9=?@zP2MY|ZWutkPygGn;Koom;bx zsh~V|`_+2-n8X461Q-cm3Kh{2l8aEoUn%*uEThQF(!Ts+_S;#;?+`MB;+Qi0 z-4ua7npolJVSm){$9lX@rqj2OwYms>j3{zkV0{J7Di-ofV_b&iiD~Q4M-K=yi}E17 zPKQq6X8Vr0%Oy;|oDTN{&jq38?n?p#d;1I#vGV8@kMbK1DRDob<)qcl4nA9k+2a&e zW)-xleUr}e*mRcoIHlHaN3g%881`7Y-*Jp@%1~eMKq?`Y=eU)6Tq_F2^{Kc&S>@yYYYFBd0!Fz9Klq+p<(_t}Ef|ot6QnudAHXPKl9=+JF z!s#XF!>U#?v6#fs2HLuO@iXuHt&Xui_5pM*2&c!FU5=O0{{}h7^Y>Qk&6Vyjy-R!&hj(G(Rjgtf?CW0^DjJ5Fu-wEwYK}C{ zJtAg&AS>+*F2P5)?Hv`dFe)fBWVB1}<vU9K`G#-5%wXBl~AKAcsX^nlsEi0&-@Vp3=o%Mul|MpoRu zZ6?-$+FBKelIHL>$sJ!m+l)ywiH9_9HAbjZh`227(?4A-!|~|_{7qks>Uc9m`Q+l` z{!wj?^Sd1Lw8)D;0z>*h$u1`zx6FPH2(m~DzJA>`GCD5Y@Z zCbz1mYf%?=QNxRB$@ru`wGW^~1^lV3>d5k#Mvbmw*^1mg9<_%NsWw9I>)#p@5H?3TTqauHQ= z&(@|Az-gvY+zzK&g%MAxdIt^`&@$nXO^36z3H>UGylolAy=cz%$~D~N?368Di^k>v z?Z}|iY0(^F-9KHM&|cRX4VcMKG(L_#UdaKlrrAK}@19nv}t9M|JPQr8@3Rk8EFN1Z)rVFvPQdQ=n>U=>y#JoPlbQ4>S^_ika zZ!vh?N}l!A7GJhTrSPDZzJ>g;8(c_R_1Jd$I8~!Xk0wSJCsuB~*jT&#ndwt^j?ldo zso>A`f;bI*z6a?g2Z|KACP6cXCF6x!8#?y3#NXI1v_21q<*w|`N>4d6fR*bU5gFOx zmz(h_p--GSMJ~2lWPqpA?!m!cezqm)dEk2+)kg4`bn}u#ZZFblxiD%2tcA`_HR8rW zN2v~2Z+=X@W_LP*<&6k@sx*s&tjcYV2bYJtXmE*%}oAqXh}bzaUI-7H*Xg%26>xVQ_NdsR?WkMtXi(w&RXCEOoxHVDF#kA{ign@qrt-aP?ki|(&}oh(5>P<&qm+L z{KuCrBw->etmuceqv+f@0Y#?7k@_eqnQ;!+tW|T5C{_O^D1RBr$Jv8@$`=>A?@{M& zGA@^Rl?-QfCEC_QA{*q$?mug2P37<6n;IndBn~^VzsiBqqHR4U^wc1WWFDxZ`t)j~ z6$P(p{aX7F1t-e=m#3+Ch29KQBEmz@aVp73u$1|{h(Ld9&dvlGhqbUIG@a2-^-Z5S zGU>C>4gmux1qDT@ex=1jG*z~3xQ^Xw)9GgN34#35lU~=%)Ta83W?=&kK0nh$DB0XS zAKeG+I2Xr>!an4QOUX@l9qG`qwOZsN>-FhXI`OI~Zlga)kn=f9UP|tTs}iI6Kb!O3 z`{pWBsx+Y>@NlYDQRb!=K=hUmBQbSCl954>Byc!GF&knkfQ|s8OCq2p4O@lJSHA+cyeFVe z2>P!Yc>jpu#f#A#+4w&r&nJ9up}l;-kYs$(@ovE?0&TprJIP;5)8>r6pYlQ3$3 zzpW6&Wp;*!(~%yVf+-gys%#m!$Ij z&!B-XMl^I)#^>w*$mHsagM>PvdnzdAS}Y$$gKo8|{l6~!k5bs>NPr!UxS)vq&%uLl zQC8bNLZs_`<@4p<_nA;QbgUMOd3-v!q zaSwUk1wQeMpAa0#dRdXfXRViaH*6A%u6o+CUkfv!p|oyPZwnP`*w=s<%oa}P6ujhm z9_+c#~;o$IlCt##_}-3@poZ z2?%Od{W`Lvi0GZ1q0-Gtl>@YQ-t0+RcTTV!PZ;U#2jhX;`2Fd_)n_oKGi*bhG{Bp6 z7_i+0uFE{skgUi4d)LIOS{;PEFx023cK=f&WR0m$7-dVXRgi3u(}4R=P?oa6spEB$$m3-I5}!s2px9h){XwCs+jlC`nn#noS`cWnpAX$i-{@G+t}$mv zHs&__AwG^9m-U&$&vznlUBUZT9#6AC@M(RF)Kb@V`-))*<9>;I> zemN;T-{y>Lu>H1GvI$<_A?`3pKY>L<6*WSI&Oug$A=x30tK9` zV!6Lpe{ial(e7P|@3Le?{y5pVO+Qdq&s8y!`iEnS&5udgVq%p-sB++g7nG}GEW{RW zo%*W-zHbb@OC|7?ER2t5bjw{&s*xL&>!HMJ&Hp=5V-Ic~>s|ko6ErdYV#A?ZIOEN! zTvsG2&`RGfS-8e`R7l&pxCyMc(3}yXvABtvYnG$99S1JKq#sH`!K%p#(`QF5~2u6Tz1=;;e9l) zXYFZQ0)BlH|be12jWe>jN@ zV0p)xw0Zu-do=(C`@T`zmjnWiR%V0}_^gTSc-~(>tY+JW%?Vk~y&rRavXsr zE5bUw4lXP$*DSFS?mo?JjFcQFfA%9am>BFb6f0*B|fL zZ+1a0kCq`GPTlVF_6NGwWFzZP0Sv8E825q>uj#!AN8^$JpUx`EYXAlL2%` zc(N;$wKnBl7pv>1o`QI{c}}~>scC{lsHDnKvRiSM8Y5(9a2fNqK1%sYCX>e7B||Uz zg9}XwG*p)xc(qoosylJvuh$%B(pamz3*u5GnLu9gL5-%8qx6|xE+YIkn$zq{Z%HS% zQf=*@Gp?V_oD{sS)JQ>~4(0EIbNzZ9yWRG@FMUUpQcd+I{Yj`aV;>(kpw^1A<7{yQ z_}x!OOA_364npYEJ!LlAQ%b@$-np0FAzn~Q|ClzgueIxW$iX7JAwNqFi^CsVCY35H3YeAa3 z)h(LcR(lB-hEOVn>0*3HtGf(`nCx!ffZ%278)Mze@n+UfDO1zjOU|owPTrCS&`URq zxWF;!u<^R$JTV;KXF|&1j#5|3Fm9phu-oCMMupG%R5SRZGmm0EY)MBCAi{H-sfMf% zIZ#APv+Pt=uk~w-O_o#fYg(7Xn?pKFCKduz_HMJydK>Zg)he~82d)G)28`AomMzb{ zCQ4SUYHj&}ZQ*SZDiKpC|IVq|_Auv(@#Ec*W=%VEID5gebtL`|iHejq8gNa~KytZ@ z&mNueJty%rR0Qtiql@6^V9&UrQ1Mu=+LT3))= z9#d#jF^j!99a`FnOYvM6323&tFzynZkzD$-$th-ijsenFE;t_bJ6Z73%6i2+!mCN+ zKeJEZK|Z)S+C-n>jJ@@sDUs5}Z$xe)ra0@#INy3m+ku4%I45cVI2tBi=tWBJvKyf@ zD3SjyC^&6hW4duwxRQD>F2=aYv;QYjW_sJY_H%kfuajq2s~WR_>F14|RGLhYpWpgD z-)4LDOT?rP&04b1oabyK@P~g`c5}ua0Z~2EM2^Rc&bO@E0wmfp7z7`XZ}T~ z6?o(V>sw-BLJLsf*E-~doHTLy5NG&J9ru*NG(Z1@VbM?b*NcYB;bzHC>V4C$UeS|u zu8P&A1$w~}rY{8E&+4n@g-!22Y$gyhXxky5r5H9~(w-KHr%DC5f(iB9rY#p_=8Sq5 zqEfThT6opRN9rtxwq-d1+TU2lea=_PgE3;A+@+x#4~MTr^sQONne;C`OsaE)kFTkh(x z`Q=-ZqI>Epvl%L=mDf7KCKB(9lb=3f>^N*8>y@aQ)Gs^FHB{V7YH77@j+FXiXJ_QP zaEDj3fq}E#+*katZ-f%Y%L~%9D;@Yu^3WTUm@Jm^urYs(PFa^a6+sh8H|?iAU1b!` zN)^w&!7sAzsbL?X<>6@_gbd%&1?EX=X#TG1(A^Nhj;wPUJ&}>3p0u;p0F8)Ex%wmo zdu8g80pYiP0yoYnk>3daHmp1NLkD&-ppgqFTV*#iRJlYqvLw|kY13B=W;i|fKq`LF zOwH?OH+keh1LO?~@%XL8J!!Mt@5ku2sJFqaVLaKau1~VgJcZW#?=OJQD+_BA^<;|E zIr!x5qrb%pXESi}J0r_J$E1+nmnN#{x!-zM0(mfd5Xge06#9 z%u!jpHd|-y!;~{m?(@nT8aL*e=JoqEDZ5c%tQmV^w7a|7!z`Os(QbEK;cxj)H=K!T zHewrb)T4G+`IYoW%#seYhCglY7uQ(`t)+htsvH(r3oJ$v*jco3W|PO!JI_8NTKn{w zr;F0^Wow=mOJYKhRNqT@+S&}tY`~>xOpYYivKA`HIi0`21$E9Vh^E$|Vov5Bb=4H# zBusygq=; z%n0h?i*3_xBbuJw^SFvq=>Ek+D3xW=SkY{Xii4Y&U2^Fw-j=c9;z2}nV?S3g0%O4G zw0(=8w>i5+XTNo2xoGdq0gjQ>^6LT?<#ak+?~n3>n)w_OgM&P$XxMVoR@deQT#abt zg#koX?8iwJqi}=(PCE~-ZgL1Ux3T?$LJTi2oh_kW_A%&W2EBAw(xg#civIr6F+N?u z#!Paf3(AXmP^^_zCF7SKn6!nRt7x0deQ$^o#4y2nNVm4F7_N{uVFi>&;-x1szA;Z7 zA((V7@u+7dOfBmv7jBILLuW;-L)aqGaZIjoa_mkY5{v6h)QMtmuE=zZ| zDwkZWjAMTLTdnXCK?o|AXud>I?NkkVe9wCFDfnnAgfNkc)9Xsa)1J0PswYCLYo%T9 zqa`kD^glpdVBo>t;6W@#>uxUCgW1SGcX0N>m7D$R+^+4fz)R0gN0TSDX=7Y5!cWV7`hZG`5+pa^eyqQ-%H82JcC=Xh&B_CwcW# zZH(ONfg=o68MStk^pLPfV4#vEBi0OvJp}Qh+e3!Ux zNE}7r`ojTp$?F>u=Mg~S&{-(>{r_*EbJ(EUQ>XT{gSZbdCjhZ_P5R~Vn`?||ZC7&<^a~dWm&yZ<1jmJO@9e(^j!73!EVacR;blp$y@2bl)bw!Bs8X#x z9fxoWWl~11H*2}f4CiLdy3}pRsYTwq?sG)BD5b)lIEOmjK*OoB;q6Q);2Ab@#>dd+`G%Y{}IGi zn_Y!ku^H}2?&d;_OjoVe=WZB!cMW~`bgjQ}tOY}MqM4Sc6YW#cx79K!0Y5rsM^Pn* z^b&e9>EHBeJv^LVR(-MRdoNk30Ufe#Eb3`&giSf<(bi857GuY56aq__yb*9XKkcsC z2)G|^dp?0()r-~5)$?Q=TL4tit3B-?O3G)ODY6&cOQL2e|Cp=Ryu zM=Y|{@}Xky!8M^qM;8$=>}iOrm;Yzr(?)#NVcE$6le`Q_kw{Y{mZ4Sd>)X;+2e<|8qkB|WU|bvxX22nh zsJ|zOb%jls@N$FmJGNz8&ssyQY5r1vEpIT4IQvNMD#K1n7fu+XTZ+YGJab;NOV*Y) zEcB*RhxjnwnO-5 z62J`bw6a7Gbd$9(MU)nn-f!;f*p$d05|SU-f0fZ_D8hL=S;8S3wo#67c0;^Qv}Qyp z!h2Z4Y9Z?wi(gSnjZ0Kx#;N9=q=sO7iJ1oPN$$1!N#`8*N=Ney9oFXS9#RwdWDWu! zxko?wLs7BlLuctQoW8t@>i%~$SRb2zdfkXH~Q%icOB z4BFtzvYt6^I}#f1zS>I^T%>Iw^~Qk zkSaXa*KK+L`FjA8yK|!mCV)=PRf(^-8TJA2!1664(l6Je0*YJMxnp55H~zOAAcupz zNQOmk{I3kqqk@qf>+9<;jR0A^UY~IHnqF>E!+szqpTlZ;ZF{2YzypnD+qrJ0Pp-;G z11lzHMzZVa^uIs^1{&)+QgV~liL&L(ta^+ja&>vtD9UTuqN+)gW<(JxnsDMFJlVFtU)@9<0oGGcRtJi5Z zj*SFH7K}O3;wIYO=6r@4AMn;_Z*L#=vg!{2WE#R~@KdHYK!`J_e_-TFG$m{~9lCR$ z$!yDf3oB<(dJ- z?k77++{ir=kb4M!bnf3=#>bX@z!Kz}`OI%D=yty}@&uhubD!PKcezga4qQyqYEOQgbF~ zKbPnNKUx`8E&MYJzLbdKp{pXYy=G&GA@bU)G=1+cAJ22IPNz$Y97pckxybZzuKMwp zfL!JJ{LDJL@$8CQ=w5z`C1ugf5)J(QcXtJqDgky01OG*a`nF5bdL=sSB8CNHuE8kw#W`pMDapRHIS4x={knpQgQTFRkD zpNyA<=j(qxKt=>QaCFCsfA;v$<;lQMPi3~^KpfX|8#gu5i%=(zYA1wM|wY4ZB7Zc@|nJPz|VhKE(_wRywE`|<&5X_%z25nHr}%OBuG_MH2*J#u*)vs)qh zT0SEm;Wm?Yis?B|&ZTGXa;hT=eViw&AmTa22kUD}(@Xq`gD-MYmmHaS54O5Jwv^pY zGoqd%$K0fR{+aHgUojV2(DnzUlU-#l_ncRoJwZ$tQbTsxi;!pMhwpMoTxIlo*&~pA z+3*AJ(J33>EIbOEc(~2JTq`i*pGm9~0wXji@}crlQk(r=0u9@-d}k}fV3^6_q$zDJ zr`t$5R2{TswU@}^yzcE9gLr+?SYqyqqVKPqlF=>Ur z=+}XIoMq(Ql*pQ2gzJB8Il}-bK``kyhU}I(c^B;a_Y8@giJsIJWh=Uc-J^7=<|!;6 zZ60P3t^JdgCWf1@59$lGI;4Ne>7vs7#Bx;yoTatCaapiqmphBJ1Bw*3@0-E;2-=Qi zR^k)=b*tzeT53u5^mONl>Az;o;$czA$QONT{olRW)oF2uY%;S{5tNrTRhxzTy_`e( zo{}d;b`p2h3UGe;sa;e{HDysq_MzosO*@;%#Y6>UYSBwg%hztMwh%726zPoQ*>5-xJ9z;WJs-QC@wXSH*txGO1E^zPHLBE! zxo@tiw5PmxiLR@J>Vis6V|39>H$A~4!j)MLe(;g~qDE9iaq?!bmOEZSLAkV<^ytXB zn$?daQdDg%-N10UVhLzbyO!suQN_6Wx8Ahs4AgbTg~^(@g4b<=^GWE+Sl-gyL}eF4 zJjdU3<(ELwO}Rb!+ZKzT>1@cY_e+9z6>#A;Gr6s~W&=riT&h;lTFpR)oNe!1e$%~l zWiQuGJcozNX2ig_a@|xXH>EFdtD&&IUZSL=&&rb?RbTc!c^G=|CUuI?jH$}cG03OKqhua@ZUTu z9W@YIZwprZn}|hM6}6RpIuSLdS4>X7dLHp%-{fC4EAndiBb>6@c3|7(qGzQuy&!TSKBEyh=Bc_H% z0OaeF5~%8~u}ww`06nnJutfK6z>g8oe}X+4-s_MEoOj!*<|A_3Lii>|$^qEqf3ZLo zEZI?t?pBkt$Rjz|nYwhO&(@h*qpEIrmOwmsd9aJWON+vDUztLXOk+lQL$^uQI1RZj zCUmkQ=1=@kW8G;h+2B00F;sD=KU=3saNBN|-wHPRit1`aEw3=lLOH3%v9%1wjolYx z$?qooJQ>~cR-M&Ot|~(-POV4fx|;8@hyP=QMhp>oG^(o}e~$EP^DUCkw|r>4y4uX1 zca7UoT&_VX!nJ7RAVqmi#=B=FVW%~HO;js6j$KB+;Ze(bd9s^!%8`zxGc+Pf6$)mb zO5Q3u^V5C~aY_|B$_L*5Y9kQ0rfmMIi}zWS+4JW%uxJ5-EGCyavo@=MiIH52&6VIM zzjwkKzAf*DoF$wH!5qywKnq`D8D|B82!zqhVqLd0Twu%cG3Md<8&k*m>UQ-^X4wo{ zxjI5_NOO}$ywb0_=QZs&-AsNj3ZHQs`P~*2dWaStPSXqsbai>eY|`uu=%t z%Y`>q=%5M_o4opi#y$PWxl$7Ky2+Gf`Nrc3V)eJ^SmqPicWZ^+mFr(GJs6;z${}HP z6-momkM#IrXZF%glPv2|8w%whQsJl}R z&mv~xM^1~LjwV&y6DjvCI%Jc=9Sv4hj2v^+pocg}pm4)26RYhKDZ%-O#PpQ=#rmYo zpxBzTasl3I4M@Y=ldi5gYz6{dx7@P0>4NSzLTLC%uxWga9CNcK(JKqPBx+hdRJEL| z1TkGflUVpT?ud51L*Rk>%qsaS4;2wURp?#b-xVDrN)WnVVfFzv{aI1b&G5n_ZLhUH zJ3brC5@CVA{^1MZm&K%lM#ykxBV^uk?|Yp_nUREN@5p45?cta%g*_E(O3}c#@V>3N zn!|*{_a?Bq!iy^U-+9aYx5t;&^`~=c6bdfBM`*B|@)lCA!%t7>tDOhb&zlbyu)H*L zXlFivcOLl%uqEc=2uT~|B|hUE4mnVat@(y8)Li6Av`daDEC^HWiS{pGDrT1+T*R1A ztA67hWRJ!9Hp#-bKy~zyz$=^ue2sXUzrK;<;TJ=8?sxZiF2AO2hjKi@t`shi&C@6u zwWxH%;h7Xld>qQz7XcHAS%A;~c1USf}VD6I=yu6p9=4$nMaFa&ZfpAz!}p5SVt>@NzG3 z6s_KL&sQ9XRdBM5ULPzQU`Z%yoW3&wTi-KQ>qwIT1Fy-An=8hvsVYDQGZWnQ2eoLf z_OG;W@#%lGKgiIYDBN$4^|6>=XB){{;F=isdvP(C`qBz1;;GTR^0Lyke?Qw<0fIdn zXKn)@+-hXVsTz2r#Eg2o1uOdH^7!6rJE%0ixZ0$rPsW+PIdP}*PWuQ-qlw@2+k2;F zylS^xM$TRdjw_w`2oiVBM;6>J8DFBB96K4kE7W{}@4ODxsd7qoJe~fY!+&V*5>ZhE zqm9gSQ4hsqS+9@`Zy0_bJ(5V&>aK>c7{OYoatb6RPE$1>e{nFuS_!;g>?1_`muh&s zY+-TzaWBIlvzge5M-OUymt=zwRgW_3E(83~ra!DBRIbt{e{rmV+?9QVj_W;Y(``XF?x6}xAPsSww50qeqV;03b8vHR zrV!n*2hUnM)#Ui2%x;#!y#S2r3lT7Xdrgoe0N3r=G?sU-Lws)t04RFDIci)3j4y!z z2Kavs{Lf_28ze1YaTjfv)&6+bwDI!dl$4S(?ZDCTH6TWSIvW~NnRZ)FO%iamrR$RB zRQLhYGz7`f1I+VMY7ZA{>maoc? za!jL{y+Kx{pBD!O2j`uRq~HT;eyrLO5}SbUVMdsmUT{^RsjV*)Ue|)lJC&hT`7Oj~ zrjHBXr-A74lP6u1uw~VDt&eGnjc-AY3K{wN49mzj{{NsG;3WhGR_={_SHSp+6>S5c z9+Me`jN?DQJ`e@od=3y}h~&zre>qdpUI3XI!M}3dySB9d4-GhM;W#uMQe|(&OS3^# zlc@X$v&7~5thN+|^qOpwlX%o}DH9fiC{9U7`OB_I4u*YeiqnxXCYvcptpaaNA@jl+ zH`yWBG4=AJdMWSwK8X!{x?PjYn>`JuONTm$$OEcDmqRRSIur;jD-jY*M5M{6Y6^JWt&AB3FFZykvNq zTLrOd5@rI=vf6?UlIrirys{F>pUU9o9%{(|S#=20N9=~aR<{x#mKfcyU9;%4M5C3k z)38+<{z>Xw?LJA8nnLqeb<`1cqIe;4=dXvXS0U%-tBYDgdFHaDQ8j{0xR(;JMs3(y zI;|J$o(3PIJoV^VztBWYb5~jrr>b4wsag%BvUg0;D5&=dR>cr6g^HUIvQ&1%Zzl2? zga`>Q9WGxo<{wdACUZu<+6a?59+tFoUU7<7s~n_=+|4Z>UTTwyb%n%*uWf3`uf5bN z*I8*WiCc^$zcvyUAM(eECn;5KdHW*z@fSUaoIl~u&n2`k=!YN>b@%sq`|bDd6r_n; z*=)V*o7TwB&e|A)g{E=KJ119{=gM~UZmSJErC2K*lo*gwTKpWUO@GM{0n%uzY$pXF z5dwA|KZ{cwhQnkM{{Sppb&>Ajlnx{6zLn@A6La{hf$Vjj#ls#>3tq+?70kbO?#~)= zhekDx^_80@f3w=jchglWZ|d_&^`Sh$jyw4E+GHhfXJ)3&Qlp5dv~J5Z!;;8GH|41d zJX5nT#85@DC842Kxa3eQ>%7S-$-J;aWAPmBiP60S0VGt*SV&=M?VX2|Q11jCnC=%r zFzwzp=CvGl#i(6<3;ydZBb*!=GFld?&nPRlC*_CVtEq(Y@T+=nZWcpyvQ$Ii7VoA% zdwXzM>)69s<%N2&n0uN;E90Yior(fdnI0oot9V80Or=S!zO4920d*5Ml<<9KznqeT}+TarHKGKrvR^@`1 zjyhPq?_P{JRTmBxrX+Wq&*Z<{yzdk(dCs$8wV~1{;qlu`jpN{E#e9HP$JrO}HQmvx zT=!L)>>iodT4sZ)pL24pWm$n%U+89G;mh3lX9JoAxL~Uh?_xPKq2nX(UXaHkJU)^q z$?nt%(tD`DZAy}nQ%cLZ;Q%+UTim@_uhYHFuy6uCDl(Z5(6Qy_{xfre0Wabr@%exS zFw-j=wX<-q!)X%e=S5AhgGmxwhgv?~wJW8L_zJ|(&q~k#!FN}5$9KSYepeg2;=ljV zl?ek-v;LH@>)O}e@?i&-`Rqgo*S_W!+7o~oH^qGW4~n`nA?hpdEa&faJ>fr!eg; z?*8kw_Y(q^XyW4H$hEcM#h!Tj5;^Rvj4_>R3%ZKy)cXM7?K`}Q?J63gz=Lmnr~7wk zp|^&CLwh5M|9vokCon|+<=oIK9sKg|07TP$_W7Dj++W-CoKtmDTG9_YSiQh=>N?8d@J^#0ByRt%B4v<4aLQ6YhW@J21 z5Ao~QuQu%N=qbnL{?Q>2{;DcOC0RLCm# z-^bz$x`jsYhyehKl&MNsCK9)NLNG2Ak9lH2Njb+b#(BZxlJINNjC@pvQbItDb-$Ws z5U8W>4wSos8Xbvf{vEVq+LrX_F6c#O4dxrn1Otoet9_o(AZ@31Y3}9DN|?>Q7Rb#$ z-rM>4vmzp?5_l-6WAxBNBuFM^`P2h-G9SKzAyn{Av8fn4kDFqkWQ2x!c6c*dv50j* zM+)^&)Bre&A~A{2qd%l28>{y+k>LJx+Wl;~-|ygCL(qwAzRMS{UN5Fi5PWLqiHLI7 zzpSBFwG-(J^eHbY;UpyoXIiVc!b1<&VJrgRhQaY=4~BBdKM?C5>DJWSR*^xa2U4;Q32^bUL} zcZgGFJ4Yye{?%Lg1I=coc3Ae><>S$$L#IYaS`cK`V+vgbH%XNhB(Or&x0@T(F|Uto znm|smCTD08*$$dKCVEHd|lSq-1Z1}Edr#7q(JS){Q!CD;Zo8>xT4AJ zErQ~e4bgqkM21FLSAViWXg{<}q&Y4KPmj&!87gMPrcA8Cp%+y;h@K+nwMgWzv*YH< z*ZM~)vHfR9m!G|HeXHlDwChcvCE9i+ZrvA~O+f;2w0UP}7OP7Sl&pbMuOU$Z??=`*aKC$}bzS^Cht3~3R{gz7bP?iY6`^ocCZCmcR4zyEkUX1ZO z9DOsRk~oE`U?>_Ab7u6Z5{?;XnWx3oB%bz|%WJ*_r7pSu*>Nu&m8!9cwg(fb*d(3$ zZJQj$pElebJJ8kmj@|1w`P*AQy2J)aZ1Eleu%{8_E#doygW)DkReLpqLS4E(Td6XX zn1Uxi^*|@Plz_s*g-bS0w#j_v-I^`gFq?mz=rIn!XgN_XL+7wh*j^in^r(4B%EF?UaM;$(t+PVBu`n9@EK5-NrOwEpu8HM;Ro8M8BWoXbWGy zF!uT>DjUzLt_akyrVFROr+g%VlOT$8Oh46iLJI@3B-xl(4fsdCzJ{k6N*D=C%p+-e z)7KD){c6W#^mnPJ*Vjt+v}X0G;R%45^` z|6RF!6#WX|T_UT2;hVfy0wEB0qz$tl+{7U@;QIB3+r&-YEBYCbNMj5E-aqp<@c1(U md9ZvT#ro^OWT1k6A)@j+>#d@~snjjtBmGw4P3da`-~R?h2C=>X diff --git a/umn/source/_static/images/en-us_image_0211552164.png b/umn/source/_static/images/en-us_image_0211552164.png index 14fd3fc084f695fd1cd5f5c0468013491c42dbcb..df810e8290ffbe5fcbaf128a5d788c7de30c9604 100644 GIT binary patch literal 22034 zcmd?Rdsvd`x(94C%UauZ)0&yeJg@2GWTlxYo`P{zHfH7_%{&0B@idA^YN%*H%T}wI zQkk^0(xfs|@jxB`Prx*@0!@+011P98LqdwkC<1c+UTp2P*52Q~zCZTf*ZxjiSETU5 z`#kq^Klk&yf4}?o+laHLw%FL)SXo(Z3HkCwl$F(o(NXC~?o#0<@#!Zz6;~rhVe=+#4 z-|rsc{pQ(+gS*-GXOk~3{(RpO`|$g0vbRV0dRDBQ^lfQU8y5E_`b}vDu^lc~7>O zmEl~p*v@H9pe@mGt68)CJ(ypVD!qR3AYD%oX z@NjpdA5IVuYc7A(bCH~#H`6ce_QN^38u?ke@KLHvI?kn5 zD$#G1aleS^H^OYTSK$$qJ2)?FIkgT<#yO+0{Bq;#Th}S8O5p^fO*y%==j1?q1|$1{ zY&*IIXXrS}oXVXS@+8ybsd5xf+RDKzUvsleQnPZihW1=Sp4HAujxm2-@xd5APwDU9 zh&kq7Em||1E-N)Az8S0cVi;5)5M;T>1L>m7qMXg)m^z8NafuYCIj|MVRF1+M0!I?T z>I5>1_~9k*hkCfSxq1!fl_0FlO0Kf0nWc%oi~UpHbZI`QOeFn@UB)20)QO_`>WVIC z$K^v$;3BsVjs&w7lGMn-QHqRB&gS22cyL^lH(H#*zfxodldS2CqZaFoytgp#MUnaf%Hk(=sQlndChC*R>o1S`1ekB}O z9)bKcQMlMMPF)t<5ik%8_DsQq$?z}wwT4CQ*pi^uVPN{pU~JuOPoHb2rSU~4L5 zhvKQS3H95BKxMAnKMxDW&i28Gl%Cb3Q)O^=E7;gezr1=%sMg+>de54FRWf_DE_jpZ z*ij;w*GNoz7%n*s<1avJ6QF$=!1Z}{UJC}DcQdxm9?>)dX1nl}ldi}Gok|APSG67Q z;9};aYxZf2%QY)&x8V9tWS{?y#%xlU?xa%#b5jw-%ALIVP~!qCcYi3TDWZ~ga-sMybvq?Ye5b8#(BCBynOM1d>)sz%t>Q>N#!-n-3L^A{+G2E|KV(kNwo=!mP7lH7lPftR&Sw$Xhd z)jO`&v$S_Pq3=&J7Q>F2^$FWygyEs<7EdSjdk!n@5g}@R&)jl>;a#rp;1!nAQOb)E z&VpHPPY=^kWN3-lI67EoIRQLN4{2>4s@sDKf)h}!T_ zkxq_nacZU#l8EX=79#hPP*7}rRtxLx#%A@L#3O0d;l(mb(e3auYf*@ju(C%X;^h8! zVzt9SBLn@>-C5?-aCJ%zSW;lfNKgi>PhOuFnj6lvPdZcfTIy|2m=TsKOJ*6wbK}!1 zSNNW6EOuDjhFJ9>kRHYR^K%}E`Q4#Pzd`h*raz+}tQORaK7+W^6$LffBUXtpTUf;2 znCGiVaTo$+i#|S!N@Z8CLUo+WlE8R@2-T&});r23UDNxXY83n&xvoq)DVf%TzY# z=1g04Pj=06FqzPIR0EcJ_euPhZh>!945tNhv63D0L|nSw#Wcnjq03SnnGPBi#sf;T z%rHcl=|B#PRkkImJ*(OfA{RQR&h(dzY3Bw%9Q4P3TTrpm%(*n;nay`wx{|&x1is!D4insEr?eUhi4}h{xA_=8Yey^ zKfs347Akz`@L1$1s=v%wv*ODVulk)}!YHUrAvshbRAuXW6#gb(Q9BaCe}~P7-gu{M z!i9?eI(kJJDCA3`$>ETZ$-Ka`y76wYuT`SE?fHn4%)zjn+<4Fg{hM#=9r&5DoPI}| znmlt=1B`W4zXb>3`6_C1IVeZP9%LVwjXT6|Q~0Kqv!^Pt6o?%e84H}w;ydj#D6<+x z%wVLbEv7il+=xj$TjVaT$%l%fK<9e?v|xwYfhd|uR>^x_=*W0A-+B7cx=pUWx5<;N zUo)IBvorz-hpDB8xHLGhhkNRg+YcL=E3wi3GB?IKN( zlTaLFO}I)#`AF?Y&TyE3Xi<XH#aIv<^}DcQJ3V#OCE{mS*$``9oT;adqq*-{Y*%ylc*WE*`+K zp&Hs^gKjQf`hdXVKdyBJp=PJ4gQ{2PfVZlRR+qkZj|sZ#@M7EViTY{j5^5^bg_s{% zp2XP}eP5=Z)i7@8QW9(^+cIzL11)inX{Ns=|Cqk{$(Wk?Wv6w_h@Y{Nr(N?;UUX~e zkT0`cM5Z&_fRsimi`pLD^Vt=%USxj5^32J-SL`M-oKV+)9j8+_D4KWeGZqF_d?5Xl zxc1j;sHfmx|Fktzi2r#rd=gA1PF1#>cGuG|i|uTx)Yj;57nZpy$Mo~?cRVXu2|`Am z!JYleuT%83V>N#ZjMz3%9elKaX5hHGuXFOOC6me8{giI>rEh=e_R6<9?P$o#8| z>BmiMj$=;CQw>M`!0Zaq4sJ?ng+i>XoJ&JvB4XOV+ja5anOz_P{p*lFMV>sRR-x{8 zcwA>?Uk`CUbu3&D=J{snJhmU62kj`RE4jU^Q398q6RVVdS+n%tJKXx|RQ=6rH@B!g z(Vs=WJSmqQAx}^8YYLf}L!~&~Udpj1)J2x5Zk9}gT4oR_Z~p4@lS5I=K(5*?W0Y~T z9voa7+x{uGKa!~MW&6X9ak;pD)0PQ=VS|;gL)8l8^zE;9os6ls`L6xz!7a%*9|pQ? z{w^o+V${nsz}QMaJJP0VeYANbYQ8vo^cf?FlsiC$8Q!LGn6-QpR_Zi0ON6)?gK_;$ zfLHht-992gXWpL5T2%&OtFqRL%zG#BU0qoI@+kl=yS|o!M!dPrjdpCAG#0r_Ea_js z@VS_pQxA``4q$4E^BnO=la*CXX=q#oy2o$vWUxn9`L;t-RmD$ie?Qm#!ybJdgu5lf zqp{-5xOA~zxNPfEbm}r1|DU* zKQJR<`(8S}90l!wK$t6c$(d}2%}@MC1Zw}_y+Bxdn4~Ihu-#)vb3R4Eic3MW=;@NX z(s>c#{%UR`GCiO+mk10Ls((=QG>q=vC)sNC{Zx0fbt$Q{o*KKCw2j{@S=kstON1hN-+_0!Iuu6Ug>6Bx7Rd$ z(}*hQV4BgrZeLXDh+U6vt~O=!lEF#UnKJww**3zP==PVK61OL1)%lbm6K<9e#k@_} z_AlsbwMcDVy=by(m}Yx|4p-Ozet^2?`WML}hWRfU>HWjvJ;F}p9dYaSJyWsfw*A~r zx}+9q=Vc^8S&H0mGMn@2GMjUqrIGCBY|_=6{=uwSZ@iV&2&-Oy0N-PGX8Ew`E(196 zs9hc>zf?6B?~eK=If2EYondc}R&^7Ia_q1-7Ka}0eZgVCB2J=2LRK4w&v-iWbEE_6 ztqfz+v<-rV$I7EFjH^O7MBrbx+D3ZAqE3!PnIm1uwx{%&WHBM91!^5q%ioDD8eiL= zwE~}NPD&fDIi;5S6CHC!#TorsXfT`OVs-VDV$|$F8ro$&9A}{PR@iTTajU#qV{-Yz z%Id1@%OG@#+aJ~1yoJET%fRc>RP~{_CgJ4xp^SJGQWb zpK-U0z;S|5u8xJH*jMf>&C>fY76Jq~9r~GbSNef-LnxN4K}VGBZ091rcc{MNH1R%S ziJ_q+p_1E3to}koO4dYb>&|)QygX-m z8`zGlR^^h#X<3$YXV!YcmtC*?W?0$r##$rRJSV`czJWRaoYzmhojreefk6`aI=rA zo>b7B6qEgWb7^LHM$Mj+;U1Y!1pM|+rp+UNmcYOk^BHY~SYWu>IW_Otw}$J~Dt1qB zdKJ;i>iew^p+PE1bv0)bqLr(bl3-i^*>HVqcE}`PLfkz12 z&cqyj8E?x+ttn>{8Xv_M;%Y?^=yX~aHn1U(o5=DDhNR*Hmt?x0gK_o^ zH;2SFq*3X=T0T0pBU-D8BAQlHm2WGmU7~jZ-vEH(Ywc@0ORc}8ke~ei+#3EYtQKxm0MyIvFsKslrk)m(IACKYh(P>w)_d|6P zfg7x@7L8CJy#hrt*KTP{58#91%!IYdjDz6dqz#|M9DYl#uSdz7+cSjmeFMu2WUA^( zN_r7+Kzz~UL-(EUpbM_(HoZ(%xo};DyfPwg|6~SyaA%(l>4HCD=Vnqyl^ks(!PNkp zxz%FsO;%QyPVNUdJF9*FZ+V82iWkVD-UGWVkDR6Z^^ZRJ7_=jy%-2YO26wMq!ulvu`Yq zftG7-jVs8pmQ|?zxf7O0a%C}TP9`cyQqF3?3=2zp93#1(=7Yk?)L#)#-FGy*1ggd* zDv06LFD8m%OiC1`ri(%jo~Yu+K2OGlZ%^RhIXHCsIYlBuS-maA$h%^p&a+8kG!%tS^8wumBlx zZjGex8y$?(UFLTLM!vpNt@^{$EJO46Uox{xx)gHKz`*jk-@VPIG&>k)-MK}DeYO6? zda+vBm^TH_`DL$c^h=Cbd(z}@s@CtCMO6V=Z zP1|=uY=Md1mOYHKAyu}2V~6^wf>NzdfEyQ%TZiioZjTmwvam@(-p&W)B)EbZ?O5{i zj0=A8oHgr0gbKi-lwvomKCmcgLSMq3msZF_rBz4-JB%c1(>@D}!e%(D5-sc8mY=%6 zF`o3zU}*tzs5IZ>G%xF~&0jP!5Y`iuZMHkog_}u*iR=qQ7Y;_V{N8Fqn2+NRM3CS} z1;3HzpkEbB(rWp>V&!S-AtzdtF^@xY0of660md3ojaVEg>#uBp&Jy?RCp#Enciv*M zUUfpS%1&JwNJGES2#&e5s6+v%Rj!+MqeH_Va!0ehU=L3LFw9@%=&C;(9}#25;ppKW z$%RaR<^x2yXe(Df;#S*EZM902+STT~nS`W#nArj}kmp>jek$(}&~ z606=M3XKI_}Y00GukFR#1m=)-XNu6b(j+AcgU$KAMfB%>HQ?5 zP6{zU5>2|Y7q6e;&?V0=mrYSGPoHLeSuK|IU1m_|+>rH~!-1Q>4GQXt9!`9jNKlDlz{!bD?EyBqk*Dv&>ebYL7XW&daz!TW zn7;rgyj=b?T<2c8e?2-Jkv;lb?77`JaM1d$#UH;()B_H=z7+>3-2c*xz0ua&fphq? z|GxU<-&nlxFn@N+(a8x3NJN+?{U)7E$T++kA*JwP35f}PU(ICO^PFs7^on;~$an0u z1hmvXiyhM5+reXaKrm?Uzh721_I#=Px9>0g$tgPME~NAx`T-*m_4iLF{zg`Iyy21k z+wcG&0sWR!>Hwk+icJms`qX^J@&$_qCAn@3>ozaWbU?oCO0d^2&GcEaef0|lKoY#| zk=6>Q0SqTBJEdsh&vZXy@qJfxVD)6uRykK`>eW!r%_F|PBlio&sr^dCsYqUd*ndQO zNbbN#KsU+Ic-x*O#;?~s`VmEYlRR44Pr>ZUWb9K#w~x-Bz?jW@$QGofRQX`fdT-)A zl;{@6Xw0l*ecSPCE4~19CJM(xoPZbQA$LKR~cxv*N*6q=DUc^)BUTp-& zd?NRUfx-X|rElqMu3SA|&3}#u&tYIflf5LnwXnRZUt*P0kc82Fs+-95B`hX9u!W41MV7TrpE(p4e>_x{jVzUD+Z;Gx z98QhyxxBb{{+!}kmZL{mH5Z-FleLw|P*-aCZLqP-A#v9rmw`1j$A%g^nOSE}rN?4} z=V@Kfyi!?9hy%hrR&hp<;Mv!t5-eYx_F5V?u8FD4vdN==)`6P876?$v4b1)Y zo{^C?9r3SVET0z!_d>`%6Z3Cm3J6K7Ti;~O@7pCG1shrLqv_Rhajz^_Ax<&)=TYpq z?7|r&k>^7GyyD1E`ZM6Y6~SdK3ckha%4E;T zO&wi_I;a_2Qc4fCc18-8bSY8#D%@vJ!)Lx+WxpoCrO_Z~aRE=Ztd0vnsOS6C81MM_ zScEKlu#L-H?mQ^h`8OpsAZHp^y{i}q;$6=&+xcqMg`{7fV|gPFDps8U6}|KT1>8Y~ zb(*H`O3_Ju&G;zLGpIr|k@jY^_mCe9ek&4jw<3Up7B-;pt@*~X16a5YtG6fwwns#MtGJRs&_x@NS02x(M~TQm5$KcqFS7$|i|5+C9eO z{pL?zF&O)D7X?*pZ_}iE2d8l65dUi)7#PV+c|DpU>&&?0W8C*u`ms9<6yH;Q3ou`V}G$$*1b&^xG%hle<8`1r)?xDOGs z%saSHeAM|Q0y8l)39R=`kHJP3~PDRML4_d}%f(DGDSx*mqi%<)U?5 zur{~c(go7p+J<_IwlU3D%AjX$NTF|z;zxgN#MwPxBDMA1T8p5<=#GodSfd42#OQV9@b)aN-4t8_o0D#`R{v#j!UwRQh%cKC2X+$y+3!jePD^GF7Hg=|n7H2YZ_(vHbWx8sO#_$Om^Bp-DH_QMM)NThE`bNW7T3 zH(D8f?JlQiR#}^m)W3GYD%5F62W0?Lf1TsS4eZ1y6KJ*?&A4aQbay+4VN`Pp&aTg7 zWy$hIPk;S#LlpNMKsM=qy@8hm-R=x;??MH|yo?s`sgCAI+nDu>I|6`dAKHJ(^x|AN zl3^+ZQMu=)4M0x9oH;N0vi=JAPN{4cndrL>z)}j7eDMH*#VCQ%{utu4QDiCyg=8ZFW<&zwEw#8kd@2&TF#$yicu4iplBM z;Qsw+_;8?QcC^lwJQR+d3v(cixk?x%ISMcJiER$P};CADW_sZ1HOQ zx{tLL0@>PM0P^yOrkey^@aN`Ql1*v**9-F}UymwJv+Orlbu|@#uFsifFpunrp76+R zc|xWQDJiJN!VUY@$Kv#UET?SBx4F=*bZcxpE}8PjJYQ4JS}=> zO3O0j#Vp%SlUCyP3n_wxqu>pBO|&8L9)f;StiCelvjeui*0FxTT5k^7a0I8n^FflK z5*XSxPooH2kJL3B9%5v-)PjSLIM?0m%!Yg1DHMVU?NDrJj5y}?(JZpsE=|NFeZD@l zf&ZM70{nU6^=m|RK>pG+ip~_$P$>OBXO(~3Cv|mlT9|9df8e9miLa0SZvA)j%zvb* zEx?`!xIxEH{@ZcpDUdE-K;nP)~UU{qwLfRgoSC(91)H@<(r)t&r)1HRu zF8T8>&XghnZAm~t0y;DWV_0U>Ag9uacWM%xno-<)MlG899x<&bV z!AW4Mh|g}udOKUiUMnW`eB)5k)dcT{vgG*kDZP4Gxd!CAxWj}@8MB|A?c1}Awg5QT z+ul$j?#Bz2x)Z!e=EsNTiE{CDh9Nn zeMrZbQPf%i7gckP$}bQz0=dg8pI&VSz+(w>?bX`mV|m6=m_vj41NTtjldL_bStR&d z<75c#XTFCt8-@UVzo;OQ`y3na*SbQ>0(JyUReIkOm*o!KLpz6x382o4oY~w7{){_z zOR@oWwdMV^9ShAhx!Vh;YL|0sO4`+0e`>Rw@(f|9_Xaz=T>bIcql^VxwDI9u?ee}y z<`0}&jX!XAin~>zSGra=gScZ2xNrGX)0K1>4nrJCZ<_&QJ$~$UkREoXB`;>fTglm3 z+PIgof)eAXD|3v*E->b8^CcslNWo<)_g`ZW9UqG-A^hxaJ zMP_?Z_iT|lS+1lI;l!~uEqxXDN^EjmHvkV8DYXT-=%4WIWjxkA^D3btZvvm*Z+}3q z;{*wwBB@p29j^Hg5VUa7t;GEKifTFo_SO94?RLF7&>3|_>GEu?RitZ`bF)RG_d=z2 z@)~-UVqdJ=0ias);_N+y3%ObHf)svY(m^#_O}AQLmpXc}O#(gxsCHUaa=5F6dTlCP zzUj@c`x_rn;N!O0*E~%>$gv2+qKkPoH;`4J{C*IsLW7nRGQ=IRnt5|V{vZJoEUEHN z0P;0sk9QF_2A+>Na+WpJy%+Js)-TjD_4p&?1rfV!wb}e?uA59ehYw_=t#tBMN42Zs z4==6#&FncX@S3?6)Zrsp%JLjyJBd$y4%qGn|dd1D0uGe`MSmxKaDd3D-7{ZdA^KcFjiCrcY|B5c zv2cqiPXJBR>fY1;#plaSHY6ra*0v5r271yei%+j3%r-1={ICD?R`6eY5wHweDilri z>lT`;t3jyR&w;7`9Vl8j(0A`BoQJ?!OPhu3fU92r@=xl{D_U6RXny*cb)b3MLhO_A z;!;kLNWW$&N7_1rmv$BY$4H4QbmS%x{_+sQOM1WfYqqDgK2%3yz^ViP;p1V6*PI@;l=jl?M zLjj~ljje9yPM%-Cy3ztZJI+U_P}QX0lbBys0V7AqGm0R=iYhk1`j_b#3q%|pJIb{C z)MB)CX8rvK{=`E4c_r}rS!c};U$;WHM^Cgt6xS2fa~PMpa-)`YP*gL~jb*NTK+Qo5 zm8$wgskD~BF%qE2EGsMX0m>l)BVl->3JJe=o1z3#){rFsjH!W*M z5C~BB|5VKf5?VC#^v+OI*INL;O-^@bCshYJo5%O&HW>$jww6nH?lBBFD?vFL>VZ5* zsA4VV#{1vsf(n2@EGLg`noNn$*SC<{V8U0vL@{e9+XZh}zQKF>pbN9qBX#z_ky)gh zZ?KhKV7K|HdP)$Ugid6Qc+``8vlEtYEYvLOr#h4QGOWEVrA*n)n;GqnWY4BKHH4Mk zjV9uTZ&?6eZaG6tImYQtC|^$F|1zrR&TJM@+7ZZARc}}76G9dL7#R;gz~{t~`%H{Q zJG^44j`b=#jUUI%m*qM@ymav-H9){?(qNQUBAl8QIP#Zb(%>$R$4oaW&wyp_e0{fSVh&B_A3PGwgK?T_31XG%K2Y}fjbx{IOHe5jfzy6Z z*0!{cWiJl56Ju*Nx!rE>DaHg@6OH4|p*%d62dg^;jex%OAMw<+S1tCHRg}c=pDAt) zb(A5NywvjQJfrH{Wi+_8d zbd(McWXJE>#t?NWvrAw7NBI`dEEka#B9HEQgjnyH)8bEfCmogEHuiz1Wi{k$6huD( ztCPelI+x0!vgQQ+$=Cez_-U0ql$}^E*0iq#x-57w4J&!3`)O6i`=Zh5q{Id&RpqJl z0vKE0%c1-fI3Vb#;(JXPC&bL#cqw|A0~heT+f;Yu=%fo`6%|k!}$D zLia)^X?JK+RTtNg%3CflDg%?|q$lJ330V0U4K~(}6u}6}O{e3wPMzmBlN&}g69NZ_ z>ycm;XVQ=Lxv($@s%)f;^MB4p)V=NYZh(qUQcL-By}lfbVvNQcn9RH4)QL}jIF5)F zB3c+Dh1JPdu%Y;eV|dXY3e!2`o(P~+T=r7_A2gi(R;cN2-v1VO?w7C#+)f5?#Dii5!#z~@w02C zlXn>&;@VUv4^DcZ>7*}bSu#GD)84-k5<@iw{!B?R|@IJ-t$m zHVh~!l-Kp)WuP*@GFv-9bmG4N_Fl`iWo$3Em&D%6ZcEc4ZOZH- z)+Cx7Gm4wf-N!}1Lb-aslR#rpDErN2AbX^HGISHh=M)b z-UBK@be>ZkOq?NvELMSQ>Le9Dn84Z9(vE#R@FV?&y@>sB4}Ki=KV(c~VfgoA2iy26 zU;V0_-`UV6UK6M&-}!_RBkAFipMdzG3>;}kESAuCKCGTvw*QE7_;K5*ve&4*j$?5T zj;nwVIk4TmB`4#1EA;|^%!da1Y5J)Me#27~Yv2MxtdiR`kQ;_OAs$lAoE@x=t*iC#0myM=Uaj$^Rr;_11mb3JC zQWlfDYErUcIkeOI_5nmi3quERLx@wNE}IIVetUQoG>@)^QYQpc zX$ENSFqI)u_T%m+3k94@MA_F(aKRzUvE=vrbp~zRE!3xdiBt3aWSv>3GfGT_Qq?=+ zXX)p-dhwS+`{q%?jEWLTs2X|9g(&?w{$;r7uKQ3n1v&2pmKO?dJ-_U1u^D`KT}@Hj z(5UPI&>%A&_7&Bm^)9ZaM5x~vid|R>?ZC<@afJ_a4Y;I$czZIrS(f@0f{>pEPrJ>h=-fF6grhW=cv(Bze_8^fLJK`q%7H?AVRBh$uGr#q@S1eu z^$Vy6nL~{Dw-m^{khN88Vh!yyhTWGkjY6ieO>URun06;=N%w|hqJUCdAQ0JcI(N5G zSAEIRLzoMrnBAKBDHhV7a#l}4S4qXa?|{%(gk6c(@EL?EX3o83oq8D!F9#d3KdEwW z)x$3gj-u_Qu?sbbnP6v)H1@@)_Y@ycI3KKXAHH4_w6ydmX`qxzm-6}?hma<;|0t#j`_Ro{YFN6p25v2uT@GreuAiqZKTtV zHc-Sa9b+|I!0c9MuG!8VWs7JiK`Al8=q*A!?dCt%dB{UWi(`k~>Q%rTy zA?yNW=pF)*6v%r3h7I~o;hZL9>t^)-cKMheBM8-0 zN8aS+d)Q-dm)EW&9>;>k+LP3jQWqN7&(Auhv+H+=Wq{+gDy@H6lZP3Ta4HYZEb^+` zSLVao>PT*S=`-j z67RvXWv|Ia*pJl9IZn;U)_Q@6O`-tjQ>QDk+1$-IUDlV^d0*R#-KV0wmiEXB#09sJ z4LznCi$|sOa8aV!1U`hBg);-;g)iSi>A{>H-_A$oa^&{VZ8ux`d9;x7Eg{A>r3G^C?dsJ@^iE+;l>G#IVx$ z4g3ebdc%F97JJD_#C)kaz@1zKGq+rmE%dhb-RjOC zLiaA>8_@#*=q{8~_&$H5O||>>VlT1)u63N2z0RvzRHk(d9`Lu)AI5xC3i02#0GG+X za{-ompY@8J{D^hZ_kVy9uw?iUlNhpNJ{p)%?#S^sXETCj2dZ zgVpbB+|JLjmeq2hhPdIj=ESUnmDS@%U&WY?Iv0QxTdW>^-gsf|*~gU_l$F)VpqFl- z(&xiPA6k75e5@z^&ndv=UqnWjl;)DN<{ zngf_2{K_w%TH2phpqBbigZVr6??bZemAXKnovAv3mW3oTfr|9^< zjZbd?VS0nroWX`fz^%g6-&HHOMUwkhUKtN1{&{Ribdu+tW%Z%&j-0hQY`wkeHjpTO zE{%=AE}X08c$im=u6?D}6A37~>RS9_-PY|Fv_1#86^r^wHqe8J>LkIjWA$GI+y`Jk zP|JNqI|QFKweZsytHGACbRQcx_uYU)M2xgOD%8t4lDR5SHR?)Ir?!vT7aOq`Q)4N| z+srC<18aJ?$XksArfsLS_kH$Pc0fj-2~_NK4Ff3Vei0VHE*iIvL52zqEz8PIT38=Y zrGGK|UwvD-ICW>WhG{n58f0LB?DlF-p7lgED$B>k@FrEc8`3dlm?R*507rUXWS!pm z$EHWGN(&j+U(wD^&2FwYwMGlDzivvx%MtJZb%J|d05ZtiCwe|Z@k7qptiXyEeZAjD48}5;S zHsC+(*C!opTp;UX7OD@HLQ#H3T&3WVqWt zT1k^YjR#G*#EP=d@E)cFZP)s^S)UWQFK^kNCcgzY{Nm%fK0?bE?pv_MFVDi2Kra(A zfKeZRps~{A6zwdnZrpP{#w^26%)&L*xjdjUSfnyPi;BpO18T*u=BV*=ijQBF=G!z( z_g8I;rhoIx>+FB?{KM8UHVvj&{mtTq#qPgt7{5kTqc8kF*(XmPeRa1w_<{u3m)oqj zH%}k^;mH5>7IboQI<{&ye6VB;Z?WvZ-vXbS#p&hp(j?PS*omdRif@7aXZ45w+uC1V zlJaLUX}Om#clBVD&m6y4iJ$ZS(CUo=h$?p-RsoSuglDBx@!iOFKuh7NpqHd8vKJSZ zA8fFy@vs=6#>E+U=X-4w5MnsmpZ|+*kV9i5=FIg#|0OrG_R7j2a%IxIdH$=Kw~|2e z>#=YMy$3DhskNaV^se^>>OhB~^CIzfQXtS!b4&SZxfZLQ;>`5rD^NYP@0%b07Kid0 zzgoxz_yyykYI)MhiI={>zT4qzr#O0&P`prJ<7RbLiN;w^G=M2nh7}JHzT+TBtiYS~ zF1j6cH(O$1m=t}Wr3F(%mkFB}&F{9_P-(M;2z}u7Nmualw{m5s`TI@a=kjynWH@&7 zc_B&OZR{-sq6pCLLQma`9HlY_7mPZFVbMAU#{HagL$fp#xJ#H}5bW>{ zE^kLWK%g5(1CDT|=6z?4OSBu% zPh%KJRVG2GQ-(EyXni}^bBeclsSZVYwB=k&co}|-%Spun{pT?spXVZm%RTj=iwJpJ zMa6WD$M(-uTeu;N`KDhQZBKg>Oo8(!&*5h`cP)%_7o z$OfPlw3<`J=$Z;Nt@rfE(+@t-!IeYYZ5Jr0*r1r}k-F6%n#R?zfxR)`Ku-blcDeQ4 zwuAIHQ+u&1t&tv#oJF9hp>+XhVZu>W#Uz`?g)#P7(whbLlDHKKL5Pe?`5+hFPdA*m zodbf4-hU9W(dzs8hv7jggR+`)3Y_DC>5q!2A82Cc#1;nKsh-9%ACs62(2i)avfQ)T zS6mCslDi{1=GPMIh_V?Mg1#J#!!x2ICU*8c4c{I=1I(`+u~q@mRtRe@A6v?;wXzEI zPfLiH6NO@RW7V9B@GKuxf3}C^xB?A?Y1ibD&U|JH$*5|Lw0Y+Cq*4G>tVX^({}j7D zMXUxIM`8TIkgO3Gpll;alJM9+&!s^zw7ei}wyzVYirsWOCp?5l_``le(oCCNI{!YB z#_+cQE}u;WN>jeoy@dB`_=eNYX~I{u=$>!ocvY5R>+$Hv71;Dx5dHR7jZ`MkT`80T zj5o45X`GR*N1J50?DA@5|3{rb$D>XCo|iw3g3hR76)SLMGe(6Ynu2cEVu9-cSRNeG zCzzG?QH>qv0ANrJkpP7XS=sG|)RO@3=euA2IH~%TxbPbRu2&XQq4G$G0o5_(;4yu>!{YYRivu zAx#1K@X^~&PvUK>M;6$(ZO7FV@a_$kgG9&qLBlW`IdCRAUm1%xR@R)$q36#0X$a`% z{{jf$6Q~{A&e>KZ=D*2#u)mR^<)E^_%KO|*u;J&es9Cc~gQ~F5+g6Uw@4sx6!>9?r zIyAq>dO`>UA1wv0r>xf^9eM=TPjS~9;Q=AXLVb?zxcVc2LhlwYp3EmTr?|E9=A~F71a3;zrPp}(SAAz-8;=t$~g`qLnm^jpos(C z;NAfINhV9!6*5OOV-Vw5H5n^MXlPkJA{~$Bga36C{<#*=i|UZoMQh%Z6 z>n#U{oQq!xHw{WSAkp*^p(~8IYW-&ATts^Y^^r~onw>Nqms$QAfO0yQi!}Y>A?p7% z4`VPW&BFC&D4=cUEzpo4G7RCh9-^2tF@RMnb#2ywHTE~Ipq>B?p4T_wuX~&vh3HP1 zzg9XhmmP#mN!1?~cDrZ?sL&AM>b%gZyB}C*U~!^qo_?vNSYoe1YI@0>lspmEe|I`a z<%-v-=&b4x23A)O*VQ9`Ufs<6b+f|lSw@1O=54jxn;iePN4-UwB?-~2#51%ixLKu7 z@Tq2MtC>?KG}BN5F)JY=)298nxma9^z8`1>N&QzVcM!1RsWzl5dgVEnweP7{2bCh@ z54JSX#uWWY>X35VS$!F(!qR%L*mQjiFkO|8St2sPx87_5+8*3Uqj~8i^;T75Kpz*4 zX_U)d-WWy{h7seTtwlgzw~u+v#VqD<4a3|_7eJ(E*nN0)C=9?3_lw=GpSG!Vi&!zZ z;(l>;-gek_!u@6R%?7c6Bk>R!c#>Gt1hX*Wi#f8|Xu=y-sNVs-*XEe-fyJqBX8|_^ zL`9~qnJEY~15uf1oFZalJ-6GqtvlnynILbRxbyt;nzTNkc|QcV6fhf7VJ;VW7)Nhy z1wtt4NY)WkAL;L328@0bu04QXw#By_Q{Bu>t9wnaT)zJq@X`g+mE(8cio)kaaq`r2K%(p}br=pXw(nz`DTrmiqt*$`6*{AtCn$cIDM%7pBz$dC@BlMbN; zihNT?%7_Sqjz9_)ie#EhGf=QJvp_qb1B$|2Wd)R$)J%j)8?!Zx5-nI-L}Ud^TiVjz zy%!dd&Jtgdq6=1P6QnEfT7gEQkL zOtq7e?FjXo&D@4jMew!}gIJWSDU2y=DRru3B!%7New-V`V=}a%mTd2m!%La8pHXme zkrLGqxM4*;vY?d1JbtjRa0871DKL9{;Wcq|^B6K0YF&Xm7KCIw0Am0}Il^kyA z5J8lMktE}`gn82C1S*P2el_>nUjfqR!0dWaRKwBv`$h~ixHwi*f>7k#r5;E|&+N2{gF!zL~xu}n2)QI&ZeIsiLM6zK$>HD!O{E_x~n z#8{5_)HJB?b3XB?0W7i$NPf6RBVKT<5IIRe(Jr!oWUFsAVuqZl^ zB69B>A)mdmIN-o+M6z^;{COt(9Av9OUr1XMp zuJ~Ge0)HaqeT^)0=ROF7>t~hv>SZaK1QEJ;s3O{0acycc9k*34 zI~j6;_S1YmIDGThFG`HC|6wlemh`s)XL{A;%G(Xaf}}uk$++2JOSYss@7ES|tJ_s_ zl_dPZKpetT;Nl;7OK`DvlUB$6gVQh{!EuD0`S>0D-g+XTX~>=G zXu?W}Ln=v^b~1hY)}42d5AG7bZ@bhEM~`4&s>obpIx|4{7+htT7pKn!b&5O&IInwJ z|I_+;PDL&Yb3&tgGrnwfMuNe7nLL_D{@b!u*vCmE?n@!J`-X&BlP{`ym=@}zcTOVbPd)n(+5HsJjj%JGC_y+=>i{t2-h0HFW? literal 27985 zcmeFZc{r5++dr&Sicp^{MW~Mo6#}_njcG=J|+GA--=#Aq@9*vW@$4_jwILX!c za>wzby9TqL6!u?!Z25qd^EhXp;u`co*u3GT@W;i2=k_QR|LS;{cEsefmg4sldtS)y zKD7VDp+jn<=f^}uv!V_6tL;1$<{W&!V@rbViI^U4Y9~`%I2>IYkbBcQ!o9uf+7dcG zwiey~>1D}L;O_X2X)Bye*uneT%i}A&UxU)UzySI94k+!E3OW)H2C8~-pF^sj**sqsKhFc+UdSu7@vM$M*kJdcprj~v7(7e5YaVUwnX3VgyJ1|I{Lc-WX)luB zf~F$$2_rhxXa7Vn<;VN`{1^pQ!pNoWf$|u&5aVP2gj9Yo)JmA}JyP8|L!F*x{jbYj z{ns`AE$~vHmA)MHUiYxCC$&Q4uRLE-IGwL}#u*WD`}6a=K!D86pO%ouwWnig=#vGP zH@DWXY?8#<#Ha7ocsz6%0&8?r_Qc|;PW89+2}Tg43ghoPy~tiB@1eil+gFur^Wo-X z%iXUfLmezi^;ZySI{KGzGlV)id+^pfpFSzgfZ>Wm(D%IE{VeyB&pv>{hP!=HV8Z-0 zq(`2vktKaf#iQd=%r0ODM^yc8%uIK3`&@5UyZD)F!)=xCYPsh^f?7PHEkq6XCu>e9 zAC(Hgm0RV`%T+7*E({czh@xXR=dw8AEC!W?cg>GoZhhO$rME#jZdB>h-qW`pbqnHa zU7Z8Rb22S9v`Es|a%Cm5xA%t&iwk#_tZ0=XLX6`)#wq!-gs65HJF+vr43p(HM0Fz; zm6T0jqB^N-E8*L4w%_%2j)a3G#X=x|mGdI^Z+1$uKp#D}sy9S(JhA+!AA7ZcyIGKO zO+jdoYEz&GYOon(A{eu5fqS2ErLh~0#&u~D_Ss8k8!yKExGymI>ZHZi?UMYQeTPoX z?pOIVwCWkVq@Iv4P-wV}A_RxKw?+Kk5!#(3jL|KXL2i2$dl3C#4d_(+dF2efRM+6v zveEhiD5bI{ab1^qJAH+8&0IyyC;`s zy+(CwR}?Rm&rTppmLtC1U$puMP0nkG#@4?XM|xMDQ@hev%=|qTHN0~=NUQfjR?deg5TfUv3)n%qreXql((ebsON%gw4bj% zgC?%59e`oRp;VI=y{-RBrfIRwnXj^8PcT#WDrh37$>lp5Snj5kpJ|#jlm2qW)ZbYr+;JPxnZnal08bGJJ#e^sTzHR=w{a!y)Et$puf)a88pynTaG9 zg}R^Q$S!R{Ydp@lTC>6}h47jLc0ImNV=AAm%3W2BckhZ>Y_QK8&@d6mYODzbEwNSC zFP@=KD_Fl>2+48oZQKkRN9_mohm$amYrx_;vIFL%Z#4sTs?=tpp0Cjp^qf4d`twrox4!j z9<$x6w+j}rz+C3S=Ea#*(MSb{)a;0e?Q24wTiox`M^u$*-Q9UMs!eVbg7BVGGZq@ zxv1j$CWflEJ2w=@V7Z7AqAEnjpiklDrq{pdb8z~b*lTJwN&@5No8JXv<}#eOtO!kO zSbZXB^^1Hq;{w#?Q!t@^q&JB8%)_|g{-AEzs1=_dA_rLh!QYqsJP<{ef^wq<%`)Cf zrrdg&yhfQ6_zmQ%NDXb84G!E>iSLE{&ZJN%v(x86vGEgp)@Ohf(m(stx_y}^(xKcs z-WS1azTG22w6))OO>cvfYOC!>nU~`{M)~n+#)Sa^FLpn#^Pu=Z#&<$mm1aBW^X%mZ zSX2}NK0W(F_rho8BRb!c3w@`@7OcUHBg~%(GL&8jfjMQjY$53=Cwx<266J_|lV2W# z(Cdt~|GCux?Uzn~)$05j9$lW2iJihcOnzP2gVW7%rWQk>Yt6BfFk{u#UK#G@8b>!o z)?Krf`P~!2OkIL3X$d)ZM!DG(_gyS>RbZ|O6E0B8>P?YsdAYq=A(Q#vIZEK$!_w8P zqFiW;6KToKrsM*ZgBsi=wYxB8s6@O*QU^AmD7jmL+IP);WQVfO!b@OO!I8F~MLf#z zhE$1QYET>61A4;ve9)1|V_*Fa7r-=F)x_NSLEmP7+$qmsYIbcoXzMKa@_P=GNE=1C zQ+tON8wPv}X|}yhq#GgaU9Jcc=@qrzx&f;W>KrwuIS|p5dzfT;#cq&lji-xqZNrE@ z0ppiY=D#kr4$HOIZ!lVf&|^G8KkVMt8NL8%z&a9895z#~Ie0wjZsscbI=cR0-1-qd zzSY1mN$|Tp4Loi|xw0G9uDS8H|D15*hz@rWXd)9zn2DB2}t= zkjH6VSw?SmdStN+ej6XH#RqW)>(ij0C#Emz<6I@|2khUNx3ji__0;miKl?AILf>Ym z&%=RogD|Q*HJ&%I$rtTSQ;ByeC_#EnZ%)ZF<#H3K4+&`=d9WL#NbscQizFk)o+K|d zH_ePQH5AYSdV%9YgFm>V5*d1R#$9+=O(wd2nzqehv#%hGW`Jsg6kFp+<5gJYuBxa^ zhXVeS$EAaV2^ji1c4vmjCBGbzoBnM0m9^!mc8=$6(Udy}z|R=cW&)3my1d1@M_mOr z=tlxUjB)ZsONZ!pjK+gISe6Y-k{_Xmo7|N3<2=R)9s!|yI|G$%dadO64(ME$SihD; zs=Lu5Y^prQ9@I|kZQwhaf6eweFYsZEjsW%zKQU_;CE~OBcTlGa(qTSZ*Vjuk4)RxZ zjKH&y*^98!OIA8hR<4$)&r%P4d8$=kyT<|bthrSB!06aFczTS@BRX~57kMQMx}qJq zxX^#;*M5CvG=dx>Z44x?fbU5~NIikQLp2IRFM?gC8gpL+xt6@EoM>E=XMVu&Z*OVl z8JEjyP-o6GtC)6A9Vyqa45={_a2x!fApCV?ps7bLK^NEkDzo;3YQPr)tz3)@^>_^C zuO(TlNfiyGne2Ym79`)D&t(lj&wTfDts*AwG(gzeIYU$EU+&$Sg{HP*sP-e?c~TbV ziAX*E5mk;}L@&fvBdaZ5mG9n=8u@tMUwcjq)2_;a_9w$An0H?B6JB%D8s(qg+(#FNeDB=Xal;3# zCF!i33kn>wS2B&qSch=PJoa$PfE*jXo(N$^&K9=yf;JVQRSbx{E0| zgc0I*xszZ0Cyp`vpaR{KbQ4tU0Jr>2O#@#l9}BtQh7DpTs)1~XCL6kF1(?9C&TxkX zP!h3;Ly%S0NB2k8o!we)>KmeY5_U-cB^T_u$nndohwUjl&A51Gj%`&CQi*L$=NB*I z1-H$={ytW!_m**5eO`~Gh}FBzh=#Srt|Cp;+CYEV0C%P#ujP)k-d{<_bVN;cRHdI5 z%ar9cXMoWb+0Ez2e0{q+E>nGlUksL*`gT35t?sK{{rXyg9Rn6nS=UM?n!4wG!CLg9 z5}J#=37-y7*dC6iL3!fl47aJXg-Hb=xA!IoB{`Qn-ow@P2H}=|D&8_ark*;ltSNj5 z{cBZk8N<(qG*Cgz0f3LR?ye>#*(#yu)G4 zD*l=EPn0a!GQ(-n_gVqXxu8VPrW)_R9y7k9%l16c;oj>xx$<~6`DbCErBk}RRDNA&BGo_3)_CJxV&Ae5bo+BVB`!os+22WJ=k zT8pdHyxMY=QgY;u!xy=#h%ZuqjT{s03;{oMROs@M9n@tNq+ekSVQzDpz*&P4K&*9q z1Y|A~WZccpr%%V1dB>)#+-0Ej>KU2&?&Qox5=-!>Kn zziAYfcT|=5a8gI_BA?$hfadSj54I*pPG=?wOxX6g4YMUh?x%S(Kvw62;&hOS#DuZI?0%C){XoEA}v6*fvbkq{lL=G-U%)o&xAQ&*lJe%Zu4`_>12m2y`oHeKwS zPhU<38Ju&@>p=n6xs#QVP}3>shwNB=T7ZiF{nG`D540@M|Vj+hHgZtI6YHpzeDNwGIoeTb^yB9{>eqGvB4r)_fb zO9n8&1xtCfi-E&H#eF0I&Jm`mvca=oUh1t}O%{=voNNt;VRIim+?f$f0Xbwd^8F{C zAGsK}cd!u{S9_KR^sB0T!CJo#7ONln!+_i3RDCUYb@prU%8w86H;j|^f8C{V0}XAW z;>uHL2lwANwlvk=%nfYZPSs=io!S+@F_XOfLT7n}W=8k;{6Z#nlC5+Z>pB$YVP@`Cs_>Tu=jPNZz#`VzqxdS0Ci+{wk6 z3v$BZBW+4o12zSV6}~n4<0gAmI~R?s^qgZDBhKzwD(+jpMa(#ISr%(Gs4*Yvp?!i! z4Jsn9boxE3(7X!rXsZ+m1dwI6>{(%gXxzF>z z*nM6o!{0@Kn&)u9A$4?hu6Jr>rW=;6xD~NDHb``SJc*8N?o>UEr{5B5m}ZnQLxJnF z*@7_E_wJbz-?w+K%%gd+snAW4+87psd!-+jp05l&A!s9LC$U$&O3d=9umM0tnlFpn zfSwYXL!!9bG;TiRQu%dc3ByRj7zCrtTogpiXoVHgp|0oz z#7_1UZA-hH9NU=Rx1xKQcQGrAl0ABfrxJHdZz}>}hlF(eP7*cEK@^r;unT$Ze)Tf0 zdnQfrg@i04E+Y^VI{wKXncKf_xHYUbDLg<{xMA2yyL*isA?t-W<4_f435t_aQ4&N7 zHjh4h6N2XPWpbrz?lc`dbR>DVCdUa`t)g)o4W%$9QQ%xT^C|{zccA5%arN=G{d2ro zo&yKwg`idBj5zhU{k@^vjGz8(vQ)S~1v~@;7$B9TVz2xhxQD9yev=vF?!TN6XG}cq zeiHv$JqN#6ytZSc-FwDrhc7^1X(fk0?LRWyMu|af3mUckcrq&AH=R12JnvLDwEH%l zl{o6U!%;GQFajNd<|e@*112{XweKQdKXBDm*Xa18hYyKzM`TyYZ{6C@${D1k{ zE=RRaw-RRoZJ`%LA21H?c_Cx=^*k>#N$W%gtyWx;)(noY(dRVgUbVGW7QIrs88~;6MULmHTs2p`c|w2AW!v90DYSCMcH2f3-y}QFwrzKc&%c zuxko}ch}qRBI;ajofnsV-KHqRI~NPx?((RgM#uU>2gNQdF>2hpWc6wZPsPu~#US#( zL}1JMe9>vpT48C84S&J*_30&sI%lx~8z~@i^vgtdc?`Y70}b7*k5IjXVitM(O*IFN z|BPkq5tf=YF81SGNs*e%@}fFr$r=N9%cpQ{9J=x1sP?QLYcO?^Moi!?JUkJeA6MUr zyZ{i-iHc{@?B#ZZYjg1SJ0on0=JbMW+=?N0W{ewuR1xiOk{jzwYemcGc+TYf8DxZh1=gGHmoVbUt#O9#BfsF%6*-+ndGS=O(I=$$~hbEpC2UVBF0*j5IO01 zX&=Am*jmP!j@euqjA7vOQUxC_)^8+OM9Irl^MB>(>rOu*&DiB~xM8O3RGfa18#N@(ROIY#L&F^IBvDi z*VqI%G)Err6MHUJr*_u9TNd}>D#%|*;_OP1*_wa!9n`(7%s{lc(<1xJ6?7h||Cxlc zc5usSU_kd)Plx=_3H!K|t%+Uo#7shRbjOJip5EDOEQ;X=vl;KrLGP#i3Ao)if}-JH zH4EU0-3E~3ho&46)9)BmJUg_4v@qEjdc6cnS3}xWoE4jI6!8-ERDmk@Nn+yN#n$xd z2ibzLXTuqnd9RdW!Rj82jo#gY#qnSL8_Q8sU)|eTKv`*tqgWJ~NJ`s1wiC_ix5C{P zQV@)x|M`a6<;a z0xobfc{7i1pf2a5)*spSUXtmLKT*GWaD%tynEftZNzC_H>>nxhZOY?7ngi zE&t*Oyo%)=XghB0?~pMW*tYPG8v36+ucHZ94%3}1+HTdknW7W1aMRxYZB>;9qRmtk zU+>-fr)=djci6{GMi%oElZ0t4`KAwD+3QQMU;SJJ*4vTc;g*Kjg4cg4LIeMe9;(7v z(L(_Xk=UUkV}YoZh44Rs(&ue=Rx)&FPpUKt(GqvHme5F>q=_8$8=L+XL}x`!Z(1<{ zUG(J1Pcd7+d$wwiFTf}qgiF(DCI6%AZK^6BZ`0$_UQuA^ zkugw_k%tNzNM++*hw+;1)Hd!~wP$OH^|l;_d72PcHWU^F>w+AhYT@Wy8jU-RtVY8< zEU-?gx6e}##GjgpV^w=Ez*p;htryoe*PChKvCJh4b0O;3yOIJ=Y9J^saTL&?n!?(7 zDz)QxH<-lHqKU zKL+4%Tb(minQLQPr}1$_4gpXCz=X+1I;Yz7H@8SrfWX0Au4(9BUCY}X$FgLVb5-|S zBq~l?C9D`~`h53fdG9}b>3y;}T0xnVDCx06yWOv^Pv)VW*&9vZIHtQ?G-IoCgN2{^ zX`;G8O76m5UIX$|y33l<$M~hdgc)K8fWf9-oz!2S6Lblwfp(+o{NAxcxJ$^bK=Ht( z9Cd^{0i~Cg99A2GVOCEYGXCN{fQ%RKogY1kviw3n0J}S8E7unErSQQO2qX$$W+5r3 zam6jXmc1k(cc&|*E9u(^f7yyg^p^wN>%9m1$~PIh8B8*+C;6DNW@#P#9K9!DOJVz6 zUvoIgn%i>N<+J~i%^LMscQUuNx^nzycbP}Xk5Bxtx?vMAqIF(M-^Qify1X63VQsQe zD*i5?7lE9WQ0B^9-bS{rbYXZ-g>4RH?L0+&gi2vBCaaS~tl&pO$U|k@?R7No!D17= zV}aSg66?Ci<{3&(AGwd*8!1u%eaND>4hWRl9@Y~RX%31Z%IHR)T`B9f&e>ToujzI8 z`{%B54;v(VJ5%{vo8$u# zm^_uj;<`eQ&fmn1q;_w*qJEqm$aTE`WUr~D-9cg8@QNwt*$!pr-hsrci>LE)Y|sf% z8FaoZi50bvyN=}M9I>y=eNeHJm<}kv)O-(TDtb7qd=io+ts5O$UphqIGD`dzh&(cL zC6(1C9kw}_ea3ITgjp=~bs>ggf?l7XzEToaC9>yE=K;^~vB@)e)00e_mQ@?=(=nMjdrRm}2u0K+$8yD;4c2PzU26)1Awp0EVclfpLy2L=nz-~QZUq0;)1SE-yLM&zQx=FGWc zy47cP=m}6xUL&g6+_gTsDY5>g~hWAWByS}@X$fNeuY6s|T1EP@}7Gs%GjqKkt z0FOW1BOJzaj(Dr0>95-9Ll&@2fGoM_4H#RN;km(KSluO(kuNQP+z&hy$pJ7a%MAOWP@YeNby#Ww0w~gtdSISf}qI zW;mbzw`9B$2;BcxYa97Z-F?kJo&v^+kLpj!M*rBs+{7m6tzCzlsqvh!Hf!@x0qilH zMPL1DC)E@%l|Jc4&=`!vf|zeTuU$_7V24hMl%WlX;kdf+2GDufb9e|lCFwRn28IU) z*gM?a8crIm^ex9Ux(}_J5tOEyp%sv!wn{zm35|)6ho7V7zK%}gBFzcL1YiH$=2&Jh zV8Xh_y$*ynN5Y(jce1G;5vsNcI3$(fAHUD@j3g@Xz)nwDov7sq?N9F#xZ7q=!hu?` zjN9(jo%8@lz4iO&r{J+VFU*dbyoZs{`TAa!HR)X(KVw@ysF%K2VVA#R6Datb|Jsu zv<~<7NKE`AN7YOfcS`C#3k=xR$|?n!8n6$nWHWX>jxGW44%Ae49y3XE2 zr4-|xV0i7~Fu&YFj?dwaMa)uzqa0AVT@TDHWuI%6hO+OjlkmBKi8ASr^+#&p;} zP18!^dxQh+@p@CL?&{T1ngv0Ykzb){g8nE7ZOunQ&qFAVn!rM+2~g<2q!uPr{MqR# zGFw*oB|6HkCSMYF@ge*J#x(KN$f4VWS9R!e+JuNL84mtxBI%xP*=G&02VVu37>!Rn zLRo^#hd&gObC3s6fyY+ny!3sR&H`&umX^KW3}PVSkTniG(dhp*eWDTPM?isVg`W<- zpa2;g(mWMOxQk;z+bRjuemy1mQt^`+sx|sN$eZFu-Jz73gh+(g>O6UOyXTaHe%a@6 zXnBctX~~?6s5Hgjk=AG(VCzal!K*)%%2RUSBtMu_NYk>EOR@KawaR5Q7}~|kqHR?+ zit29-$n9?+QMP5GCTC&|j3~byux6+wj~1{)o-JD02?O@k&@OxzLe!(&Jmg*CTXV2R zwgH&9J{(NVeMC$*zn%T}wG_C2d%8$OvA>PpW-0rdGseC;*q5O3bkvjqn!=^PRnZ~e zuW(ll8D{sVjbO~>DGt%L#a#wqdWkl09l`pheck+bCh!3T0T69DUZBJc^^K$h^OibZ z8sWO%O|(q`E;?S2_ybiZm>l~m3 zl%L1#U(gw~yCZCJdN_J-@(1xVo)2Aups3>!RqawkrB_}@>Qz-s?C)ADcZ3fV%1r)B z)n6``3?CNz{cW8?nn00%+#Au?F(|qa=tlJ^QX`@cWq>zUX14j#VI=L;%5>PxN-Q3w z3Yxu6XaEEpw#Vg>2DdJ-{OQ-21Q=Gs@nY%HGnD%ArL~BB_&ip9f6HOAMiJ%hl`oIH z>?B2?0H+cFxxhDmU}JS4O_YE(-$FcQQ@X-<|aHFr{Gx~ybzah3%V0G9E~b@Q6BHQY}+Z0&J?cwivnIN0efG1?hH}DqpTQTD49^V2d$PBZ;Ah;gqU=cEb#%D2{N&E(S4ECFv=6I0t{3@8x z)s{hhYw)#s>Fi}}A7tk5^a7M5YH5I31@?mKyt2WNs_)kdIe1Gys9btQfma|X?-Bhy z&8)Iq6a-k!*WJvRhl~9kIJU9abPC@#7`n%ThR57Wmk^u6zqm$Kw7e8lD5fnK%srYZuT}9ZZ0q$k;OW9kMvG-%h2?05T!XMb4*1gqC2-ZNSSv};f2o_GYJuDR2cnQQJMRLO zy`}k62d9zGPRxZF7gSL8zu2JDGu#!Yh#!Qy85#VVUuYl^0|P35ps;Ao$&reRq=mow zi-%?ug}Kq3T{;mfH@|w>Xh$sk5Rrwc@HTvW9=@>}4KPBJ&z?ytq`n0TZsz0{X$;hD zyoC_LObEZx6p)d-p2wcL&z~53X-OU6mL7MCvpa5;5f1^!--|xDvAO_oCp=O|H!PUc zp9f@c+*ED|CVQXP>1xFCa$5xXryM@HYg$u*D;kAuUWRmT%!MWBtThxs5|}H-!V;{{ zsoW&?>f?i7<$3pXUVde6u-Q|eXEA1lZ_jeKiQHeo+Y^1kgmrK*kYF*39A($ZPm-cx zKrP$^C4Ekn&Wg$3EKk_#d5gO|^P7&th61&mx%pdZy)CS}RbS?JYGv~|S6Tsd`IMaS zv(pIy%WhGmJmU9`q;1N(QPrvL@*b3~vTLKIvW`1~l-$c>83r1Gq1htcv-;iR-rMbE zZIq;@CcSHz0uuXDclNhGq|qq4y}+0CP}B!X+Oz-Y51+m`wL@Qc z?GDzUPqpq1r*Pfyfj?XgrWxDy_CZeK86hwwo6sKO>60&{x=7t4dgLc9&}A&#Ppnk7 z07OVRvX-@+Iam@$%Yp7!-tq?pZB&ecKdR%~i190i^Xg(lj)>glKpB&STFIg7*GFOx z3WcwJuF||P2axo4fmMXLg9pM5ypOMl7yc+&+YpN$HZC6+es|lHNN5HVu0>HQ!50k! zrrMg8Cjzf*6vE%5&hLdxwMSKpx2z6oMN-^xR-hz`R^wbn`O35IBo_WnbkDA4?_PHH z`|@y+lu=i&P=FZKa|?(LxQZPN4&NI{j+@FWC}r>Qu*3$wGPXPKC=eo;TdVYnNf z-wCKqK1PN6r8T~bRyNk5Zq9I5LB4Y%p{)S3f1DIPY)y50C0BURoY=Xis>SvuX3syC6fFX6Nf zBi(^BqFqa}#EDTxk)AZUGcAddzIH41UIkLOD%UoK46S;hGl`NHj4#b)%=N-94R_>V zC=91;a@!AcL;|636M~o-4oPUgrl<}*D#9MVz@VLM#6YJ3rmsIe@Oq_t3vXH)%mI}Z zaN+lNm{y(KRnM)~V2KHO)VHZ9w$NKY#Zr~H;vNlmbOPn%u$pkwa17L+BHY2wkKO9@ z8Hj5GaLE^|goWdsN3G#u?`}J;`+|Ssoj0;15vd zlj_>vp8SjVa0Cd3(c0=sfINL|`U#iz5m5LPQh`1Bj#-O?O4k4jK=2yeYWc^9q0H*S zu@YaK|BV|r);^>CkNVphD)L7UE)4q5E!S0c+<%1R!rue`t?T~3yN#+ptytnDKmuI` zBmuwZp4YW?{Cfr0}3esu(0~v zj$HM?%n-FHV9j5CWuc@buZHpIsKO$WEikeOw zRgc5i!SeKAZ3Pl~2_GLHY@*boJy70>wDTOTiN?^FnZTWV13)Vr!`8`Zjz>8(-})rj zeDlLj{mbSFjO%k;PA4}iAz{4U8{yd*9}E~`wtoYjo{OgQBL}W!Pa!(Dp_(Dny86mi zb2$i7)nF6Q|I{3}8OF`I=-W?E*{v=n8#8-QzaSIe8t$v<+kce11sI?qfihx1OuEsW?#$IxDGa;3|;NfF?WELO#n^NC#pzB zQ(&l6EISL%D%SoR;KmpU;Yy8&99erbY(Cp}(n@n`w%lL33S2qg$=zmitPE9&>l%0s zZIH5?2hs!WR-gx)v`|IQlKA-wk002`c|)ND5D#3Hn{hIpDM{7)_BN^kkjRNGwzo@f z_q;%uJd@zb?%Of3%w-5~v0ZZq8j&zBgG~D%YB2y=-lHscpgN&Sl@$xPbbO?`1D<;T z-6_jFP@ZaBWdl@$p2yYQfc#0d*5}YmXAdiLTS@uhfHY-e{z5t78=$c>B5;A#`O=i& ztuQdRp67T%%C`Zc{Us&vVV>`W$BrOhyGYhLVDmwoM(aFntvnV6kOB0S@w~CQsP)CW z@)!|sX^o(j1ieT3?;zn_g9kL#JAiVGlFSccEtG8gHA>01N71b3wezJUwZp)sIfL|!>TUO^DMV~t-wzDz zFuQNbxLDK7QdXo_dQ|zce)q^Rk+~tUxq;HPbFMADCIZ@mef)d|@Ak%-)P>tDMiODn zlMWPBn1}^p&20F9VC770$pEyU=aMKjdmU$dBPG4ftyRp*S&LdA)uc@_#|@E25{FV8 zMoji$Nry(}RwgTg=tt4{QoU99{opgmun=zj;NxV#mB!+O7gqeJSn@Kql@X48$+#|g z`(W)aaP!o>ah-_UEMaWg_b00NhYVgjnXZVY7cP6C>s@1hdv25E>-R6hZlsA1rCtX&0?|=R6gOYDGMF>|^ zzOg#Id*;i%3hSyY<^9E!Cp^jjf}}~M=*U{AUws#m=UO9?{d2at)keOEr6n_ky!3Es zFdMcdv^QHX^BR z4ngF-ONxy4$g_jlqwP6=CF%q|CpaAxr>Jyph3OCD;FZaynte#^qaLFkkn6&MfpHE| z$2B5wDv^Jampov8H)aNA&i#0@^M`au#|*y!$w+LMlTDcr5e4dki7xI&5@k2 zz_d>^o-r@e4kDS68IH+LSx)7NZ9-;pAO9LTI3hE0M5kN@wp_H+`Q7kEUoT~}l@qNI zRq2u(MGzoi6HlzU#>W* z?Llj%%zlCFb_MRGxHxtr;`rV?k}btaN&F2eX#CZt!n}cd#WsXCjUFASzx9uZ00=*a z#bq``WVC02)VcI3^*v=_30S_UE&xDD=PN7ug9QJz7q711YrXqVrSRX>z8!FPwqkaB zAM^J%|5p(2{1rjvjg{uh>hAwFCwEmbSCj}e2v5O@Tb}{&dQM5n+Q~`Ud8#Bi5J+?O zyn>dmtnv}J+j;PQNOw|{8@A*_EkM@;@=N5>#9Tl?z~nd@Yi7>duTX947vs?4z=ww? zlR@NxqK7)s^j6-60~h;edW}K%fAyq6IEV?$M@9a$C<8@i@vR%TVbu8AW#T~y-d_IFyL7#24)X#m`9A>@NGSRdwWRP zgZ_Y)cZl)x28{?nMhajr0C}#5a9PM@Kq~hItWSNu5qibn)RY&+9qSrN3qFQ8=$=|# ze7IU_t?zlz3*O~^8vdw$2uQ=NXu$q@tSq$2Z}4wsSMeu|z)Dq-F;C@=^pri{#rcHq z1fXQ#)6RlGy@nw21x->x0Uh*MwPWRh=)*S9_SkKVC3dj>tlxIT_=Tu>UwvwC(|5e5 zCpoz=323_=^!_&4%EfVI08>J|JMY43qPs9qDWJBEjav^&IDVK6fLN~888xCh-tAX; zrNCW4!k(H?58UF6+vv`4&6|0Iry7Wc39(@$FghrdWrRhR3Zkm&TT08k3zHzK_l3Ut z#{>nu>5w`gCpP;sWfSy4jrPWu8kE#L5$DRi-mJd`B>1c5?(p({__(djjkbtN_RqSa zY*Ntps@@;9(Ju)&d z$!{X9pO(NSULfrXP^|p6B(Z*$H+B4gyEtiIF{E`@>U8CM$sw%>Z5w1-&>H!uZXz0R za{>H-^0w}WG&p$+^curw0YFYz1#ayc8gu&4wwh=3j07)8eFA{eE+ye_tPpYp^lfUb zHkP9ma{(|0=-;t7R^*Al?EqfAK>AMB1+|;|Vm3>$iIQ!DC79(bAkf4W(h>vk4KPo5 z#P;pg2Y;E%@>P)tU+eQ+E3%`Ok_8JRMGEtgbACC{y$X}(2a_ETLp&U-ruuIvgII^Q zq~dEKfEZ>jo8bf0uBOJ$fI=xMr?;pPGBGP6dluX(_!I_0$0sw6Zd~*n~ zbeAF!IjUQ8@RS=+>b!dO^WO=%@Z#i%DqrMqox+4cI@EFRRYGS%!dD&Xf2S%7lUC;5 z0iUbTy!CN!6hJJEP8cizTBp_8Y)OgP|Gl%p2>6D>cS}5&C;z73reAW;>;*c7X(5sN zgbUq}Z|kyZAt?XWe87kzJ5Xm{neb`2Ar00OX_1hSm|2cT0}^N8NUEC}77&R8(E=G( zZ!evvYEJ|bv=gbX5U<;i^>l5YSgZ6?Ta(?c?+C>~t1ucsUb1S~*SPh{&WlaYDzP~| znPs^^Z+qYTDb5jm`L=h-9KOlghrq1-zW(7A^2H;DhU?VJ&=}UXlW3Rr!$b00c}dOm z?Uuu+vm+U8qs?_-NrWp@`ma%?Tzz)|9IkuGdSlxWF?U=9;3R;0JK|q5=4k21P4;PA zV;sHYE#M<;-)2##088l>AaeWYM{<6^t@9{=hWn#j74Y+ci5RrCv^b{%5AX>H42$v| zri{(>*I$lVn{Nfax3Gb4=OGJaH#vZCeuQgO;Ynfh=!z}gX9ng$L1;Nw(-FH2CS|0T_d)|-EU@@$Z|mIPi|rrgCuEjNx6V2CvpRsL1I?T7 z?|l!%=IJn7Jd$rw8-gcZ@YG@(90|dMug<#^Fk~nV^~9E7`z+3F;|7+x-@q}hb7TI$ zogpsrsp zZ;0*TLz^mQR+cC}7bpcQ^s~mJ2NJZVQ|OFwB?5AB=}1qV|o31-dcy)s>ZZ z0T{&a{xl>C1q9{zBQDeFN)B7FDc~ax_Pkzd{esBCbz^|#XqJ=z~w6C$-5iJ{0<%aVTs zu4IzjGoHcHyhu9^=oImxG)Eq-N)Rj=Pr4o0Hfp0I|GF9zz;WsUk3+ctF6>i#L_gB8 zJ`uPbm6TM3braqRF1VbsTPN)3y6u9FZHcb#s~Z1_QS|D!GuaOhvM^v-uxagaWEi8x zf7~m(FVMR!qd|`vK0xw9=3O&~jnZxq9NF&41W*59#tkAE%2foAD3Jc#{bWaW!{Akt ztPaNJBhbYv=TmPbM)9^NXePYA%p!}$@=sMqR!k>_0Y&PL+UC~9`rZrFf{+;2Sw{g2 zuw3CbT_y>v^wr68QOB`$XU?Do4!Y456Cp%+SyTtkLMls)DuGSuW2liU$Vy_yJWe;# zpsU~CG4Brw=oAKBb8luQegjGsBOVZaaZTJqQ^vn_q4?RW${vkjGC3d)sF6lI9en`p zI=>pppJLHy&1uYtZHI+3^a9RuscjPh9+;7vX9Zo>p;PldpkNi zv;8OTEnqYbPbfatI6HC9U;cos44ys09=$M7Cpgk+#5j9Lrv`8bj0EiU|AovQ*)c+H ztTVJfJ2De`!$oeXqkhCenF;tY)=gEy_fZ3L9)tqjTwAeXuss2OWyY!$YvN1FJ(N%z z@^g#S58$&Ev{C4F$S$`6w2c2Xj<}4OtZsB&?)lqE2{qak^1Y+shgmD#qMQhD`0$r( zt#CLE-B7ZqE$F_?s!1w<-mLlH)2Uw>0z>g@k#?7q_P=ULWP=wBsy8mGHv4+_Xpbp=`A+Mb}$#SnYYNIhGSG5_WLoX`#hNKu?KaNCpO&oZHATQ9J2}p{6&b!RmehZ4@=R$5VgOt$U(A zu_2EBYuHW>?Q<2We&@@9&WrCnra^)=r_TEJp#{?s`&$=eW)3|CcOYYPrV>KYBX%Tm8cqboMiYc z0;WEpMfO8WadITK_t15|IhWf3D@YQ6=kWBT{&vE%&gLMN zsLq(x3>UQPFzNOX+cY+aU_|Y6;=IFNV_evumZKn3u{zR_wmwDi7HU=>7ps!Ll3D;; zzY#?MH;cQ$D@3YP;CLZn)yeHj<+6J|j5E%#cWLmR(|C3SU=cbHpVJqG=_`S zf4%0Jf|gWgjSOJLBkVK-N?p)HeNsAP)&UI!ST<16n{6$)TXLkkE?@OV{YTA~MqTwT zdR*Y_|JB@iM>UnMYdnYy4%GsK0)h@I0s;<0ksghJg49q1fryGUDS~tY*w7Iv4hSkG zGzlG)9;7HXK$-y}5}JS^p@bG7{eGJ{bI!Ww-n-VFwPxLQ|8$vTlbyZ4?|I+%d44-J z-{3-44VZ`K#~G8goG^?sLVrz_+i$El)DuD+?=`0+&llsNEfH5A2#?Y!_pM#}Idl-f zD-vJqSO2nZ$+Shs=v0Y!+M{fH9~8^IyC!evkN0gl<@<}W!(3UvXi1EH44z;Abg)Hk z|E==63(vBB2Y3{vZdRU=Je7O>(^u_#h=_;ggd`(Fcz=?X^wmQ;y9?w_F?P-IKNr5e zkSz9o0M>`n*BY6d&RZ(Vhc|lS;`kl4n)^l03Jda`Yx0*;^gVO~rHj-@Nj+Fg6itvr zv6XClPnBGtI95%lGR78OZ7=1W3^>TAfTk)Ui)xI~2c6P}^7nef$VJaXGQA7DHseF! zRaGgvjsHO9CWA0Og(-8RWi``*vN1p~N@ ztGy2BzKybAdzaJr=NAiPLWM7j)@uz@;-m5Jh8~?7>9{dcky`g;=p+-7;V^P|zn%rb zL-0P1?EHFZV8`3rZ4QUnAI09UO?7CVHgRv|&??!F_WFnwos(J%kgxO$3dZ<^Gy02t z^rgS$60CSnN^xyMU;;^#$)?SPlBXs`U3lQD#l)erQYxeMS=hMuo*pHn;Y53?T=VK+ z_<7CLlYzntM(rORxB}pop=5>_uigrBu;o|()E;L<-ci`2Y*l%CP*%gaHp=Bu?fDYH zcOra0hMxGkO#WHIyM}!9Y6YW&sY4%)*42q9mdgrhGa5*)@ShSI9_CSMI*)8Hx8l{D zul-ynhkkpWW>0ejy~1iDdl#HAlnd?Qkw19{L9yhpMEV+L+!VIYV0_*us@e<7K2za^Bmy->V5YhY??|0{I&dU^zHWj2zu7T{SP z8MbR*dG*jJC9Ts`TZ7jebW+bSe(^eLTp{-cXvw8}d1@}1a6|aqOG1wlvCZd0g`6>N zBJNgpqQIPDmUqq_-DgV${-bYXYtJLbG`H2MXb!*)FDW~$k}JzoT#>qVg6U4O$|k*d z9Ho#ntADo_DQA?l(5z@xc<*K2{7OnnJY_{rP<&tTd7sG-!>Vy_Vl{(Y3UAS)++*Rn5YLWA^ z2NHUWYJ>Zfh3<8i1DVqA;f{IXm*?g^ysp8Rr-grAQfCMG`D%$Lm$gs|z3MElK?UGE zi*~GF;l-Wy*_Ry-CN;gbJ9o@ES18>pEC#D=-t}UcqG+!StS_R45g4qNd0|9)P{TLq zbD*z0B0{=u;qyrHl7?@F2kq>LU{gu?*WV*D4K5aJ1`xSledgLTz7-{Ad^%kSEt0$aa%p16aCWZc@OZy)t zZrd&6`>sadq;9Mqi|7KOh2sh*pL>C+xGwe8s&lD*`R~88HhXS%A}Lg9SZvgesP2!? zG<=+cgKM{vmA6cxV%-6WoC2W0^wjAOp(3`~HZdd^Y`Q(U=j!QZJ$05+MoX(r#N2=S z6sQsMKQb*FOg(;m35?iUo_#sfyAfn6+?i{hPS`|Ps5}--%&v{Bw2F&?tzxNOK8O+lbMhK%}Qwe}M2+=It2jM&i zqQxaP*SNnewlMv){D>!F0K<}}$dH`|-Y})oIK3O{6W}0^I+9X&FbzuroPbeZV#6;A zJjq=gHggmV{YEK+rK7;iZ5Ilv+Xj#U9dn6Ve)o@qKm`{J{_5GeiLKCRT9RavsQy|q z$S720=ttH;X6qejVKWQ~&=Y=5n0KtcN;i%SLn2xXFim%Pgk4M_B7)SRfSfQ!nJgF? zjvsIa9&Oo04UeA8E8b*D@9?cjAMp6ja<_e4OaXDYcnQ^Ygf_t0aX@Ova)@#e?A$I6tl{5jwKSwZR;&u6rsot}1QsQ9b+HPh_J1L`v* zSAcKUtT6AhLJq(Z5TMZ$XZg;LdsyWa*TSJeVUlXoyqfHynf{q7P@w}82KGo2Y&s8K z515u4q!&R_joCzOe7T%N&&_0*{|4xy5sBG?u=~j2ZR3v+_lPEj zj7Lm1lPZf&cGmhnox=1VPNR!2l749!&|HbAw`FYNCp|3K|5XzhM_SxPK*j- zKTxu&v)ih$Dw&02nB+IHohA?WP6C4kCRJw6#dfJrUBk8PQ<}f~rLI2Z`J12Y5-rKG zrihm_j=h;G@Z8DEjPA5=&*c`;^H+;RQPjd7}*B8Z0T+3&UT*wDdGKS zI4R5En&YfM9y#TZPK_bXNe!OpBcKS zS7zsv3Ps0wVBf6j+Cpux7K_#6%xqoKZBgP=QNwwWW_saPhQWOGO1|p}KHj;TNQC3f zlaoqBw_=aiAyIdazWOaO`n%xupVT$3-2g$sMKsMya}U(EAHW|79V9%cnH|6RuDz)GHYOCW3Y2L zls0VLBxKVEzIk`G55IuRywn|Zitzw?%bfjS7=mRDW9S)+q`Yjsxr1t&pO6R5bu~4F z5;_BgNi~8e3u^sFb$;EhY~E$xR#R1+5htrD0g|l1yKvJ9Q*XUFM9Q-&8XE!-mCeAr zwbx#s3w)fBtsi-0Bk`%GuhWsRl3n?^X5KYN?~g25N|`<@edP?Y+v`pkkf$vp1`aZD zFK5K@f-y0K5VXk%PCPZCGY+7Q($gQ;TupZcRrZc=+f|fCz=C!!l`uR(ScC6<}mM?3;rml ziWO(Ey7nb6{Rfm~y!I1Cq-xIo10U^NMM^Hawc**9BJ(T{p$);z)l6m(qipHGf9z1E zCE~8e4S;{4j;Jtxcg^m0plIKOKLjJZnHbq&k=WTb5+K9PSKufmWp0+>_Nx_w!J|5* zHVx=+(Jwucbf=oegXKdPwj$-`X2|x%il)UC(xqW~q>h%E341Vya6=3Xf%1A4}33JA>^CPRvP*C*D}hrY#k}uBf5`1w+5M z*8;EY6jFhK(%_%FtPn=cdXyh+b~w1~kkX^<`()>8p%ZpIaQaM4_2k=`!rl--iRs8^ z%?DX-Jc+~9DytGg_r0Xo=t(J-xl^1i<`jg|C3^TLzEBZ}_S$i?q-*{Dv!GB70GwKD zn-vAHHOw|T{Qx^)pqx0%mCkXrs(kKpqj0Cjm*8FEv`dQfl#(X^Cr6(R7JFdS4maX4 zBXt+=s?5z1h@jB%bVn$5J11^nDa-`v-rm-hh^cwH@mzjxW*(u6X0wD3ui3m-)0i; zP4HF(DdQ#%?Z;01U9$ zpM>duMZ^zW!tF(DijsKL(TwiEgW@naVp6*0>Je;^woLZ$iQ;OYE<27cED_Z_-g?5lA^YHplm}y(bNQ7ID@!mFdgZT zmhXXtU%RNG^HQy*A8~dOFw0vjCee_d^}HrN+>TAwiUc#<3^n%$kb1BToAtpLCNu$@ z)95=1RA#E!P^p8e7RUn;z*qevZ!c-NrNT4xXsKH~6VN8Ey+!!;E*=_u5rKG$I*!~# z?oEZZN@XelCN%-blA7B!kdO0w_duM}vdtZ`ZbfFL}X&aJIPck6EugQB0g%8x|+=4#SgOK6?`-HiC<#bq`- zuI8UA90m*iV891cM2L}=AT2H0s28@BBWp|t`1igIR`-)%+AT4LF)gC;012@&Bj9qI zUv%BgTx{>V2q6uOaQpmNbCas<@r$uB*FqMFWD)5T6Ig}qD(9=(z~1$B6xb-BNTjW?OQn!BEHQ~)ZkpzD*zTjH%15# zj%*cYG;yN|GkzSvr!<^RIpW?!!{6YmfeccRud2ma;^GU}ljglf2bHDnR@>YfW>Q-* zL|x<$77RWB`2_Hfl1=-y0|X*MB0-UjPRfd)s$a8lr&!~YP4%%V`rZQZ zKZ(&Cl2*_1<8GXREVQw4_RBXdNjQk|E&9k7pqfZXQA`#uHvUDC7L@=xSl78fpKRAC z$6Cl^;q{26}r?So5MgqHeZ!+BTF7DSnLepaP{r3yTp^D&%p&yxqh84TuFG{i zXY|zbiQQkp*Lt&cwcK#nDtckk2w<&PYxRR(9$R?-uZ^<*&DQ$2J_6zYE9fXT5BPA7 zHuA%YwnNLdRVoy$YX-{*$R)rJLyszmy(P9@=Rdv(+55plV)Y|*nhvN6MuL#djjaa| z@W39<5Tqpk1b2njw_ZYcSOf0Cg|TK`@VEeYH295a zr1>mB->!X=y?z+v8aM{994{ZpbY$=|*31iN!;wYs^aLoK{v6Nq7Gl-?5paR2+x@x8 z{K=O5^WXmlJh|QvOdUU0dGyL`fa<*ol!i^f!Py9rmr&+Nu>8-a9drB!0gAx$3>JXF zC@LI))QHd&(n5DZox2H&KkKW{*5(MkTh`Ngc|-bdOg1%!+J*1sg{iwh$5qVSHkxM? z519v|;K+a!RW#X*Q@L%V^Rbc(aCD6pnrEoZOh(lS-F+pf($JQkf#Naf zfdX!#FvXqV8^;QGyzYrRuUO*+OM2W2ph*VA=L#Ra!U}I?erIn^C7~w?GjPv9AJu%jemuIV>DvP(A{gB|%{d#w;CQGxl=G(8#L`V!iqF7Y@ZROG zM&~)RNt};h8)d3x)oVqpd5)VEg^Mq#6OlKmP$!l2gDEfuv-ET%cEbABAZ=0)Op-us-!a zmDK;kj@$o1JC6q@PT9x^!HNFB&1V)|4Yk>gNhuj=>ZxRDZ9L7+0u4PNoJg)w%SQE) zp|3D!5up8pCjx>2^frJu$IZU}WkULm0i>ZOP~ zI6rD6%f8amEN_RfkvDnyq0Ct#1Yw#k2ng*=kZ2V3r?-p{zhx}mF1^~+>%8Pha9^0d zlK53@U57p8K+NTSnI5Z*Zrjfq*6m0QJL-wv0CgTjlLOSD=*j4n6wGFfy=!70KMZ~l z{Jn5{0e@vx%J=o2P0)=Qn`=48<3|`Z43v+lEBE1Mm7%5 z)c|uy69k^9?$PN=2g_?CIG0W7sOVu(pmwDzupkfPBRMDwLBf>EG(v!K0G>$5){SO` zp(vjsiwh|x*Fhq%Su~_kNcu$I260#q;wQ&+164d9$rnkZ%=qUW zXbh!}eVS5@p?9@t`A@x1;JkPYoN~lo=m!*o9^6w@-#%BzTxA*H^AY9oxVN4_`iI}M z``TwNRY&hbh#p2Jl0lp&kcxx|43X>eXJrO~Al3;5tr~{=XkeGJ!FIK>Jus_dTc?g! z)gRyyV&2=ay{I6BkTrr0+7xMFWE8w@M6@yz40|m}%vwf%_J^!-iFg$kTm$F?)&n;O zcrD-YyL#-wlG`?T(5ZjGGyl4L+j%nuS8KNTZehCO zU28AiLbn@m$POi0387sXL>O#&Lbj3@zTF^vj<=ru-~&;9WaIGRW$j|K3xpZc)My7O z)WUQHpkpwR%kLycq14xIvAinC2uJ`o#MY|yr^1Z80r^$`rkT*+QyKsD(*?f4zmHa| c0~fjc@gtq-osmDLKpOn4k;UnXQx|Xj2X4j2=>Px# diff --git a/umn/source/_static/images/en-us_image_0211560998.png b/umn/source/_static/images/en-us_image_0211560998.png index 413c588c5dc4b4e8326e59adfbde431e5f5f0ab7..ea33dfe086e2b974d6544265bc08ccf63a1028ae 100644 GIT binary patch literal 22331 zcmeFZ3s95S+BS^sw(gBpcfYELoUB$Uh*CrdCzEZhTBLx2fSeL*fRsas7y|@I((1Oh z3Istx2#~5AR3IsYb0AT>O+W~#oI(f?Yk&wzh#@D)@qdDQfA8M^yfg3o-|U(9fB*S2 z<2XEdo~*U*wbs3^`?|0D`RR1X$xYTft*xxAHU)n5Wtf%K`w3Q7?l5Ryac@-7o9?cAbLNvEFU@nbpgEf54n!-+%I?81jdhub#2K zeAU--=ftH?d@nV9e&^c6z3{E3qSKP!ZgmFk=d3^OUs{-U5`40Sb1bGMN*y~TSLA-c zj?0x%J++g1>~~I@7<8e>{9SZGnklk8q+kW2l zzLnLvpRRmpWp#e9O-xbm+h-d|u^s6L=9}4$f*zAj!ftY(kqJ6Lp#h4&%`Z*U*|C}u zycgR*6zGJPmqgEPU{jiD@kD*HU3t*_S!Kg)4D7FpiaA8Jct^S96M;5{+?uY%HIHb)dxCmpd6zw9e|6 zS(Z&guhpZ<_CNb_nzcxh@|R;ETkPY=2U9@;=J@w3C_CZQ`yiLfDN7$2f6fV zdKHa!^VQ9Nyld=-x_^jI;eMl6Hun8Y&d<+wJt|* z_?kY$EJkK6O<}*yuRygltVoo>ha$;J2D$-^J1_^?GD(G3p|U>WnQE19(A4G} zX8g4;CdZW3X_EE)FkRaM+diE7a$@Q5@xibbW~DfWO~Lq+gwfnuRBQ#BndB)n43S9Y z`90)m1J^9JDeU-VmMb(Z%^!hihrO|Rw+=y}S9=_zI8+lIGG%Bos|i9=zB|DfOLAJB zDr+ZVJ7S!>lFa=?e2UVOX&k#w5k44()dvj4;dP)=GsN2}&WWfB-7Y!75dJpa&gV!Q z|FVeF2V=KoJ5T3jiB@o%and(>orkUfgMBS%0AKu`z9PFM-Ts@ccqzI_~fTLeK}>nzU5RxPH9dc0J#8khW_; z&6Ql-wy|X>$2WQ#Bo(@c`tcJ^`>CVeiy&^`bf@N7jqojZ@W#!OLEUJ(A{%$mxG!L_ zC$(~DW!7?Kjp8r? zD>XbtPg$+LEQ-`CLs!^@7i7XDRDgcJ!tUim)Y(Hxc++nXbJK=vgJu=M01+UAo}W}3 z`^y+D4m8%IW?jbpbUe*{LHIf$x3G*H@uk{V?%KGR9mr|3ZZR)igYoz2L;T6QAMOu% zLdqy`o_IvuD^W*R1VJ)qS1?nHBUHi7lT0R(OvXY*#w`$iD#@%snAOLW3-AIRc6>Eq zvk22<5_OHWHE1wXDPa1pilf!vbn0yjK-`o!t-yw@qE1TKq z7b16t;-nxGv-ynZEJ=0KFNCl~gSU#q0SgnO^c|2UwL1$=hzfF4cH&b7M+BfcVVc&? zjCX8q_{!&zY>;A#kN>s1SuSo3y?1fgO9KC!4>ewCudT{Vhkq2#@|9QoDm5f!HVODK z{_?KTp3*R?crbf}R{;94%cX%d_bG^L+}Ap(wqt`seJYMA~4zM&0!#i+j!%Ju1*-q<}F7d{0HJ1C=DkG)=;m!iOlSLZ@DilaX({K1oFH z)EDZ5kYr94S;UjHT@FrC`f@Nn3q7YC-1WYoGuP z%*$LYiC^v)B8Sjdmq0^zcG86x<)@}+EoJhC?1ED7A5 zuM!N$>=aM2k4V~}e&fRvIDPa` zEsPukYd%a&Ur6#w0;TVjjkp`xz=(fXvW%F=dF3;d{a}J!#p&f@`zc+8`up794=ZiC zXmZzaT|I2lL?W2gSygabww#5-&Cn#{0xjA#nS>OzEu_p~2Ep^vZjJG!AWj8J5NUk4 z3dzo)d31&3;xM*=tCw^hu5T@`%97Jl;{Y(@x;~ouNmZ@R85;l$fyBqZUoEXT#>}8x zfu9w(TrPnGF?|6?z1O+mR=$#ob+3h$Wf-LNKC{%AU07cZ46kC_Ex=r)+T2cywR8G>D`M zC8srrh;XSVS&_ZU=hB?eqwEFVdAAQU9jJ1NvQd$we-X%Q($xgZc@ZR)9Tg6#4=7al z;5NUcM#=018p*Ie6IY2}q8CDjveE=xuN+}K?-O0#V_{n5T@Hv#!zG8Pbt+Llk}awU zE$}aV|H)YEsiWJCCqVt1Ql`&ocYl@yqVmV*vVGHKuFhy#WxB8{f}T-1&MZv%ISo1`G8P;!OL$$4LE76nqrKb`r8O;C zghFt25*x9MSr_*puE7SDr^p__KZa2-l+|zZ92T*c^coqG6i1EgI0i*oS%F^Oap}9X zr~JKnG+95TDCKAr4-TeWYNTyVD3|DGw2bSz#8~Uzt$Ek?flS;Z+Nnp>U$Gk>D>bl@ z=#4FvXdP#Kb;U11>N?mWQ?Q+crmroNbzKaE2wnH`%zB~u70dGyy8McpFyOeR_DwlX zKdO!R=r+E0*QxJS%|x8^Dd>We;nju?8T0Km_cSt(n>KLHya+QkT-S+rK#U_0Bjvr+ zN<_cLb*Z=#7KVoTkxS-{K}=Q97G0w7c*C>%gpDH|b1cXs6yg+0IRPgkx$ZiUU+=jE zfinA%`7`(+D|V7`*>I5k!nZ&izuehgA3PtEV(31I$$uiGtL!%Z?F{Ryk0O**G4OeAKob5Y8&z6*^DrK_u&3(M>&tQ1MOR_7s^I8HH`H;^~4T}$oi`&Jh*@m=PJCvV)^ zns~?cJnOzQ=x3MG z4*FZdRF3_aW~jNUMS-f(C)vLwsL+hh& zD4n}PdsYYGZbG{EEeGhqtNoz|w}X>QUO#5-$4%vf@O!+$Fx?Mn zm028k9{$!p+3h(cGakj$bI(5YtUwC2E4M@kwjDNR$OK}$mKj7Den=F+N*&oK>QfZ| zN89P2vhVLBN@9P>AlxX@{otb4li!bA=P4mfUU3_)XGIsU<|A90%>5VKpQL~zzMk6= z@z<)u@{}^8vBy2k{SUj3pO}7yh-FMKTszvImwR+fp9r(Qkrov8)t4HXUS7mu4FrVH zjtEZp&V(H;!Kvk#Icz&`igo~A2WuMuqOM!WvGm(W4A8g5Y_E`Q=g+YFCg|^`u-25| z0V;6;vmk+P*h(Y~=W^jOY@6GyFZKxzr8DOI9_?yi;|ytX_`wBb1AKhbC5`%uTaJFl zJCj4#?8R)hLAw265o_JNH53Pnl7-zJRR^s*L%7eo`O8lCN4t~938QSu^D(eMvhu(_ zHR@=I*z1JQ(F=d$fgx(MWWv@{d<#b(a%N9;?6RZAR&fI@^Oe#)Y~IX|xb@zfLngPk zt*kFD9q3w>o7epbU^~*bCitIS*UIgH6Q5PAk2aUOl;iw?W2Cb19sRJzRNVQj58yf? z@BcF|@&A=CqUv_hbG1wJKRH)h&J4-D9)N9OAJAxZ5-O@1uUnAawOKG3^&|utmx%^W z2+;u|>!v%S^GJH3a4x_pSK6EvPiuuVseA|80K*L}z1*7MwA$y-zh~V7l~%S{bqB8J zi--`0G5XSwua<#yvY0Mg!yXJubI1LxLvs3V1Tc2Kpd%JfaQuFsFs>$-Rf&kk{QZo2$RTBS%Duv?kE z_^7^JV15bFo!l~+kXvv@Ftl7?2hdP011^0tIjJ=4LM>Jo7SLE{ zT?W0aLPq$EnI@y2e_{QTtIy+!KvKM{g-RgZ#zh#$njiZtTszh7>=jac|B=m!Gcw5p zAGZFi13cLzQl!Fo?EN@FTBW_SPO)405NFJwoSB?+2HI^tSieg@-r-H!g8P=X`n}Uc z8vf07Z<3Sg_pD+zzZ91|a`yML!Wa3%q5S73@ft{wRIg{m%W}?)6$q38XgXRvl$l%Y zuAbhDe)!%m+&#K%nuuF?hvCx6N-foR*g1=DVQXGJzQ4cJV%Jy8aZ6-3yp~SllrdUY z@pFn0050LfF+5pYjBYD=(VcmN~6jbAogq|%hoLh{ROf~ zm86_4A<3f-$v-914(LCCD-P}4csB)h{P>NZT){bll1cTIefr`6vXLI8_7UW+E0NI% z*V6*(ReXzgq!vc&yYrhHb`5Ca&6}g+OWue_w2227qLhEIvN||4w=H3HpHxgRRYAfn zuBZgn&w8DBc>CvP)}J&r9>k@>3L*rhlgA6A2o=1W)qIU>O3wG;$efIk#N4)3mGm0yv% z&-A$OwtSZRX#3We|7iJ4y=e?Qx^L|&$S*al=qJm?zJj5OtqE%vFFp9LZ`}+y7OhO4 z2F1?Z;Q(Z9=p9v{kbigW`Q530cdtm_ycy&4=4uOL4>Cw=or(rV%+CPaRPmLcZ36f(;po{jr`JDs2F`j} z2Z$eKT=o$q8C2AEuM;eZU{OGhrdJ%}Qm(j(M)P#`#e>vB?Z*&BiNIs=u5YBS?k`h_ z&Bh8<=4!b|ahhD1wiknY%wepL<{S{0cnr_itPTxzw7bVcJ_0^nw$UY5q&~DOjn=na zw_X}CUxlp9$hecdjpeTPkN*aHNF~Ulfq(>*(5}; zb&F`UAO}YeTL3M=Gm5_0!yN%Z8g}#*5O7yZ#1V(jo+-xjpK~suKvJ?9ml)_w&6O`*4Gc9jOdsr&ki; zpk-Nr{DGzBfN;CQvNI$+^2s))!g3#;KSho{>g@=h0&PzaH4jsCY7_1C1-Bn`D{!*w zY1WlS^0D><+Y%N8V*W+|F$IJ`$Z6y%7_e_akMQ()l6Ro`5q1>4W=H;-9RW{wg3&(5 z>b3C-0xd_JKP#-gl9tBXSkekW%p(-ITcVq{tH^%Y&?+oCu+3+T+OAC<6%^of8A?xX zYNZ0ZSCGVRI?Ie#%Gkjyv8CsiXltwE(jLh6gsyUKFm9W5@56rO)F^_Wn@6Y}ZeE3^ zoh7@T)2wFowH%P?rd)gDL#w#bPFw2GgULif6{@fVXJMuZ5avw1%@@6}Dj28D+0srz zPb=R`SgUkk|1V$+w@Bq)E`5dJpvA6RasdFU>vEuk3efi5V_9ySAAj2?N{NM^B~L=x zI|ZB@cRqzjkxp&1vvn3F#&X(pi9M61mqe4aJrqJz*jr+nI@VXZ0CXd4)gX3K+39ER z_Wt>C7tcOPd>2U*MIJgaS$SB_AQkB$9}*3`QJTJUt&VA^&v~^A9cM1n*Z9;D>7D!?FX z7iUiZOZLCGHNM;e>t5CUTL=TdP37u=&42RbNs^!gMRuk3Y9`y=E02#4HBcFT@v-y^ z(;1HA4ynH^ox6(Ju;Fac94ALU(raco~EpOMi!j`;M7>Z?hT22)%C6fAbR(FG4+$b)OCBMkbM%c> zd-W<#D%tBdf;ON0J+5F3G1a*Q0G37Vtj~!=UQVCiPRRZdd_W|u!UIDHwpG96M7-l2gc?%V97UC})dBF)49WZVsvPM3*B@1uX zGoUXhZNTY0X!3!i25Z~eQbRB_ef*`yrnvSZkwPU1^v~udRvS|>QnEs+lGb@k|Ci-)T39yx7hqh zaDBQk+qGd)KpL`k;XgH(wm-*&>^B>FfS+!6m)4Y=H?i6{)mRF z#IbrF9n77+!`BV$e1wAP5kZr)UL0i(5+VF@P{+$)c?7YR;Frg;GNHJp6NSC1@)!Lf zw9FHhY338CbLs|eRT$a9)?GGi5;>Vyj*)EuZ00pSyt5pq`Ldme9HAVdJc>TLeXLq? z{Agz5O#bSt>NZHSdDsq}S8}J7o4x8=f;VoONbCV875e&rAnxE!Mz@3t`Q4A&BAq%{ z&sPJ7L3nCH+{Ye*?R4;<=e(4aSQ$>v5=IgAtN8$@!|z$KGwQ0w!8n8@J*oYNBuPec z!Tc)4ZVZgaYcRh4ny+=E`k(FCH%sQxBfy5)FVfkO#cd6|!-8cW4$(_k znYS~?5V!F(uPP7EOjs-IXYSQ=5ao*Od}310evHkDxW?p%{i7Rl-eAf z&Gro;gy*86)e1EPIEoH7kr+v(^DxYrltEnl?{W9EZEs(l1$VsLCZyn z2EWWUTP{0i8cA-WC6F0342Z$F#cN__-r`XiKfNh;00~&8z52zwZ6@6$$sxB@HS?p& zfp@9!jwoN;?{Asu7{XXR^;)0AcP4*4HHw;C%_~q)Ova2duPD&35BNFx_6S~X?a=iR zUoHk%-?07a$)&}p)cI7He)1|laD1T3Kg%&~pfh@-2=RMo`hA^Nm@8^${Ln%jN46&p zjU5y$9(k(1w@dH|>c?7`=B1WrhYpCGxl1G6P;81k6q%lxgdS?wIbVsdra$eqN5uO# zhYB;MRbCNEg59YNMTIW-1uwT z`rCF&>9}Z+!euIGZZe(UBX~V>`i;t~j1fe><56g{KvJKBzx@R_K2$scSOG>T*xv?j zp+adU{v9y}-qSz`1GUG?g=2_UY15_lRO<7GZ7&w8#N9H$<&D$v>^qF4MNAX71sv%p zSNiTuE)i*jxwh!IjmX3*p{#vs&S&d0>%Bs{ zog|cSKYq>3^=xE74LDHcmz(4n&gPZL~3I<&bRB{)J&~DA;@)HYkOB>oP-?g-;& zc091D7aZAChMOCjLp6ql%A?-|R^ zY1Cfja2_LoqF`s@1S1K3A$yD_Gbc)Hy9}&!ujBDHp7p@}mQ%G#Dq%usY2h%X;?!G+%%%(W6=ifN^ z`q-5Fl>v+cFJ1-vkXWqlCQDkE4w3l<><6WGr0!hMxs=8ce+TH zcH_;f_H@S9g#G?p$U^5s*giKpMUq~y1tY-_c*yDaYj%+!jx#-7lI|q#4IIM4t`S~c z>`Nc+_Lq0W0&PunyFu zq2&9KPjSOGL%UO*omOaVZTrU^#NSKWKg#H$_4j7p50X)qbp|*p7C7hmc{*4P3+H zGZtiCSn_P|`mc|Keskxw#2NqE*=cK_erv3LdqPBhEe<)LaPR)?9gd$~i_Kh$Ohe(J zNQSAvUm$iV#Lp?o!t@5z-@;nQKp{p!la`@XY%o6F74!*cNfJoUfU%^)C$$`@fHo*2 ztO^LZbRz;kPYyUNH#GVZg++7Nf~aff0mmcKsN|v>mPkI1w-)Sg-RE*Y>_-*bPEG}F$7r$q^i$Fd_X7YG_~EWS4Mz#1>K z+4n!^rYxalVIg#Sik>C!RGXG&dg(HMyYRK)Bm{2=F9JjrS>9B82P9MG7d-5YL%`RT z#*d8)=l>o--Wurpe?oTsSG*XIF|r6Lga0kA$NuZ18jS#jDl9DY?m!8_5zt&&8xrPo zv$4t|!|ZO)eCHmmI(;on8mHevvXNzSAPg5UE^d$Zk3LqPxE7gOP1yt1m?N92$FRCf zwCJqHr`_*=M>=*i)6JZ)3dEY(Q34=OoS}TS(LD`FBr~xZJ_6K{KAjWQVq6uI$x8!w zZT;bHGE%=LKUSY>2D2-&+Us%iw#g;nN^bDEEI6rTzDffp0bmNJToDmbgu-F4i*JWt zq_EmUuOy|t1Ex{mOjmshS8-eKa`ZJ_8q;2hs!LogSdthm35M(A7adUEkr1}RZ=3;! zLiSl*24X7OsJKJUJ)>^dC6+QBX_h;Qj-eMRrKeZ!{M{UjwScHll7nh)Ti$c$7f z-5>>3*!qKR1);f`jGmb5B2HQjF8%904}mH}^2@wM9(tfJvId3K&j8?Q%D7tWt-eVg=rodR zGz^>}07#wGI}Pp;=-ka2_93V|hfp}s5ei+k0IEzJcWx=v6{H24)11VSB4?W7LO^J$ z#({^OmMJHb9PfaKh7~U;U8Slf56?1_;~OKov6joj<3*Lg811xkSU~D$b$V+8n+2;( z?D^!!c&4h1wZMEbkQO^y@Kygg%%0zfRkJ_b!*>ytG2P!M5qP-iIUl24WBjG5=5sIF z8=u-|RmQR!m3IpuGap{}(ich?OPLF)yF}XelHLt^{x`iC(4h`$^2wrve4zE_cqG*; zUc?<=$o>DQ00R@GTOZTcHxIl;Q6BQ;3wZ|Hu`f%>eJs#i6wwZWiXQ% zU7gwyDs1>=iRGKmK46v>{={%B zEsVii@Q?@ljRbA)uOF%Juoagzv#z)i^=L~cVs*#Kuu2=u)kB4z;mjww z=9vy6StQr};5LjRD-lZpymT@nDiH`+HznALZ^Orw;0{Gy7SI0BiTU_cpW#e$YF1U1 z*q~j=9UG4?^HqIu@KN)-wuhN!+t-~lx#olgWg8hr9$8sEk_(y3AZ)e*R$mbFjq)bC zr}+)@?#UpL3iir5kiH19qq1Hw@aS9KKnzw(d=A70ld_R44yFv;6)lzQO=1`3Pj`qF z*`iAGFKm>7g-Rn7>XYC@LoTu*^fdLVveFF3@#3=RgRFseU1h8vl<&pcVgBan1jFXE zvGW#uegf5_VA1D)mhVyb=my!}CE-l`|Mv zmdM0lobXLIhqt8jrgR>Mn2r3Md)N!yCVp0&7Sr)5AcxD3ZP}M|>#)D2xngXD8Jt-I zGe(_YW@RxvdT%9wGjtDKIlmVuR|E+TG3XN~(e4W<&P*ehp8g0ne@8Uh5svHKhcU#X4v=ft_6)5QOkuMWCrUFU#5(`zDlVpY~ z28w~)HR=M-XP?#e-_KjOSo|jX9W@tpv;=UH0H=p=z0u@9^sB`oihx@>g!tUtl461` zx1uIg_bfU=Hv2(V`@i~HAidR@{@)`>Dh4Dc#^)sMyM&1&_WzI|{ZF}63y-U17^^t@ zsXZ-SIKAdkF?iu$4paw+-tI1d-_4L1Yq|TW_QC9}79jJ{8U?)CE@>Rj^8QD52k=^} zI?z(ujDCi_c9wj$mZNERQf?s=@XB(oVfZp^E|!q9CVi3~dG}l#-jW0g*_P0IE=Q(i zbYr=>Gqk96weM(P-@!Fd7k#v}rtj28cP>1x=5-)k#=~0G$cWpV$%vzxpF;7M=uI7= zm!yj&qj8U6NZ8_txGVJg&(_#z>y{?|wT0*g09dNCs&i845J2!lq`4mt4I?&K#iT@C zi;xXWKvu5Gr%h7gh%-Fm`#Wq*rD{OaOelz#y+anvcfiued0PT5cX(qhu!>JSo{V@o zDmb7X2mn$?q3uzmX6{7f+U@gefHw%x9JDuBKh}NxG$FF+KwE>%xT6>5s0H_SF6ti> zbZSkYIVoiAfio_d}g<-3|a3SV?(>6-6Zb{*hwa);#Z4dEGzbOx1hFVIQ zV!+-#Rc1lqp8Na4R4PF8=id6*7`Q$f6}A4HOk&=A&b^P7iIYmX8iUlBx_Qi*yS9F2 zXWu2nDp`q_mh2 zqx{>)p=s&U-EF~+MDwUK`jN4JqkGTA9{qf z&Z_5>B%Q1t8%vF~6{Clr7?E6-l6fYRf^?qv09!wSJx%Q@PuVYMDl6e=sDk|XkIikOMn-iq)ePHc(96Qb?9#qnU--PlRs8J0Ibn5VUdu$w*Ecqn#;`+N7q8u5r~ zs-N-Z9p-5o*+Z$9U#{m@NPO6D*wy?j2WQ&`O0du-D$#*A#l0Y8B=cb89Wb%-#RMYy zW_j%V@L1{;jND4%WJ$?veSX>Mxcn{YTVb0gEmYWewU$dCVaSuL1I@-y2Qs3~Bo^rUYWHhHBx z3I7t5+1m_IIy-zLt4^xW3(7uIJkx%$5_P3Ewa3C{$H-|*#qp8`0C0`)A_-G!84W%( zy8@(>x$f7>pgGC@=0VzkX%OYD-N8#PL*fPvgXcsZo2RAS(o`~|3rdradClX&6bzI- z6;Owa7sbH%P*ABC6h&%o2xiGZJENm)>8OVGHlz$wDH>uOOeU{ZB{~p!5Uyt=o|2sD zsGqDy_13`!j9y2v(^rW{5@O@2jOtUus8p1pvTw&22rl070H|KVavqF_!LBoc zD>Dmh_}TV44_u%C5eDmn;F+u(m10YsXYd% z(owjf-q(>>eMNfiz|_>2<5xmjvPYQsX3ct-o_2&N;rRH^tgzlJpJ>=}&6FL;>T6Dd zj|C(-eNfI@8Mrq;sZWd@Y8XNo>dUct;WMK&-X)k`)r83y?rz{Al5qvges!|617qiC z87)o1Q7L*42@s<`MoT1ziL|Cd^sxO2Uut(q;=;;xX@D4*?>K=%r$wqe!6z>PKn4-p z)X+KrIBjZ{Q^R<#mmc?io3}nANtP--s4v4)YjF;c<-BC%<%JSa0lZLjoOPEY*#}UJWth(y zq1xyubfb#X zPaA?YJfAjqfsWJzyDFhjo<>VYK-4*~gff~M&d22E6f_{si5~ik#EQ_#Sw;4U&x?w4 zy6@!hJB_so-q-nl2aItnEblI_pTbjr3Xs=4T0KRyGO2DW@}_Yg&N!prkZp}vNAZML zCM!0@P88?#+;2!Zc#m?j@Fl9W=vlk{RMEvhoFbR&|)|dHFQv~-xT@?ba6g_QLblX81Rm_GH8U%gS_B) z@*0=YTcftK0=teAPP z1+xDGMO$plMm{XHRomZ*ty=Va3~|z`G5o~JhF=Qz=sn8@kFX&FenZ&V3iqb5G}xr} z;o#6WfUl78nk53ZH)dL=1da@yh5^m&UkQ@6;1=3!#UwHfHQ3G1PG(B9I!q*Q$xXB1 zPr26zID#1eAW1?VPOq$0mx&=p>edhzNoBBHQ^n@3mm$LT9hk?{_HUtW8N%I{-t z67tYC5=*G;2 zG9-q9ozW+PafU&2o#FMv)Qj5zN7FWim@c5k&jNv)DZ?Sc+%tcM{X*GO2%MEMjesJh zBt2mdySyq@r-pgQL&zDuY8-Y-m`n3L;9xGQ66a|a1XRV>GOBtQ^1elpAKxxU5PJ11 zYF(r`t%2>qs1r389~#<^I|z3GvNc)!8MYfuDTU|jQ)WDkE2+L*g;qw&6p14VoUC|u zpI4)ahFj2&QSs`hG4?PszVV&I3+>IcMJFTk*)hZH{kF~m)cqXe&;>F>~TY_$)WT2+wxsZ2?;>)_d^KmqC}r%$9W9_=5*Rg}kV%U}&A+IJ7#EQAoR5>H7?1_jvtp#N=TKP+jA?(Na>PgM zH{-*bp%QIu;r8P0ZUB4b9Y9DL?0Cb05-+DwUwi=xU{K+igO%d6g1Y!B!NbCM-nW%O zWQh+EA3x%bu67U=S(F`A^ViI!Z^XMk!^Q3W@;vQD0TM2DerpMs$jcw1B3S-t*TTV_iWK~sZNJMp6W zGs@B|=k*34&Hn-RSC!qISEHKsqDy@BXTrB} zh^XZ0_=xDML7+or2bg&*JCfv8cN2YTM?PpnQ~^c`6dnA+^6Omyy#OUoH?77Xkg)68 z1x)QO|Jt7N<nbaaBhwAiIx3u;MKoo_ zLA5=m=nbH;;MlCxDf*mWyqfS?=7`%WVV}-4cmP1Qafon8u-Yf3-IOW{`P1gfx$aw|-4q5r7MC%qH7KQwIEyl*q zMwg)edj;xubN)#Ob+a#Hxwalhgf_ zx&WhUWQ~B<8!S?(HI;jSW&*xNBi{qJ$fQVmt=tLqeZx_pfGn=&WOxy7c8@$^OIKIu zN1EjUcPG?0o5TnDSQlJHve@&9m0K@bAEN9A2>pw<{zb%|X}7TjB+OIl+on!By8gC| zjH!0!Yk?}I5xLI0NjC;UTK9}}y}9D1AD$n8nU*z(-VnG@g*yhp)4Dhn= zdVVYl>FwUz%Fh$okvK53+8z(y12OX*uNgv)c^K^+Zxz>$9T(oi~WZ%#sVlnZWx7L-Nw|7v&qKWWqX z0j3rIeo>m>6OaggwDby4JDR={o;}z`awUIY89~q>NKR&j6XA3|0C8kNYm@gcvUKvjT{pLelMS=ZPKK@vHNoZ|8msGf z1$`3<(pAnRZci99)s{ggP4o*uyt29-X-En_!%FOnF+SM<{)LkaaR!*YC&#;cuDF>Q z6ZMc@e!%K%5+KL7^m>4?zRQEWEuky<1#?3rfwCjH1jTraG;3Kp(V~B0f6IVd-)`X# zwXaSIY=uP`e8$Ri_jGj3J1ansmZF~FO=97y=W}3U+eNW0fCN<||9&om@u#4$yJ`rm zQDcfzq#dO18d#y5gbBccb6s0-2eqNw-A|`ag=f#rGi!E9j_oS!F!I|=fZ&}0F4 z=p0ZhbJ82dSe@6bCiepGHUa8H-W(HjY1q7%$>~ezO=~qcUO!pVaA?VR)AePbjPb|> zVY@F2*moXPQH9$7UFA8K1eDBL*;iXU81s*lN!I~I`?^xQ6^myOyS~UdnhE9g{!wDt zw(G-K{-G}cM%5ySef2h=;)*n!Jeh|7-KLN{$gytu%43W<_QIsoq$TIF`m+~eEz-AP zajZ}`u0h;rn#3empvM5mM*Q~!9B3HUVA3)PdYX+tkd2G@bIrh&$kdd0Cm`-WfV+9;g3C|&BR45&RB*(n zbBMx{FWiU?-%8d;LqZ_wau5mK(rRqMX=vnW3OyR|VVG$vD( z%wTt=grL!6<<6UTbw4Z|79Nhs7~9xXagtE2y59hiuZOA^)<js(_j;efH^xg4KGTOBU*Cb69e&VZisPT38)2T34Q#s1 zz`baP+55C7_h zTXspFhd9=s^9w{}0VRrp$9*>!X$`w1$j70q(?zm_36Ib3-1yL*4sq1(#TiU_kws%W zfDUX+nI6^*6sN9yza{THX@pXO8~WJlyN0=ctsmk5HJk71hq@j)ZETq;(f~AfwU~6Z z`%G~2oh#x7m~rvy>(9czi})zB`ik57$jQBQ>z05SHBjhShz6G2JXnnRXnk~HIjR<5 z04o{p>;@D!B|n9?vE>c?EHiB&&QqM$kV$WcoPrr%+jRIgb*HZxet+L`@C4Uv@F&!r zvlLkgi|0P@xpvwd{SN+`K=zo9*9-B^bhp-U1{t~B0ws0zHLmM~3{E!NZu z_@xT-i`P=0sA`zI@#qX7O)_W?8^xrPtFE9SED zPQ3Tz_~{~#I|Sc-Cu23c-e1GD ziy*rj&6r}z=D1*lOCMvEgGvVjxvMllDuV<_*W=T`zMtfEGe zflMM`IOPD-FhH`L46)y>d6*u<@_+!KtO4IybHEA&oKr6A`D1^)=p~CS>Rp{Dk%)NJ z1Jc^Nw%l+*f$^|5Uq2U2?IeR>b3^WN|&j)l< zy)yD1(*)5tF%NJmJ~Q2X!vfi~FmG|*^IC#g+kreaS%cK6WWejNfFp2g0%E|)aNYdN zs*U+IEDf&#@YX%xWg8rw)Eekic+uKfoJPx}Z@u8sXZqC%kE1Gv ziu3g9pF;C4#AX|(xW*~^jpoTx@A}oc4?8PDT>C7tmsPfT#R-LB%)^Uc< zNTLUX{@y0fM)WgRL1yjMXOb+uIEX}8bvIKtJU{1%h~1W$>~9C({wf8imDX!In7zgg ze_^U)nV6orZvX_$HyD{_EeNt&0_nm{)rRVlKD44h0Mr4j!mu|ruO7YU%q7g8#LpgG z*BVLR3U^_Iq-2d7*nmuL-p0HNA)NkhF7#u9R*1*O{31xcegaRt*u5WC~^VHmlg7SMVT~_@@cHj3;KNtOfb#v`8O`TD^h=dHC#0^0P z1A=2pB@ksioYoGuYJgbcqf#BO2>3z-m50dVIv3-DKsy|wf}(@E1zF3Z&?>Y=GZ4h` zPyuVTm&d?IW!QC;wYRvwxOsOZM+~drwZ!ch0%z^*e=VBd-KK7|oLF&)Xv3 zZI7AHtkU!^c{?4t)FyIKF!V)}#obt26}iNXD9(D2ORUBWeb_TOI=chu+W|rH)ZZm} z{;UEQAr(=w!v{aABrEzcgWK=~M0;>=&uc7Ej*T+%&`isNf#Ano-3lT#$ep-=z4J~7TKvIlQa)Xh4aUJeW|S*fc1yB( zI^|x~?y?lvJ(XFMrTN80)QgdN`+_<_wNj23d(9GZG`|0{`RgezI0Tj@#;mX3{y%2$>Z3Hf-%Zn6;^`w}~@7^F>ofZHeEa@`1dy}#w zOEJS>sg|&XS#LjhxR2%o4!Vs+-9mc0_$ol8bpEvPx7;@QxccfyC)37p;kSygwJsL> z3M+~xz;FN02>pNJ4=(77vs{-chtL&w+QrD%)CnlAU=}j0W z)eXB2$__rFae2q)57Y82idIcKcidiqT_C~_9GLl)v~ew;oW7M|9nY{^dDQxo<*~wK zLuqPmFk|T5_?VYR(QqWF3wHTePJHQLRA@@KQKK6aA;Oj*$8wlWM(tE#pB!&a3Wo(VXtJqU@-)wPc?crK#>BHrfj?K9oF%#E!)huijI6GgPwAS zC~SHuCN~;*3b9n?l*p-#*}3BMbL~pIlLDZvf(1P?O6v{T2AE#qv~qAKDBfI`ukn3K zP+fe8B8y7p&Iu2N9@f$eV0N~36nfK?3=$+)~U1YcfT_Jw}#^3O4@29%< z!|M98t`aA<_q7swCrli-)N`+_`r%?kCH>CcoaSi~*wd~DCx3M3@$T%#EqpKU)*~TX z_lJfID&A4AUlhejACM$FFG)zcEjVy!!I&gzfDON9fITnht4&*#%7y{bY=*oCYdCZ4 zNp)&x&5IglL@jee?PP!`mS1!{s>`sJy$P>Lsssfx0r1lG;m$fUdjKfWQsKSy~u%dpa;(WQ0+BTBeB`;US@}I=azS2>-`qusw4qa! zDJbpAwCD1?eR?`Fthr_X{fT7+(usv?C^LKm8LR`gRA z3=U$b`Xlx%wNOZBKH{zqqi*K3RZTfUXEFAy;!oZYjl T&+#ju3PcNIvA+<8#vl6=E1(ko literal 28193 zcmeFZc|4SD+&8RTr3hVDq6oQKBuQn<*a}7VeHn&SvJScZn;%^vUwF`5b8xeYAPtKm^TsvU3@7p!u z+DA{q_BS7Y5)%4Hk=CukL;cj668eKaY)mp;zytB*);o^_7KXHNqmv`gYIM%P4v%y`U zh=nmXzXf0T#y$aHczjQ~yj~G`|9SB3;0EvWxXmBByw4|M4@G&Oe_#8-4}3f@{`3FE zuP+S{qlsI;QY>G2wf0>$Cms1`43|Hx&5tmn7Gq@VVud8`3d7HmE}IwlNIm=bd+hQ~ ztuLfU9GjL8*ZPo7uTRKw>)d8Yw^M!IqIzqD$&AH6zu)Ff;p6_AfDurwckkcS+CcZv z5jb`8l2F9$mgo2R_a0dE6#jRHm#TWG)n1m|?Z)*{zgLy=|BT^GwVEGgBTdKJbS&>` z%=SdfPs!iwbLIr3x)#CmU2oOf=@mu1ox6Ts_^OaB?|QFqgvE%%CtfdRHigU$ZC1s- zi~YTnZO5h8V4XR8b-F^LsHGe=kEh{7$2Y2UIwN# zAZu{GrL+n))AwEN_iqm>fdA*)VCT#~_Es}^I99^#P4E#NL=DkuDa;w?n<}Lj^?}wH z5o%*|tka7bHk}=s7WwC7b+;~aT4@Srn&D7$9xU&oC$;LV5xeSzA|f!<9)h~p*Ct!&OxI>`fp)Si6AH-VXL}lmG z&O3XLW!L5ONvd|Yb*t0v%njiJW(VH4vhMI61*-!DSemhthKKi16SBdj`mXtM zMWopIyB%*{YPXw{4jR7DBPX0PO*`2Q9Q_VpLXoMG$r67G?`-75EfTp^Awcc^s#nr$wol9|)s zF)IZUie7E=EqQgiv=xu>IQX3`t+IW9}V)WN;(T8|^<>!;tGPZZQlk+HlE`M1?=1D?8;o>njLi~4 z7v}kUS`wv@;l^5)oX>_rx8AWj*K|!X)XfDrAqNX9^Rt8P?Ng)ABPuQl{hhfM_DAe0 zo6$I-Bz-ZaJfwf)|gA(%X5=FX>u?ah^u&FS0)%Y(i|$$47~Ra!0cab`U*LL{=so$pH2 z;XgNE$r!)x*^YO@;$mWd^*=iuJl&;(I(1FXOzRJbX|W&U3(BP_vOX}8^sp+#b;!r3 z^*$96x=B~HAc<8Q2&G3aeU)gC(LvOGiV@hF9)}~}vEIY+)E>5XV;?ZdEJ#C0{TO#= zeP>CH>YBnrmY7W#l6-S+r7mX_>4jPkR6VG_`DwST-E7|99BG}kf!jMP-UrZL2x+_Y z8j(a!g~1>L8YVn>O#)(9X>r(q34O>yWd$rV{a9lR_^I$2M<%4)XN8j|eie5hQ#xY3 zVP{=08=yoDf^em|+Q~s^;fe3a)t90nbRpuS}D>dgj zWz&j$H1RLk=05C2mG{&dqWXExj+(9*ro3>hpc6aoi>sO})N4&{l+B`~9j>C1lcUDg z+_;;$+(E4Aq=TL+$pY-F5+#BAf>rDC&;p8`@|q`{l*JxpKs zg1Itu7OIw2Ir&V9miA|q@;HI6@=aZs?@O6;%_4k$crX{*{}9tP@7tQpoI2Tpu@{;q zAN|?VgF_6BpESjpGChH`a;Op!;UArC5_On;;-NrPIx?^ zdie@CPNEK~P7X#}=16bO>w#thoHpKxUS;fMb9FbXw&u2Q-vouMPO7$+ zr1xxS0g+D8Obl#`q4+aP;h7qNInfnM>_%S~Z$WfH4sGKWz4|@$gGJ?JaNiC2&9O?# zcT6dMj9}45|K*xVY1J<{69yfuIu-7a%QEiq^L9y#;!5T!JvjVop+O`zzjfw)+pL`}YoZeVb&wDCF}H7{pgAP9Dg~-c>{Gy{RRXSe+&}cL64x)k5pC#HKT+ zl*nZA_ksfU>gMWkb@Xc=MRNoMcZk~Mn%mixt;NI{qQ<-sLvejU2~c}2nOq$1qo*Io zza%rWApcYaNpd#S$~R$d>0RnIdglqQh(5Oy8vyOd{{CQz7dw=7yCu0=g^G zr?QZ&+>PY=Tcj6vURe5U6;hnYqQbu84%xMSI*Dx+EEo`> ztEn}I?y%?W1*%x!o~;ASbfwRXT&Q~umUP)geyhp6G}l>f4aC+~uK)GwEm8Oe)&(E% zwkT5B0Xus#7rB@3VEMBqpM<$zB(Jx)_xQx{%n%#;eNap>|F24>QE5f$DOs%_n!N-V z{ilW2oGSNnW3a|}7ntNLqiW$4IQQ`?99g{*jHE@ZiDYa9|xbaTWipLKL1NAyJWZs91M8a4|WcjVK= zM&S=KQ7H}-wvKmCUdO|QhJ_}k=%W3?-UCN|w7Mwb(@1X)oswgg1<*QI@uc0U7MH!> zT15HKN@AvlhQM4Z;_4Ip1Us>i-%xJ+(lZYxIwgkv9GAnMT|J8OiSTCn=ADGjpsNI^g$dG-*mW-K%|{@{Kds zc{gAX>?Xuf4^o(n=v8&V3gV9OUpbd~O(<97PR$ZE4(z2&@`@n&dwGBA6={(=^zE6Z z7CI)!UnB5_>>mTWY}Jd*{AyxqyA8cmz% z7#}tgRjl);DyCXgW6uphhDznw_B1HRZ-CB2vsRlT;QaE*{7af@c@SAU3g=S;t+ zwNj_>U{jnDH!+{(@TND!i72$^f$NB-lnM6b{86jtt_v5bp^&n;3er;>Gmhd~?MqVw zq6D9}LZ*4T#eV)&`2GE{Bf6{sC&xy8$QbO3Cv|Huk6(5!85&N($scRxKOq!1K4=Ts zx;28XIkx8!P^L}2%PyKb&eC*Fw-p{|y~sTML8K$(mB$eWYTl}s%K>yb(gK`@gAHDF zJYx2FJp(#~a?>D*<-*Ss&i8hO#J2~`M)VGPla=?}iq$IUHX94f=U+NhWI&_LcVMKM zaC*&Eh-U5F=0I(svtkBrUs@JAbl|WpRZMrAsSzn*v8UPp+?hBC2pYD5ZF*zIDuqcH zXnlVv?$+wN0%KA-xlwjWc3u?;nT%JA*HP5*r+?8XrEUY+v8J9h1Lj2!rYFsoDee`+ zn5v)7VN$JW$2me$y$e@pZ(%yP<2M)HD>x<0tkOvw&>d!%!dlh=stQf_l=%w1Vc#?< zqA&FLnwCcF=x75CRWhbOTxn&0J_$)cqwZ@XDL6G8WUpHZKtIyr*hWi>W4CSS1S=Y8# znidO($XmSMR7*rDX~360uwL!#yeH)OBB3J~X;_?=p6R-cb*&{_$~;Ps%$qU0jq6^l z>EdL-vgO6%N1&1Ki7~FKM8dAKGmqtAH7^DU!6tZCzb8M%UR_qJ{_e`)bOAD{(|tCg zg9RxbY*HGIn%SzR_J?9Y2Vc~($#%5(Te>Rdw*H*|lsBA^Q}$>$*}<$Wnx{=eXKQJii*~P?pkSX-AjU+2mgY)R&OH zAvwB#(V0I`4XBdX3p94>CFpr@Tvv??wK*AQ2EL%?;b>Uk(j1?g_LoPP&4nxtd^k1d<$h6 zwH^%3X59w9)NX{1_K+~PuGME|KD+(TA?X$XA_W)`rGGK_?%y!q@Lw9@<=?-N{FTCg zfcrs(|NS*@x&D8*EM*lB1J~zA0=74n=9`6-S7T(#XT!Aa{dmx@(xo+0W?#O|G|#y7 z6*^R-aMVS+GmsheH=tN864i-FeJxL}T$2xb+3vKLsU&!UPSQ|j3r1(HHwZp4& zcc{c2Tr`F#=&elLu9B_2^ZgZKg{gM8GZSw1fP~Oq=}?)UZ&(OHZmpS{Bw@ItjS(Yw zC~f@p02#^DI|VwF`C8E-r1Ol8U|3^)D zWDhexUZ$<)W~s}MZ!b?Ezge5+J<54xYi^z>>wY%2M*n=%#x2=<=bkv1n2|tE%(su; zfNLBooW`#wN=~*Lju)GzpWk_}e+LRhN1r=O-MA%IJ(^gweh+}=8?Ay!cE{)Wg5vBD z@Khu3MtjQud$L~;74TY)IaPY^q@bmswfMfnWnyN}gs)_21X{=(wp4ni6*7B|yB5ez z!)X;el^5Xj#SN5@zT+x_m~pkB{8fa@NBfWc1Zid84AOLkgQK;CrO+6W%UR%nis=zG zX`PE8L*B(E9q}KFdkQOWj>vkB5a9DHs{8u5@x)=6-DzKFmDE%3$N_1aPrc0rQ;zj0 zp>)VO9D$yB1)`WXdabmmpgNf7 zSP^Ty%cPt9tau55xjNB5RM>i!8a8s^+K9HA1=@{p^jUK};Z&Jx=(7*2eWodn?dH3# zQTfZ@?af)cyMBC%2@aVSgQ%3i$&vUSL4CsbQ_6|X(WKFMlznBN@aDEoz`QOBjqxLfPq~(&VbRvkDE5(KI zAG)k@^CMrhjwha?_xt+<@qYz`|D7&*>+%0dnNaEwpJXhfq1X_*5VAfJnoFw>_Oc1; z2ULQY(`IjywH3Qi=2^psEVai`0K*3goqzjUeRPMjHNw*pfKV{9N5VDvwM?{W+PV8o zDmE10p@D3IGc`$S>K?52+F}Vp03je?b*A@w_0JhKAo@EjdkF)x{qd#rn|RZhW$t|Z zEwi_mdponWsGP>qba2#)B{JgsRc%&ynQC?U1(qKFuz6%T=(b!*AYVI80}xcg6MNJ z7-d-k|BA(=DwCd}l6|mVlYikCeMTHGuJra`fQ@oF4+Z(f_WMDH>w1%H2XN~FSnQHl zPB;ok(N`$qy5b9S$d~v%n`fR>nLSNU(RogU{On8|Lt4%r_K>=XGXLnyIy7 z*7r4b{h0$@nQDqF8T9x1?IEu2=6vOx!+4{cI}U*ZrB_{cO4J_t4E{9 zvZJ^h%zUE8c3vw_2?R!%pr0%3;iw;*a$zx6$-TbWw23}yD|APk9@JTIPuymoJ#)Cf z)RqHcqT~llPW3dufh((xZ|$E1WBqH~#?>Mv&mEUQ$TH4mB_gNrqlkZGI_%GYq2*r7 zXokg30&y`$Mk5s#2Hb(rZ#9u5XUE!f|3D|=;>8v7qv=)WdoUt5XZ5RnG`Qs>TxVleYJZEW6_m4#pkp@CGO?kxO$2@~5= zZoG2l$J+Z7G)(u)ACywt;=;nqyjZKIrZ(RZ<#pNwoBWwXmQ(cphM#U(<`P|ekk_N#!uCyN8y@9 z^<417>72;TUgCRRzzs!)#z|eeV{Bt{^gMAphzl85U!GeSri*JY)rme!IgKPC;j1%u zOn?*RdCD!SJ=)!~N8$k7#TS3_R99`3vuO%$$61JMYpJx1wv;S(kjLrL--AWSkL1n)1h zwplZM)v>)NZ@JRbVs>S7K6D`{VtvlkM2Oi}l#uJj^iztArD)K$a6u6VfKjPx{LysX zDlcpfXO9Vm2XbBWf4+>D4Y54u^u~virN@nC6RSKph}xUu#0`h$t@*6UX%egv!GbAc zoyLpb)9o?zChpk$eOhf`Xi8xA&z;!>cUUy{V|1w3+xv03^Q+y+u3GOwn1|C@!|?!0 z<2qq!g4?2edolTwt{p?iN3&aJ{cW`D$`1YF`czin>0oj#Jv%h=2YEZ1lNeZcDj|1e zCBC`akTeptwTd7qe2L;PqvysJ0N229Uy&YbQV@*AMvdsyhCSV~XoruA~lRoq`Z_}2O7L#&}~K=xZ7Irj483FJ)G`4~Y-GP%(e0GP;uBgjen z`Iz;w?#EKG!l~tZOva%Di{m@>X>yqsBtPBM^@Xvq_~S|%g_WoatHsf5ubq1HT0iP} z?uR4b7KLn!CFb#h>ztzU(m}@OBDcVAdki8g`^}-456dQc=3pwOn6QgqfZd8e?*ncb z1`<|ukr&o&2dla8VHYNFtZ9eCSh?t{MrJZtY73qxj85Nvf%6}{#M@F;VN17UlW`qZ z7?#o+=l4{EfvJQD=YnI{>w4V+MOH_2#YAcYklg^)rMg)3*&=gyE=t4WNJmR^v704! zYm|ci{-#+>WW9g>Mvio&i%)Tv(L#`9h;^qC$*)Pj!ViT!Er$z0#boRmyH$i8kGL~G zT)|BBLna`3K9(!N20#3cvJjHt+2uI_nW2Fs0 z7}OV|J%;^NMOlxX(!2D}%?#i?rPTfJ`B5sq!wgh?i$DNAR-rb~S+MGti>FV(V;gUHh`RG5fDgp>(Ylqj3vbHE7kwGA$fI|Ih97=dsa}$ zmzA~J8Ay<7O=OKokgHPXz*Uj3Lx-(3%;C}f#3MaHxC0|kzRdTP()-!P)Lte%921?s zh~+LTXPi%!6f-=$ff~CX@4miD00Vhfi?c=>sr2~#>Qt%)RpP9eJABexBVblzc+vFy z_u;E5vW*fW#@AO$53|b3F%~VVjgbrK4KUyy=4txDH=g`j+Rs|r`3Y`(hV$TnG+;Bu z8k{p<0b0YAyR!FW_d%NrTU%QTD;jn_`?=kiqDFV#Gn<$~J3RI+`0w84_}e9ZCAht) z1w+Y#w6!Q8!S@6ilA71MS`q=|?@KKu^=g@mn^OJB{rz<+TiL0vfxqXw;&T=k3xwLx znI5@X&y}eT;*~QFG&~Ria&<9qCgsL{-chgPKBo8e{}brjV*P$QWccL&iw36DIqq*B zkMD)@fAZM;7f%sC+Qgv^1d4M0x%ADPFcHUJLTnT$;y^r78} zqpaCM5}?OxDkzAsM9m+viQf5 z+q~b0oRMe9S{ciIty?980=hg}nen+oT za*?XgTKJ%%Vv%Hz@}N{W2ar(aQ6N=!Iw5rjb8T#8rni8ZNL^Xn5@jX}dq7NV>)i~Z zKf{fc9pU|H>6q@amBE%GCYqyOQkyF8&e>vNqmgFy!fcCbvZ*j0(te#~xPoFDJB^*H z2&F^)&QS3xg+9&jD)^Pn*fICZzi1)!22*OfP06T5#-&r!%W7^k1wb=BjB#`d41!9j znQt6RHHBY+%MHsH)jsurR72eeJM{N${@e_=IN?o3EW;K-E2WdLhbd!=wRt|D*-z7A zK02P{c>iZUP8HL$5!WLc@;Od;{+S}?+x8Xcph3I{oW~A%Dt}mf)G+fdA#(HCVZ}?H z_V)JkY$i6;Qg`!CqwuawY<=+bUB;CSNESdJkpcehj7ld@`#o)$;~HoLCz)$_w)k1; z;0Ui#L5b81D;-Lef4!t#Ejq^+sR|gWPE;H8)y2yozF}<HXY`CgwwafxC=xfQFOmuOc}Ood?wLxz{o-I{hG@ z5xZPLsMK8Tr%$0PDRW_#GzF+AG`9%q1`t62s>%9oJ4zHPT4$EY4>DrO^3sPSQ+*Ko z-4!M9eo7J#vBnJ{b3ugR`#pJAZ#)e?asByXv_`JA6)B0&}Y! zUnSgUHTJQ4-HjFjyoA(h)ji`_}XQ`K9cY^``FiMvJ9bU}_++V%aq-4g|D$n-qqxZhoLd#1_msr*U z+d4p1O}*#B**{4O@zn&aC<&IyDLG=-e5kWZ^6ngcsM_dU3e93YT{$%RR=z zyK#HD-Pv-;x1n$@1#ep>59+D?Q3@^aCgujx&LAM&#bI(TFn<1;{U zGN35{Sa5KxvexO1vZ2-1EWYXS&M0$~T%Ma2rs2{OfbFW4cSPl`*;GeD)Me1;68>lU z6Q)Jd&qbaU33^x?Lura<}6i@I(azOu>(f0yDhb_Bt_p+nhSLinp%Fksw`)X}dXApr68c z`W|{C>_hRwkcE{`5B}HoO1EXp-C|JbZDVMG{@{!K(2OCA(uY?k)F5*HRPgED?k{Is zE3&`x$XG8yrQySpfz9_N?{>Y-cwTC$l?asj{j|Izb0s-ZY@g7TP7PTVH*E3M&b8}W zGPwT5iGZDEwo2s2z35~=rQ=_1sJKcIU-^q3&5!TQ7Q+_bj?zm+=>GMT&jf@dSqq&a zQi6uNOu#=DsxTyr!)uz#YQdp!rQSPrfzM9|hBSN*%vO{IHMQycn9oOYm0eaa;y26SQ(IWDQd<)-G3UMyY?DL2l;? z$I{3zPZ+T|cL@2%X%{`h9+_={=WNjy)1O1oo_{Z<8tdsZ{j%o>FZCxrHw{V76PTDg zX2_vkGXfbXPr5%0A9HHX4(4EEzSmW1%WnG`CC@zo zlY9`_3e=4D#h>@fx5{!U!X|K=q{D1g3$GTmR;tJ_E&z0}Pj%?wlpn`nGnR(6!Q`5_ ze=e3oUO7Q0`1aA%$p+HHcM5#wekdF$+QesjH?1mXz>@vt|AKuikC~`(6`1+j6<7o9 zp!{77g!k&~$L)Bi;YymH%i%t}Nxo%kFymqh^Ns_%?gH(`uz%}g@Dz`*U(YWif-+38 zM}F!5P<$owcXJf?*2ra+!8z3?J5WSPwWeHST*whb_UflsA|LFV?v3k<+y(O?TR{mG z7~@zGndX3dU)w^jD5>kZNPx%?xKH2Jln~vra`6Mr%wjuKPoDJfi6rfxtrEc$v8A>( z&h!wT{_6o*PwQ&_C9OKj&3x4{{Gm=-iFLvD{xe%$aA{kGt&cX-RJ`)Yq!X?BM#||; z2SakTYcupjraY3%&Ow*oHKs{G{q%>X=^%6S+;XXV7yDWtmjyHA4#iy?xjZvhJBFct z<2wRu^ZrQ#y9ULf-@(=3z`TP=BMp`-I(5RdX+-NMcPV^A67L=bn zN=!YAG4@#)~&c>3uHg^^r7uWxyoiwAC_HOQ`oleSquZWzt$R zUYhNOQ!)!QTK=v<6sd&YF7t<6z(H(A#K`v917y~Q15wr6B|VVly<$T6dN9?TWzZUd z=TXN3;iUcc+`e|ZMjIrFFgsW+ub?AN!-+HQodhV%4DGX! z+fzC@qv6xppVtAlah$WYE`O@X@0n*_AC_G*uTr?Vad>T|0s8Z1k02m<(4>i9zB zwAPODazg3OVFTJJXl_lm@ADw2`)!g9!`*gPVi1FKty#3ckd3A|zp12MQGkgL?`WR$ z3hFsHxgn44r=^*Dp|2^OoU8%Nv}2D3-c&C?Nx_>A>H27S>iC#=vS`EQB(XEV8g!-*L@iKM-1l13QdHpapAY&Llc-76gct!+ zk%&Hkzz<#g_JKFXgHo7r#Xca?%;vaPoeZBE=6T?FTu|$4^AD5aT#a;cxno1dSOZP^ zvQ=Fy$!(&~G;S+@VDnjOlqK&3KY{RPv%nY)FzrnHl@ZJ<#vlzjjM1=(M6-Ri&TzOg z73dt`ez+*M)}%H^tP6~uwpj1OI&6&dND>Z*v##bmlch?}nlCRflIPj=`M$(`bSwl| z148I%c&q!0Ja?VDBOCge8hDQu>K_VlF6*8P&=JP@x|<~c8&yUHY54s7(h)f&%N>^u zdT}VW6^PHBtT~#7!u^2$5+Y1Z%|!)UOlkHUc$}7>Ze50d3sjf^1+Q~g$@n#BZRF71qWA`jAUi^-}WK^6)!1XCAD#F z=q$C`QCY9EB4VMlrb}4n(m-dpcgX2vKvM0<25k2k_x0GlqR8-Xk47JJ!>UCcgIbPy z)zv5IGPvxIYm1-fpY9PF=}uExpP26E=I&r&ph+?JD2}j3-3w_@oq3k}W)O$G0#hv9 zqlZpO+x#rMQywh~MuElcb+__0=eM|XGTb3>{MG_DB3k$)FyaSohCnU?&shXSSGm-N zKvA*g`E*O}YImexZmi}WH6cgwq5ey?p<_)Qs?*sTABClKhxI6Rm6JVZjCC%BVx;tT z0*4bPTG$jd+!62w3E{MEji${gVuNHqaHFQw#QN+oSCeor-VrH+KIbYJjZb1V!;vgz z#xhXhHC&C^yZPXsh5K{EB=1K7b3-hwU%$AgzsOW#Y^WBwrA}=^#+xOBiBZ`NjJ96g z5`{{rpgsiaro-HWiG(F)gQ=<|U#*nl@yBptQJc#zchpeBph4&e+wJrsJ=36o<#1&9 z{q19>%AIuSI(gu(U{Zwd`bMi9{Jq)ORaC8Sq0{{!#m9FGsJ0T_i}1Q$-Xwdp4+4|CSxEViq&t+pKl-d+bWlWetpz|( zUXCRQOQ~;63kHmLI*Wa%pcNCG7@#JY6{#u**cN6I7UAJv1!YCl&@I>~DE#h+fVx-A zF?DYQ#P9M%!x&n^Brzv`L>FhqiP(?EPPq_Pi!*}Yia4oS;JSPz{(m(6b>@h|g~8h@ zi+bAv(devLbxw9vtMtxZd4^!ARPIcDq9ZdGykE@%D5|H>_bAQod$)3_sp{~1e|HRPxd;i4jACLcQPN~u=j_hwK`Qy^He>$uF7e)R5G>m`6Qa?BxJ`Z%)zyw5P z%uJqX5a9az^;GvTfJF4|)PIMJ0hEuRrzq26@S2Hm z#5?{%o9<`)K3nSx%9}S`N`9wEKE7lj>f+%WUd^ol1LJ@Or@lVMnyv08Xa-Mh#GnAK zg#-y3k8M40mMhDhh`u9T4BUC}b+fY=Mji&I_M%-rr=J-y(&ZUW6`tH(3_F!y<+$pjFfmNFd$AUx-XqC>?Z zcC*JobTej;^ciiy+Y|*-!U9`70I=dj?c^K8vx#(mQB}*ys5iqIQOCze1CCGmc0#pSz z%QPQO-biN50YWJqL)<~=SF(a_2F_K1erOm9?-3#YY4nWlv$|HGlMfe`X z{k>>k$zb?KA5Yf(T+Sbxq{}`NJkmMUnZ@}OD{`GDUVATaBxn@$1+j;{A(BPLTFw^x!GDU4Kxqp<)+ z8U(vnoP+QMuyz_3Xl$#qF1UW`lu^1Kk`3b`Bv*&ZrsD`wL{}QoA0Xc*m`~z(eRM_U zw*l)51{imfg)gMW0?A%on&2tsu%p`;NW*rWD{pSzy_dJ3fNb8K&Qr#@(id+%j$n}; zRcQWve3FkoI(~v(fC}uFlOCSwz^29vh=Ue;c0Ca>Ty=sykQ@K>6tDn%<|@IiA5%&p z>)}4mJb(dCvZkVLvmEU~Q6Gogim0a+HroIzbuZmLD%@sS0r%5;6M^=J9Y@EwX?+uC z1Z)RExqWte{gM@VMGx-C16_0!1DaDWp#)Q=%YYvq5*w{a?5u6<#3kbSO7AIxn`Ef{ z{TtKlIl4+E-#)%820&0(1-cVE;72532Z!zYiH^ql@F8IlC%Fri9_O+Gjns(#3ObdNUprUO};sQd~IVVr)BQ z@+A)7tlyyiGi=JT((vTFL(;LRU3|x7ce_8G9XcfS54fHv!g_p%>pT^CtPfhGID2=l z{D=`H0IV*X-&49!^;cI>iR)xVG^m8E<|vuoggO6O_p&|Y^&&#o8X|&CY`eZP!-7>- zAk3-w<+JN+%2KSbFh*%{B%iI7-M#*`N`;aaap-RdOxF7+lqEp5T9b2z;{qxCFUB1Z0wbX-ulz(9QmU3uQ(4= zmKFNgI2?W&$yZMBMr#1}j3ug}!pBmVw~q?iX0JdD@M#9pX7M90cUfoKDY_gnB>x47 z4uM_)&-#v(O?y!9#1eVlH4KS#nZtFA?E*GncjT0cW^FHCr#9sz<)_iUKloHn?RHlY z3t8GPD)VJ`9;)|~A<*W_`SiqF(!4y}P(Xq{Z*nD*ksx9MM`yq1pIan=3fP5+BK9f4 z(2xrOq1Wt68h*VpjdZk>Di)U!&UAxc{(x>|REkv0{m3E+y~kvQR3Ew#xGrhXF4!Ov zzspjLj|Z4#dxD^Wdfd(K>EY`MJ40#@2S+UlLVA3BMSm}<8Gsrpvcv{HRbqmz*Fm^f zGm?KwyUu_PNk1^lQty;~RK!rSder>=fn(%8hPxcX5@d|e z8|W`-U|Dlt$Ywi{;GqPHod#I*<*ekOzq|vGn#GkOJAaeC8F#XG1?-dlwO;^nS*F6x zS;x<$eT(!T~&o^@fKw7!1a+OJJk@@=>Sk zMxCwMYDktk^wnQ^uz%nnAK$OP%zrnU^Yyp>N2~My5+8LLdHlqyR{8$cEzy%nywW5u zT&o^pzg$w))BM|k@L%*PmwNArjsbaScxsH(MJ7uFm4dB3xyyciehyq4ko_O36^pwF zKvwmDNE%D?uVE0J@%pux7a-nZP^gyd!G(%{odlot-1NE_A~NSRXK(Oaub)n=@I=!q z{&jI!W8eL6RqwxRSba6liUSaxyzMWbUq`fII{n;@98aJS*`=`(5h~GW#+%i*_>Ye7 z21PsXD|38fWpkV=dyrh>h`|+}<Z!?|E5_mBA!BpZ$ zsxkjw5g4G@uUs`5_g(t=b-wQ6H>)NC zM)h>2Tn^?&%xlW-RnuNx{M=-=;_WQ18Vz&0Cbz%v48uR50;_8g1x>y>IUXGF*Ib${YB%U2D>Mi(Syz7N8XqN_xUe4A` z!47tH7T`V2Ns&DF1Gjv$tURI~Fvd2Nm7UdKx0MeIED&>jCV6XgP-D0I3BcjjK36(2 zAzR$wP$uN19*b%}Jk>8un#u@b{wnPE1T*~K!db69+tccm-E}XibW_j^ztz46;*Ws! z-~n6&i$Qnk>BrghBl`%DySCmSC0ntM{=ek~?*r<;4oTQfBWZtW0t!yw9v9`R1)Jv) zUX=~UReJsj4C2Z#aHI09iu``|+uJ-;F7%s$WxL4@qDX3Cf)PC50)UD+@JDiqBv!;} zB!3zJIXA3|Hywz0(4iewNZ5opa1y@zCjcgQ`Z- zr8aCPnN}5Etrb>TGkNyR+B~Th2fWJRUwXvOH@(aIpCIuXsFr!037^H8|60^IOXL0? z3EwgI{~qJ>f3peXH_>#z+QHFrdNgvyJaqBLCjdqO8!p%@8=mF|6y!F$Ut6#i(6ysM z0wTwZO`aM2&w{Lz>cc?baGpyZV_R%-UTM!i!D{*QmhXxZBs+A}Igmg9AFEwb*XcxAy-^R~|lmQ(pzC;r+Z36v8q4~p&nkVU7jyn682VNvC zhDwUiIrlI6JC`X6qXWm^L+S$PP-CZJe>P0oEJ?IhYkbSLJ}rI<5Yis;^jR{6LI9YE zQ>VK095Pxa3uGq&E8z(6zJUpzr&K`4A%io(ipjcoJIFN&N=-6RNh(l1)y;kP8%N!#TBgSJTUKQo#10XD`Q~wKR<$(G5Q*PEmjw)#zAfxCMWIbt+>$e_a*u-}0JMi2hLJIb;aXWZ9Xe z(XHIdz$-~~iax~t!L}9w=nS-T^=XCsJ3y1WKzU+StU~W?;omBgHB@UT3vEo@i!EwmEe7+2H~2mb>0uJ?b!- zW`zO01Ld*QfmV|HcR4FcmbtNvo29J+-rC6c@%OKPl_{@Dm$~lh^v?28iX2y!Y@YaL z73QD5;B>CScId@SJ+wU0&6cQWUhFgb_%Vc30{UJ4M@bP0LQhzIa@dOI|Q(Z>!a|mOeMR!Dns&Kck)2=IB0)ZL_B~J4B^G zwK7I!=;2}hjx$aj-nul0_*uiNO<5FgH)!-1Mjbg^RT-cu>3|D=sifJZXn|aw&Q)A9 z=x;eb{O7=R7Xj5n@)p{6W3aLTm;mTtv$HO6Ln@NoR0^q*x{-Bb8BXO%-VpfR8_c4_ zmm;U_(sZT75C9mxq-7)h%UNT0@2>VHzf`^E$O zg{T_>Ws$6Ng~(d)U^CQQJ(lsLcLnGb8ybmR>D-g9Q1*Y6ckba(u6^Gh?W~l|il`*j zTBQi9A{qN+wXxqb3|XbI$tDKbQ=yfjgt8f9Z;(+K!(e8m)sAcjgG?iPGYm0fGmLr9 z%ewFTd5-%%p5uM*=XmZv-sA0${t=n$I?QD6MnisvAyQjB^<{GUdxs98Hu4?mu z_Xh3C^ldmedLaZ zc|q30SF34#Ny?4I#;lUZiS4@6FH_D*C>mo$MLh4h%Zd}G+_mZqsY*5i6MR_uw-(zBX8JsKPmKbY~nrr2=>F-gjpqPn-KWH%Kg}kWG zgPIA*ut$$+$wqqmUCA0VH-Cmp7M{Jp`;jGFBzkZ5iPU>EESHk0@dX6&%;T!{!RjLk zJDzRo61yTSE%IWi|D4U><*C=f#hI?M4>?KV3cr#!D~AoSr|Q}pS5DKHpq+NY&Fl*z zR=lsa#TK5z+&B+MMDlM_u*)cA!f1~{CW+!9ocdKLo~v#;YGa?Mv(Ip}(A>fE%bq?Z zxj&h?hTKa?S*n73!1mY9Xys?=sC!#-Y!H!sYhE7UuNT0==_+uhuOdVu`-|deuAGH6!TrgToZLKM@_@6yy&LYtG4nS9dC@SjAgylqn;7G@65NQ<4%!X zex!c5m4{Y_ZmrU|g9$5_pJ!S=n__mTgjK!$qA1DkmqxWMZL+bILY$wh_feA-oMhzE z_)A0z7xmjruD<(VZh}^*dRF zAbq;_OQ+QKYs|qd1h@mgE4DnnQmabZ7|g-(hrfwk($b}mT@dzxCuWqBnXgr%h>WCm z7p6%G#{WmT%Nk3=y9Wk#Dm6G-*O_(--Rk!$^0~x&^qN`0tY(%mGnm&@cxJX5GYx$U zwyLLoNh{DTVPU@}@O5Raums;=egr{tbuR$so8@rR?`DeJzo!+T~RVDBj_0u5DNp1QWVlb+(!O)xjHtVAYhQPKX+Ss)e?Z=(kM&8kxddJ)sW(#?Hod;dxWmm73@^y^+{~t-ieL* z{B(`=8&Z_>Q(u5OW@8XOtxm8e_?L3K0@Sd5w)ZBw!bK*j1`l(-gxlttgt!|~KiLZ& zmZFY$YrgWV5bHN6o^Y)5&#OFJCQOo?AkbV`A?R-vGrb+I+`jZ@vm>|VKE_ul6F7Ds@@+s+uIrlk{VHCW!RRe)KR5^8V6TH}JNx=ReX8n{{iT`?8;KuS&Umea z;!?3Pm61QKbS(JY=ghyvM{vg<7HSb|HOssQCkn?0&Eh%Q+O@`hhRw7ZpPXI=AJrLr zEj+zvk+busCSj!aOB#*DB;3;cEog|Totg3WsY88$`vMOAI70&p7L(Imc&oSGt~K}b zF$Lgb0kDNm#0`b#soDF&<`}E(A?u9v!W5=!krmPgbLzv~NVH&1Fq`1;&Q5SBZ0d-f z%^Bum34*s|K9_fpOK@IWy-EfDT9Xpk`+Z+jrSe|o2vZYO7`oU2bp>5p=*$@$Uzu!V znx)NtmddS88eh5ehG#m_;JKs4obeRVRfTzsx9LIcW9_}J{7T_2(;37%b)89N^|v!? zdxO;UDpGkVAKEfWhPY5ts*`sj$>bKDM8J82*aI5@XYR+VqNKlORsWf!_=gymVTakT z^}mU6|8Z#Cxfys6!>a>13gFMt|CubvzbOTSRqnlL##23dxGb1AiUfhgb5A z6`(Ktd**%r&431kobJ)kN799Oe0$UCL>3zyoUZK5%mOQw1odj0VaH& zyra`OZ9!)Nv$f6IdOa9QGjs`?KDPW`)~^l>h*qlr30W7|p+iH4O&8(8uSDJrlaPl% z_y?)%`Be_pyg^t#qBEgMXzPwT7QUe!vIzpCc6YSp=a{R%xIk4bTah^C#+eS z@4=~4z^(ms7FK_vvs9h03Vb2-Nj*WR{0Mr%WUWG8u=0WZEkS;%V!Y4r*Ugh}s1WQs z$lVO7!?#Cro?+|s8kfI5Rk$KfeP*@*UC7MiJpc@1#07#WW5%l@Uw43_RnFDsZ~b&h zKC%bu$cY=6&qTFz74bIKlCv2Q)zq=r6|_6wzb=Z;`%I98M#NwoJ)hkB z&|@5$73+jAomw4MKMt3$*J$FXJ9^34){Cj7gPFLOm)8(*6rLHq@$TVXa-0P!-RO-Y zwwg=>b6&;3OPbVDYX!XykTfv6HRo<|jw+(&qbe1VB-LztQ~8N1$Yp3>2${_C~UW_54vy0RTYI;ftOtjjM|5 zd_y9ncy`9F+}|mg@)~R9oxQ_yUynh;R701xh_j+S&6)nuQ0nLo@k2AMAOrONDF?6p zm1JHSWTsdTj7w0$*EJ`!sKptIde*m?Z=)aUFjKj2Q+&HE7QvMI!+aZGI!HD&k_HO^ zwwgsG?rqjdpc4S6=A9+@cwYNqG3RZD)Fb5ioD%jJWo4J% z)NK{7Pu0>#uhX@IuHodI?p(uFfta&E`VaX)0nAYG@I=&Z0c4gaGpgUJu<~025QVA^ zJy42Z1zMi4@dk!P%`pjf_r9N2Dl43%>@V{f{Bv-0}oFP-;)=yg6qj(G_xTk z!bLhL<%kVd5LA`zLsdk+xUJMk8xdBf516Et?(H;_7*kXg?tT5s@bvB1%3U9xk+Df~ zTD&L6m{sK}pWPB;`_ZPyXsj}4ieJO@u9%_08qd+_OVg5S`I1<$BwshoRJB&c>$DYw z5_ZG%4=O6mM=t!ncBA7^$lx+%&Wzdhc5`PjrpA_ROy=O;XS1dUqbjnWSXfInaS4kEtT-d;;t4~h5QMsOZ0_FjG&XD&Q1 z;skWnN8<6{&La!lX*^J%KOJw{Er-LYU#4+S-Y-|VFRbmg|Ff-&89elto1gdTIfRS^ zP*GYwgKC0-vSVs9RkBg>=PAYZn4(TgR~7&;zx(;?!8tjY;v=Rl`Sb+^ZaFd}IbGGg>rQ~}r0-mJ^JKkVd6 zX+z0CPhKgVbev=T>|_XzsFOAQl?1LfA3Q^1X0kdF zZuXy>N9Fsz?=761vb48$9-Pu>)iV%=sqLW66D&Zd5(F4zJjf>o&73UXa2;sI8vet7 z6#h&hk>HREZ#DXkcy4It@0tJT@`L~@w~Z`)mB{RSL)pj=?T#G=?OvNt4;Vo`k^GzC z{N4ZP82kTn%=AxW+dp@@n^UOMh$qk|12hOgi^ZW3rc`K%fQeihzyp94SSoWH@jN@P5**yvwO@P#LAPjNW#zyiN75hdKkE#J>VFZ5=gFJ>`_M~V(F}Qw z9SB8>$TX&(avbTabe)4{Gxsu@vCX+05Fp|m3K}{(@K)sPybfBrKmfLJlJ}kfgx(y0 zn?`jvR;~j^^_)i3`km!+SAGlB_ykRNze@mUmNvD*;dQfWcuVR@vNH>6hbilo(R>y= z1C{fAlmiFxz#Moc%|!qr!q6ajYCbuu8(^42AlmyG7?G+ST$2Kqu?zVYN;_eUFMv}9 zS#~@*di^?MVN+lJ4w@*A+ilQKk)89r`(L@~zWjYlfkR?makcLY;CEjbhfD<>ZGi9^ z0=H`YeB2*KiPH7ZF~!NZ{vBitP51;#_Hk?ZS!U@I+%Nm_&$|`?g9lmZsL+8zzce4@ z#5SiOXi(0$(^skYr?TTfVi>^Tj0j?bjxA`7&mfz7h2jawzo>yTz#m1)hJueK2R!6} z!8yQ##RXOQ#@%t?R+wz<^}_XSVw@firnb1kJ0Z->6a!ZetiZlk%B2J7+;?eafb6Vs z?X{i3;|`-E%Cd3QR(A)&=bD~t!>=xSVNCF}O(5RtqRfg^u~cqPkri4r`)-aX)PDNC zwq{{Sre!9|UQDaf&;#B1#jiXJETg&FSahy&f(^82JVY$F>mpgT5vu_VBdZEuQjWQD zM6hVK@B93|M#jbx@xyxJwjf$fIvg3Hl4(x+4nYwcVDs~4>MFWvbUSknh!g{p_xv{t z)=PHQ&>KnUGFf{q#hNRlndzmF<&|7sOea`Z+yOb}7**OGq(X^oX~ef(uJg3%>6?m* zw4m_K6b%&cagyJ)rI)OBoFCn-ry{fcyt3h9BX9(6sGrhS+|BgGfIt<~VqKC8!n~q^ zl=aYM6MV?Ds^$}Sr!}+dJO#da^~2JGu$baz-R&?%`<{?#D3>B8{Skl=rlaZ5Cx)fn z{p%$O|03S<&lThUP*DEg{&LKY((-cSLqagcy-?9kodM)1+K<8y29&c!DHP|J`?E+m z#HE6M&ld!|;cTG#W}&t#989rpgTN27t3t4}&D#8MPrME(aEtyT*tKA=?L}{0K<*{I zv?M3<(RP@PA`k(3Yki#TH}@deVM8&S6-dDO z+08Ju7CWRp1qNtLz=AU&Y80GEB0|APbqG3im}!nn3Dy<#RqBO! zR*R2o%`)WS);7QBHDGj@9Sl3N2WC+}1sHYxi&A|(yuK21dBHj;p=kN2l{`Q0GjN)! z2d)Oj zYk@N|cT<+#uKRdb!}UQ^hmA4wjX!Pe?bpsAiNN4|o^ciDxp%&YZXG)}=v~RB?YIi| zDZUy>S^{Q~0j;--f06H6f>*DiaQdNi}-4^}|s1u{Kip%>u31 zEigr>(EwLJHFBvM+g1bO>zW{H;d%7@8{v$sdYtNa)659WX?!+w zN7)D9a7jLcJg))N5CPYalz0N<)6M(s2U5=?#B#SF!Q8D4vDhVzv-B6OW1 zAF`GfZY*c$VxFa}L(z~q(Ho)mPO@{T?jGoA(g@>t(7+)Zkbj*Afns;~j8k|UIy%D7 zeBqP}b~@-G%Qnz{;S>b|J46p@_jB2Ft&;{vphO{{)dzxQXb38hM-ueFJoVh^X1-BJ zSXnMj*J*a~1a^0Nj*fDHije+iXc_%$cjN?u7JXneOnzhS^L+g{@#pK=TA@SR@nIc0 zQ3tNO>v*%#J`~{kJ+NsjGgfU_5?Ri@emft+-yc|SLImxu{XYs^c1A_$QfhPONWUZA%;;-aW>a zIuMNm5*j*IrT=JEY51&+B&lU|*8{`*A4HLM0HyQSC-pk+zX1l1Iv@!0LZLLCWe}qJ zF`>b+`er?-nqSBf02_;flWuQ;EgS*7+X0h`2$A5tXMX!;%$U6=L!}`r;p(;LtspKS zq7`FG1rZ?vnzR3#?PS|mAh;(=V*4ks@!ZUb=9as1D?$N+yUjDcBC4F!yeedJ#5}s!)VjyVn*Iy4D+{!-fcL1gHq!*} zz+ixUu^h+rc+lIrajs!@>!HiV=j~>fqrYv`O~we8cb|^e zMHZA~;c($aB*&=LR@Wsra|08Q<2GTK*#gvV0AX%~MHi$;(C8=UJrVo{VP)$hw-?4f zLE<~NWv?1no1uOm2CISMV)nr#g!svg=@;Hq?*qaRPF5@U*23<02r$lT7*DUOe7h~C zzw5t+GeiB}#fh^zTE~+|f~}HA7?USUvPVEGkb*i9ud5pA3$eb@jbgB;t7C1;^dw{X zVC+o)^VB~l&(gK(*p%!sGdR)7Dh2FgYeS12dUIah-p}?(<-hvpatCVCVJq}sjq1Pk jU1I;1AD%xpBoN1(4fqA+bH@;>uUCxBF5)j-yZgTYm89^6 diff --git a/umn/source/_static/images/en-us_image_0239476777.png b/umn/source/_static/images/en-us_image_0239476777.png deleted file mode 100644 index 8aadcff911dbca28abb242db61ccfdf7dd42bddc..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 457 zcmV;)0XF`LP)eh4bY)!^&fNe20bWT&K~y-6WBmXB z|9=K5048b}Lb5@xPfTMdZ(G4|`zxj#Be7n4y|06zXu(qk237`!-(0#3bscF8THHtq z{u2RS?QQ=b6PxqDdhd(>|G!-PKf5sJe|XN!|5v{t)DScX#Sj?ya`=B6ni$?Nf_XE|KIfrRXtXNNHqkjLF5>M zVbJ^IJ!BbzX3)p~N4s+V$IQD(vLXNfBgfjWYYe9^GcagrDj;H~v4vsoBWZ@@jtT}> zQTz#(1_F>r}UGwAyS zG341eGAIZTHiUrzEwBCh`ibE;D<1D83z`&G{bTJ437w{TsW7F_{00000NkvXXu0mjfT#ds3 diff --git a/umn/source/_static/images/en-us_image_0274115599.png b/umn/source/_static/images/en-us_image_0274115599.png index 2d2d02ff36d6cf710972106b2f8fdfb0e34b04e2..b20d87fcf3915aac236e69edad9f792a11df1f93 100644 GIT binary patch literal 16728 zcmeIZ2~<s1g+f0i}o7Q}=SD_qeuP9B zU6(1@cWO~^+2_R2h~~%FCL$+X&BG%D6-{;8$2FK*_R4u%DmMkGtl#@^qmJEB+jr9& z+|;*he^;*C9Qb-&&cnM;Uq1FXeanW_g)4j_7AAzd0+ve|2oBVEDd@w$*~}XtI*tI^foA^Z_z_DaSvL_|bYl z=b!S$i`XUW{c4*Y{rTWe+iaKLZ+h)>a6`v+`kAlqEt`D%U`N+|uwYKVnr;zhf7i7SFCuV< z%mml^rCX}zUCjtPnZqt#7uOM@d`Qw+D?tL@VC0A0Pw&|`WO(k&$d9=OShyv^AYNhp zK?-&Im6A&rOlFgOK{2yc#C1a^h;xW>AMJ-3T>Qy;6P!W4#?ghD*M!>@Dia<2%%_~V z74!0F(hQ=1NDvIB6<(PS?RzGbPy1?P`BC7N2V1I@A5U2CXEp9W$B(#7aNc~GT8pTG z92;=){h0NdNh--7dnWMB&Y8>nc6q2|cucBOf$|_qFEM51B2U!NGqfQ_L$1Z%s)3Md z6SH~&y>?zqA457zJ* zxaOka$&Svv!St)RUFJ!ci+YQ&!Jn))`Ap?xA-HI-qPe)02r{KKu>Lt}>`e*nr=mJ- z>;*?yEm=O=z~Z`l=^Bn*rB<~a3WwelD?R=2tg`$Z)68pqbswQSHi#dp#Bc6m(l5}k z^`p}Hg*XiTS%^syMKTnZca8|-9n9Mym(yFF8Dg@&Qt8dmiNflRV}Use2=XYF|Go35}&$C1N7_x|y%gD~GyPNJiSo^%A(qKca zRp&vv^L>QZ5aH8z4+{wjMhW%TLDa%X!$q7oG|``TqQQ4)J|cc4hBSpJ#X&1#fK{Cv zl*>7c4%nh+nw|9Oz@1`uro^PS<5-FEi)SXsJb+a&T<3Oks~ELb;Ek=Ci;iYSQ=gQV zBZx3!IZEuy^cB>5E*zu;j1o>T8%|oHGdO=x^nl4$UI)u155|dA^r#9Y%JaYYzB^)M z5KyX21T>hc**({nU2pKaG!>MQ`%9#C=Nu;?(omk`gp*%SIAp|g4_ zRbMWOz-(@5SIROu^;j)3lbMlPy>c5L z5ng2XClnGY@xzWK%vPl6jaqZaYZK~husc7pi|KN(UZb9oFGd?a9p*fbqR5@>?Ya6) zOxPEnW$<+mDJY-#>IMG)>wi-Z-iO8~y&^{XC9;Jz*(QEQMXaw2-80mI_hzfnZ0-D* zcyy(iVb^K~XI5=vPMF8B%>C+a5E@AZ_L%u$x$3X(1a_^t_A$e1hw;glZQxrzIl`2Q6w~aHK*qI)W6+y8f0*e#vuKP}O z5ZF{-Ziq>-KNDwWwzxR)+@WTKz2!@U6!?D*K|z03?+qqP1q>6_GiQFz!JKUBip23y z);z*RXpW`XV$=PLSieTAkB?N>78-HwUbF7XD|K9$*Xx@9S)+NKvekC|j9GgqM<(bm2e zZUhjI(!k1kR$$f@o~8Gvh5=VsMgxNAky3{mFS)wR94stN^c->7fC3EVH?aF~T7V67 zci!v`{IZ)Jb~vVWUUsrQ`nN|gwt~SjK(ahS3?3Pud?#5h2FtbhA42ZyL|=CSCMuU2 z`1mVKQNR2D@atPyOS^b%>`1)eoCEJ;arnO3Y;*J}J87!kV;E63KP9XIkLFZsz{K6A zT}IlnNM2u!(d>D*eAEbU-e{=Nwa@_DQPAp05s?dCuyHNmG}DhPNb5pb z5gJuSRZhuot>7b7-^x`taEtA;(bRW(sqaBi6rGy2EmGyTy>Hs_gnhW#E{eIYIP=iWA5YOYy4{j)YnHpx_x@-vv$-L%v z7Zs19XJKKaskABIinz6)pVe04=fAD*zSI1E!0|GNCQvTj+wW+?|wo%}dgzJz* zly9YaJr939h21bu0dPiEaAW>Bj99^sF7UFe$3ZtIA6PMFW-zxHH`%B}feF8_P{ZD$ zs$$P??J->8+4SW1a2RCYvHE*G48zPV{MEAzyjBgvaKLMGQq?v~JjydM8w9te=Zc4r zo^njC^*vX59H->|Lu|XkexJkX6UZwY&Ar~VH;mY@m%@I#vf2KgiGlux1_FTF7M9}P zMTPBG!?13?d6_!r^D&#(0fcF3%$$8!s!9j7-Vy4+j~jQ8}Wi4y5z_w6Mb#G*UQUbiy|AGN55GuMI^($}@wI3uWfGvV^yU zCwd!l@BpTre&lVdn&`(~;x|m)J?0zYl86pFwyT$U;`Kw`%;5@8dt&Yd#mGWu0X!oF zH7c8oE^vsewJIfvOf#qiTf_Q{6;oUpJ)d@HK$V$vgB_QrCo&ZsrMNCfWvf{wUca1{ zbsFM2B|6bmj?xB3V!UgGx|n5^b`BWJ?SyAzAtpYRa>a~Vz|ccX{AeXwz5lqDP$Ssct#<8 zuXm>rIn-pqU!iZ;bl=lUn@_DsTFK@0&}O*OmCYg4yLU7uPy6oAUJ2Fi!K<(bv>h|K zm{MgH!E=Qq_7!_Vh@*p!wN%b7Z+E+eOH$7XWL&(@tj8>ziTsVvmJYj|FQu#XJ~ONY zrkv>oZ1%ML?EEpy9Jo;tM>O=N9hI}ax8R?8Sqm{arH~FvNIkYs9+dZ9lvtrOh97x1 z0U67{uRexr5s)<|Ax1@y1;O*+6yK1{*PiE%5=bcPy)7>Zl@;8$Nh@!UDsYu-&{1PP zgZU!9+b>Hr-gbB`d-tH)caz&qI%$!5m36gRuHgUm_kg*2)q{Ci+MuXYS* zI_fC+M%I_lJlqc4P)OW^^Zes$C>S{T-^4`!XECH4Lt&s61)B}fhw&dky$8@QimtTP zJieqsyZMW+js8(G4#YZue)?<%S!wvDeaj;|b;u{or$^0KE+1sMIlM^mKU!##m+=_Z zjahuueBmPB!c}d2a^o+cl+tC&tzTdz2Qn7R{*w4hml1~&`3vm%^JuNI!8#)_d}L^NTq*Cyu_mljq^UJ z9W2pN5V9rePM@~!bjBovsX977S$_TUm-zF=%f9u| zQ!vM)@#6Y;I!QVg91Il?(ao~F!rgcxI=PuR-@tub5z8;_3Z<<*53{Ue079$7ME7ZC zE2A+m9zLR}QP>NX_A-dt^@|ojCPHAFU2Nl7%m_hE?{TYb;G+xiYh7LJESR09?&88L zk1^4})VtqxyDmF{M;dTeWI%UqyQyOl|Ap!d@sXFK$E2{p(bYEd?)Ax65Ev{ zFv)$Rqxqt~Vr&G7rCkH|8x!Iqj$+Wf=9bSPKa|xZbXcK$-b7V`Z`Fz?vC0%&RsSxR}+hU(YwP=nW-fChe{X_bc3!)TIaJh@re9g!c1_`-7}3lIpA z0V`@Sdct}PfhSHqo;nm9b&mIH1I2G`Ums$kW5_9P>2i(n(rb_4ofi!Ev)ob(+g4X{ z|HDvx3&tno*A~_&1EP=j?LG`a!%BTcPs%4&?ZJ}x3Ss(`VyJB0&C;0WkcFVJR;jD~ z@W7mkd-)KEvCUW7rZ2-xE#^0^yB;uBs6yr#VHKlECB8G#=9{oHt;Fv+R|M>84tDOIxvT7IrbPT_)#~m@iK(O+%VL*hrUG!kKN$*VX3WL|pR&_b{6k zW4r1OB#O^mTdOOJNQn}?zD309c_peFyQB?A`G>MIAZ8fwVlHo> zusdUs)LgP5S1QBS?ca0L+7YeQ=+N)F)~v}C_COFVgKl+3OA@2CU79ls?WZ}lGcJJF z%X;0?9;>x;rNAM|d+Or@p>bqE$DSV*!}^YE`%neP-GnC=^T$?;7zpXaLuoq2LZq99 z)Z(Jt1t%Hi#|0_d273YS@%E7Eh_wQj4;aja5jTYC1j<&tG9g@P(S(j=6>6W*J}6 zZ|vmq`v<|DIvh|9!0!bCO7!=Gbe_7P3VR}3UTG#bdP>IKoi1Zb6HM}`h{@Wex+BcV z=pli5{=yn>tvR~h>xxtY*Q_c>!Mweyx?Sx7?C^UpPk5@8{Mxu;I15FzIn!g7nJi?7 z?k`>_o=B?K$G`O6W!K75)~{%oDPd^7SIU_ety26E&k%-cbKDzfdI^h&i0zZQuDCH4 zEX_Jt&@@IMERBeZZ*efE5q7LljnkPlHXO=)+0LJ>16$f=!dAxI7cb6nN5!MOH`CK= zN_du8+s_i__HlN+beI#Km3+YjKm(6O^(J|o1t-S^t2`d z&p^-#T?7^kTtQ%6Bydq$@OW>s_nJ4{H;Mn=G8P{N2 za1lqwj(nFyvD67Qpu-QW9Hnda3s&CBx6$+bbIfI%&FrdFF(Vub>!-FNM$G6tqeYM zsTE(=woP|3!(}m%FVYOk-n5%-e~fhyt3N978?&{%p#5mkGf1~MgBs2lyH382b|aE| z{6=eCA)^@P@PbHKe+WV=T`>*f(q+;sp5N|(yowbs>iJ=GuP5hZC1>K5h=^U(}+QV*(uYG1qMObqLtV3UMhkxU5vCf?>}l4MS_&qlkIY znrs1=-^bb$Bv#j5?CDa{VA%(w++#bfn-h+-bigTTu+PTx*=i8TXeF zjzt>McVM{i_hHt&0f-B8(Wv;4m5xwCMR3AV#8}dEM7RD*RR3=7SOnY#ytE3a7tJ=K z^80w9upt77nkgM7Y-13h!6V_hbvI#;Xf-&f9mdARvKtOX&km(IH+fzerg30+Jq{b` zRXZ9DZOR28^hm;`FN=FOoxSBs{`s(C&XeDmsLyXnk+Itq-&La@)=m4Q2$5Q>NI%#k z=atJ0Bcf;C%Zuy=c=Tw+%3fx0D6skYi!`{+!lsZ4mgi`&bvK{b7d}5*=NU!z3_1vm z<&5vz+rIw`MVaqaZagaE9+nJp%0uygjFSMp}Y_m4R1&$`2N5@#5zFo5p(f zWhL_|tR>5G_eE_u4;2h+4hEWqu{A+50XB$t{7D}vGd^tR3$UKmR@PN5h1(r3Ic|sV5 z`7xI9J;+W0!0pD-X?sDOXu)N;R2+1kW1mL0k@?o8c6mAt6S|C6sz%2K&!ja)Lxnb| zCI$hghM>EZ3R+3h0~n_$@YEqDgy`vF2;y}J*~mlU$;Ab`sN-voxZPsnwy=Dyf5?GP z$`82C8^#xQzU9} zfxT8iv`rSJ&`wQY)y52C<80HPqOQ)POk!qE+Qp52Z1y>-OU$0D9~kebh!-S^9=pcHmw*!#=DZjmtoL zRhSQCpf3qxM$GDSG1RDwNN`ariXA-@#gC@W(cy=f6_=9Vw67k=y^Nlrtx0J95RZP| zy>uQ`zR%JK?9im78^*yobC0;C#l9I-AZQbk(;Nn&%^OOcbc z(Q#1*RQSrfc8Z}z5WAWmJtMRFSq|(qy0%T6;!HhB?fBJ0B`?xbB`LvXPY2*ht0xBA zs><{+5yCqcj5H}WY3SwSHiqIt1hKlJ!|o7ldo``T$z=}H)E0_1oDIWK#Rv+KO04~t zWq}BswJ7*C{Vd9@iZ~oS0>OfNImgfH>4OPs&iBkX|v0HQRv+0l7aK3#mtj&IST8)`OIupE(RE%a-BP^lb(5675G+N>#b}pHNkGL)F2EF!`U2t?0E+k;W>azf> zvgk=D=NziZ#R1NlT`jc8yNr+TS#&*Oba0*%-60K%QQ?++4Qj04?VY-{;}P(hSq?$S zwi^(8$hU)~$_!s%dB$Zfd5PGGh34;I^IZENd{h`SI*!=2G&siz9*T^8C{MIZ9*3AH zUc41)Iqm%!SPus3W5x!3#opsDe8qe8)8J^*glo5T6qVJ~c^0%2*af!1Nm9bi__tM_ z%j+RJ^@JOIB%Thj!((Db^4Za9hafBBzMK8coz3r9wa1G3U&lftxK$H?~ z?X8*k)<4$hqU=O~SKN00L96{N;&6U6)RsJYpTIYChc%HeR^?ZvWxME<4!hvVqv2>z zmRUVk+)v2oqr@*rqMzco7nfO7up~iSGYL{fVArS!`|1v-k!d6zq3bwhF6i*afocFnaBdU&dzYqKAK=RU2*RJDXM3j#8Q*J>dC34>%Vzmzu8WORnq#;xEP zqRG=SA8<$r0#R=5(2pG~7bhULFtUto#g;)e2y`bk^u;J9irR1V;c_W}-%D&{d}OkF zpBkgMDpvMKT$$0(DJCABH5Up^OOU$AqFD~+O>1||pVp7bdKlP&%f<1Lqsyy>V=t=@ z%5EPjF74_ET$FK>C%$}YE|?kME*$0}rbwu0(iuuX*!)Ri`P$shHF1zwB;=rkR(TjW zQQ}KO!8o?}rB`q?q^vE&RJcLOP4!@_5n*6VSAFgo+QYTq9{~7NR;KeB(_KgW9A)!p zZ7P#hrlZ$mNcX^$X2T3U@Vqrq0%V@hW&9n66>b1zPU_m^HZRy-;dFr>7A&p-H-6L| zQw`K2^19tDH1_&hI_2uKgm0t|#O!4}ix}uZqs~<4;xcLGCByXRA|f#5wGKoEMVHC8 z;)Z3Qw{w%E9q2StZ` zGShMFE*1Tw;}iev3&XN7{;%#%U-%as3}zR7OAt_&zdEVsPoB!|Wy&H`F^Wwb+l3pW z0z!S4-FMkQ{z;7-#UEUged48_@xsLNur-*exX%e7n}rw(z?)@*0Hqpa^_m03Maa%E zjVK_)Gy~4ix(u@4eF6^cH>R(QthH{9Yx2m2wbdLfjf3HyUeV}Vc7{vDK?gY$5($ni zp*3IMs?l#zD)$aaAtt?_2$OCW#E9~OZGECIObc6*WR6=rV;Z-IC8r1Gw`ti#FI7!x zFGNyib@SJjD;FMXRi|*~N|wHP@Z3Rm==(8kp`3z=8spQ=$At6gyo-gS$n10D8FwLTU=Li7pG;^?GK56L66M5QOgo;zr zQ_BiL#e8*Q`g;8{|74%kAW+pEV@}_bKSs8EYu+8#vy!~_xsXvIXakj3pyvYoLBbRm z65(-w$P=K&a;(B7ucu~8EAnz%7PnIWb84m42sIYMN^OMijXQDx$WUCn741I%%CINv zl4Q%pYc7Y0_JFAKM+xMG|AJtfby+0OERtuDI~^od(G1_LuF;3kh>@@^NVBM)XSeGg ziTW(JLmo)B$3}-mZJ))>N4w`9tz;|EE zf&OP6$-hsi@u!(l(zFB8bZkqmEQCo`7a7?b1XFxBL^a87!>du?gw^&pbKPR6{L!e5 z(xj?g*S1!gSI`3gp!+KfVne=rqKK^982E>=;)n%g@CaN*VHa>py8KF0)vPN!Aqb}* z_}ExcAsIMpjsBRbg!St@Zr;5U_-e!LR=MQQXYM+fPCe1&d;@&7?v?kOv$u63b>9?e zguYJ=y$5`CRekZCa53QuQl+GICwP|{WozOOxQ)}tCA!IxOVE}E^;<)bi(5F z!>uQQGN*qVKugH{AxH^%H1@0CxfGT)q><%w#aHEY%E zgEY-Ja~wP}&B?vR+n#CyI(lq(_nO5@CM(kT$MGMJZ5t3ynU7YsY0?Q{ZM93^ItJMQPsMp@vJCTY!Pu0JNa^Fu^-ATLFb8A;4E6w^b)v&Rw&Ks(R zU~PE$-h`7x_b1u42vC2Y8ZxqEc_chf>=M)%+srGfskb0h#EfwL`ooler0i~R zoAO)~olk;u0oloamkmMlG@1J=a1SWL#Cj5}JDDK#GoR&8)q7HGdh9YwSE2wlG_J|S z{&i)um;apnBS5*~$iFMs3g88?gRwQcdzZe!MMIc9cY6Gf_o)jR`C>9S@pl*NjT04Tvtkbz0c zN>Jk*fnoHf&4i6YYW5Z&q*LZ^Yb9xQOS%a?`$m;GBA&1t>$s*BFzuHU+R8QMespa) z{4auKNdMjx%jq_veE%F)=8U4Wj1qxzx#?fyhZ(hYlwn4VKNespx(H9NjD6kd+;f2& z%wEupIlz7ojcNj^{b|@AK@n!l(U?NJc1CL^R+1tkSr#910jzoPMFdc*q?#Rb1 z&ZZbo;0$Oviln>x{gIjj#sd>zbJ0ZI0|%a{^9o?-ts@+(} zM68d^Xv$l&M>CB-1TG%kbpC8UyqjAyY;a?HT1GATgf6zK!769RTkd0Z z?bD9INLQaWEKj@84p8;N3yr2gbo(&xdqkDZmbF`?HWSFvbx{Ygka<`b< zWK7Zmz;fD%Y>Qs~ZM9h>p!V^|ljhVs{l(4ZSr1B4a$m;4j(qG|c>Q@ely(&2iEN$M z?0*UBZ7}&d3Pk7EQB?F>hKtQ-LQG`Hl=vS{#vys9)x2&&GuD{(S+10y0H-=iQ6sz_ zgjUuV&G>HX03892=CpRmE&nGwlgLknS$QkLVWcx`auXD*k~YnwH_eCDxC?@fSnC@W zMV;y?eEz69)G?pJ9f@DN%BzNu*Y1dx&GQCtR6T~oEjKe7^1))(6a-I>Ve?z9yuC`@ zZ_Um(t&C1JEua^o!o+j+=0?q{6OPG3N1R2^i#a{J#RrUV0>kBAdRV3U+N*)F3==1r zu7_*`=}?>CjyC!aXRH13@24@JLe4+I`gUhTjy#~_BInMs$sAyanc@XmzVI#D_tI_M{a$6Qxf1TB z3%7C5DK?@*drUTkccXO$+ zHhke+_8)l8FVg5dZ{bUKJ!lO{Sh)48stDXroJI@v6E6}d@l^dq_F)`jF0Y2Ep+xcF zXlLKywq=Nf&++f29t$1KNU!S7k7+5d5wODx5P0yEeWUBXV&7wKj-@M&UC-e3U5>KP z_rZZdM0TdzsydKfw(IMMMr%8sQOZG>q@*yT-8~wsm@^^OI2S@{yeIX^z91GdFs65W zvak6^iy;m&4Gxw4+AC0W(BewoAssQ{8YQiWQSxG&ra$*UeN~WR6S&A{7QN;22fpV6 zx`Yt#&kC~}m9zzX=!0QhxBX{xQW!W6*H9T4zgDLEXl{a_qQ`x2$}|{)cGARE!$zLc zDh2{?&grU|9t1S-lr&^KZ+}neM_tV*$s&ceRgcPlOS+!E*N=!lJ=Ye<1xgF(K&U3i zA;GfasqwBS%XEvn#P-DC%c4I%+GOrcV?klhw4DW~ZPMbRm)i9rm~W%!NdVKn)DzD( z6NNk!!*8|?XC40O3lRE(ks9qNl{~m5TBky3ZRwY{Wy+wF8xvKv&fHe-sH{@i3C~di zv5=cFVPY#K#O2L@@TDlBA=l&9tl%3xj@M}oj43X~42fOm^Sq_&Wj?h#z}(LR&GtEP zqMYPzax!N-liQF6lpfYg&)wkxHW(6FVbqgG@wL!E@N}8RM*2f%o~?aM*w($C&@7&Q zBA|SqT4zMdvt?>ohX)eAEfnE_@^xC9C(K*3@+>;dvVwLqoz2(S#SK-q250ti7E3me zmDW>BRe|!64V|ud6~&cr^tgz^K!Evy0%dIv4z~1|C8v39Ob7!CvwzcYoT5}xF>w00 z&&a+z6rk>pHtIw5TjBgE)1~0Ss2q;%ltBhD(?>_YwN9Y_UdzYOa{E&5k9Cz3enxFGc1+CIG zA3i9o!r5UU+UkDl8ofNE@Z#*HjcL9Xu699N^|*&k`^DQaoO|g}uQE8W?8Z_#`PDZuTO?WI%fyu08k20JjkUplTc38__#DcQ$Z`1CnfwJ!k>h=Uqaz_GP`KBZJ;^GR*1Gkdb1UcLKh zv1&nClQq-&@>}0Vpx7&G+{XYrrjdiF_L@JLSU}7(c^K%?d}!9-kX1O41>b$Zu8qV& z%rnP!eJK5{myUIa7>gN=OrLZHc{>D+*;pI22W}Ge8+ZSFoO~cRo_(~)qfMH z5kHW5prvE!eoEU-rZ^$qG_m<^m~q~}257(~0jaq1_om->QiK<0T=$*&s19*H)4GhZ z)v%hX*0}2T#En2ZW>VBTCnhhyn zyPakleu=|p49zP>vQw>alUhcDtY_e&lQ0t?NdHT$##8~;{|)sRDkY^(y2CMO-GBW% zqw&etdvO1Zgv~x*VZ?vH5BiK&e`VSV$-bO5n%O>244V8btP zCFoZ>OpeSoPnNBMZhy3FIn|wKYaPSe&b&~vkW~58-^?FN*YB#vA(7KT=~Cm)jsNN7I8NV@)?c}V-A_Z;J15VaT7Yn<7fLdb$f z-w2)QdoeZHp56sSKa<9CM1vQA$IZOxl*(uMx0?=y;%}j)%v;tKH0DpDErT|H!Mox0 zXdP2&m5toXf1>M^wEjXIh6-;7y^`$L-R{ZG} zi=P9)CgqmTqa}^aW16p_e+nu2ipJ!1FZ_|Ls#N@pzSq#GC&5d#*S|4aryo#9aE`H} zV$N6HE4Rdy&iAjx=nhibTF%~1*dzOW;o#`c;ZdQ)_HZPYcI~2d8~k5>uVAnb0JE=6 zf=^AP`ZnhTHh#AcQQ{@3JTZ)6z6WGev9P~p_caT>nq&S$PxyKAX3bt+SI~5WUE)sZ z##uy8Xd#z7Ry5Rl3(%#WXp2I&697pQe8+x!n_&o`ke;#*UzWr5sGXhrhFWW@9kT1~ z+D?95MjmvHWY?P!x9-20zTS2oj#+5xiUG>M-Eu9E-u^R|i>o{GS5NU)Sr~Kk(MVPh z5I_5Q@^CpN@3jep8en_5?5j%uLneIN_w;J^HSfDA@q9@9(MAVVL%YwfHq=xI-hB#d zbfwJIkByRmOtyw{K!>ty_4)3X1oiJZcjiur$r%L=lk=UWnk=NoFGUSr#I#Er^Xf;! znVYCBUy{7PXXMnR3ssWmVK&`Qj8C*G>2dXc(7lyXdWe_w?m8^)mUS^@iA`x@;_-KZ zn&W>@x(y1N*PA>V_c?FGDXeyAN>kdW`!MCI$vnrtt;Wkx@jpq^4fNlYR}i|`u{oC9muK9oTqtzy<*MhU5~QHdaUEu7~;=6lqLfjtBN+EcM! z;r61uqb=|S;5}ae2g`QmTXo5w?-}7D>Lx>Jw&q*);ulupDxxMH=!F-pS9tYO-V;aY z)5X|)kjyX0f_PoQaiRVl!XHQgI^l7$9>pN;=Y|4~`z|eiXhS z6D#@y?DT;wjIb_S@K-h=P;o49U<%|7KfqGoKJ-20Y%?!+A#lD~JfC}j;~6to*9Dfb z!1FdYAIpihU^LeQ3pj)b|BhIV^=EAPvl2`~#csy|>RUnF;$!PwLHhDB7Rj4%D(~e* zP324-t%!2qE%!PB?Sq`p<1Jl11@;j-xjR6@v^}Qye|Y|g&raEMIEZ`OxQLRG23|?@ zz{tm1(fd$)LEZszrI$tU{j+R*cLt$6=spcOuot7rJ%r+S8`U~0~$OS zo>An`6FP|31Ew2{8mg;Y{F+yxmStM3zb*XWm?rL&~ z$s6*8!~{M|bdX9YH9UEqTB=?1gKH<^Z3BRV^W)|_X9-mKTBv+ki)9IqMvI%C8ov)T z5TYEJlm_t9@0cU?qtV>%f^fEdVU5XhGLsO3%Bie`+SexkLcN>LkIUo&M%ehpP_D!V zTH_z3fGB6T*?fK#HFi=sneJp3zj{C3Lae@OqpBc#(+^@cB^ke!Dk%aA2&n{Wc#+y? z!oSsnH!c1?ALwyEoo&}Y?n3}XisjuVge$T1Nr3+zm3MvCz}R^7Ld+Nzy)5pwUhrIn zTZDzEo7kl6sRXLsy$P5bTuFC3=^K+F4yC!k3phzCRb^;*1?!xCua>s?^kGm-l##+(187-o#wrtn`hkQp)Ya;4^6U2n@WS z82ZfXJm$$~r+E>I+t6{rm`yN!*coCvu#@{~DPV+X0N4k>)hJZ5CraL}4hkI1NBShM zL6YOV$8-|V1%Yq$11ACH{cs>E%PWNchqlmvZxj80)92}F%9_NeD?)bP+(<@A0)wdQB)K@K9RQ%-CBN2gZ1p5b|{~S3g5Yx z3AD(D>-0El)mVfpC@AIv1=ddr2z!D{`kg&Dy}PMpt)Kw34;}MI>>a&Qs=tmo^MB8s zhM7-UFuG*&L9eyP&Bs}J=qlmswJ7eqL=DXQ92i%tUwn@fyn27+2Dbz+QXcHaS@voH zv^jD5S+ZXkz|EKyJLV4MG-?pHp>3Ri3EY;?tA?;WSbOJQpS!=SnoZRzX<=)?H{v2& zM`|eYB#WyMn%nOTTj!B@=S#~kD#!z?vR~dICY7Iq-0IskQC{%FbqQTD-`%1~Sx@)n ztZ8=2Oi9IU1a!N`H8w!$`vG+ua=O9vU5YPEPKF&Ug2gVjb^$HMKpUt*K6SF;gaOP+ z4G_01_pt9Tdi+*D)`1DFM;~ca-fN1J^dQzEM|WnRogwH=fvVqULL3H6jsTwR4dt96 z(I;F}{QWxk@Brj0K&)%^>JFzUm}WlUPcBDl{pv@I1<`6SVL&+2l&_dQuwrom7cDf_ zO*)a+BtaHL?roq7%Q-dXKtkJK@lpxZ)hRI@!7WedemEz0j{lq`(2MzvUc`y^mta07 z%-$mV*9n`dIf;7smAF{zB98OJy)Es8?Ix4UD6flb6S*${&Jx!tSl!&ZIB-$b%#fFx z4%C0wAF9F2b#rKdDacJ%H8{gwahMWt_4SxQnqAL((@x+3$0!QZSzirKzA%tuhT?z` z1huTDVMhNd^+F{n+Juk+u^#|Z%Cs0S%bb-^C^3!j$=E@zI-|cP*>Dg%nmdC*0NH$> z!7E9Q-TDr>Ntmd2V%&^G{d3HqMuhpPl#VArJI-GJVH(>Tda&3(M*cWiK5y;1dy$vR z@f!n6LuVBff z0}ps&o)JCaPg{V2qHl6E7UlrX7k4iZx%0^k6xlg3xK2Uq7O+UbzpMXOqd^4+-k3t( X{VjEy58KOI8>&uKNnHeb}Z7c&glqez{GU^~UKt$;f1rd=FI-w*uDlig?ic$=a zkrt&lLr)xHKnxH8sR3e$5JC$fgg_eK1J2vdx#xW6-0$A+yEnfdKc6S=XYaMwUTd%a z`af&u;bmLvy}J+WmXea%d;Z)nSEQt*K~hpX4u1Vt;G2i$Y%}1W9bs3jPfJzys<42Y zzxbZAIVB}klP)8=u?x8WCit97n3R+(aqDkKC+y`-DJgsV^S_+B3in)`pw_84w z-Il$33Z@^wF)Z1YS^d0_bG?bBw4r~z#&-IBcj>dT+B?2W9>e7n%_)EOdpDnH*J$zL zShF@D(AFnKOYN&KSC6L-e!2Me=>O5Lgv}w0v%GyeiI!VRlafOF?IID~=tI7n<|2ux zVvc7iSq@zndqBTwkX&x_tlQ*#z$7VyJSseWkf9pmjs6DsA2(Mr?mU;3giEyP9llW6 z_)<^U^J|JRlI8Y?%S{x7Ue~MOrUS!0>g_U`mWsB6C&cuG;Hfapb{XY<>=e_C(|%i* z>Mn~tfU)RW-?<2r#Fo?MP)RoUwziK z-U=UH?|{~wGrG3mFL#(9%|4xr)L(+iUNP^sglk zX_raeK%?xkJSsZ7+bVl zA9Oq^%2}|M)?-REm^rfF(_!9T{+;HlN$hd+Xm)_0wW~kEGGy-K!W6x{-OJE?(aqjF zu4%7r>ZEV0Ez1`*kiQ#TL_Gw%uY|$Yi07iGRx}1?s9*F;baCJ;Q!>0OLDjW`O+>rS&I!^=w&W8&yA>nHr{)zXc?_6<_XOg+Pk z*m&Juet+k_r=;|*SR*Lqr?)4Eemq+LbXR)whYa1=J078=Rb5i<Pyv(?I95BcvStINC>sspHs;Ge<>7;LG-d6EU%B@-#w#!~BC=hB z)^fZc`|Y4S-ogpHo9vTkvZih{+ondm6pG*y1kPbCdJ6Y`Ca?U0Asga0)&_S*;#>Fc@9d0lwy8PR@ccAIVs*FR z2YW@88O0Ot?{&e$9aDb0B_DbxtkY;XVyXFa!sEw7d}Zy-ybAxTcxL0L{*|15-Z@&K zOWdos8z`RZRxg0Y@NL|+=fi4kovGAVNn~Eb_-SudlusJAM-cg=9#}SDG<{4E|5KWJ z8_jrNpqEBli>74qF*+~;WkA%#Yul1v%K7D9T{WEeXkWqpVNY|k+_0>Zd4RTD2|53J z)Put4l71bep(WIy4DKuo^SJd|He@Vdq;_v1d_?C{@qnFf*`w|g9mIWH#PEBhLmCAaMQ+>>myBA6rXn8)@M8oWwQk8tC(zh0 z@~jQCr8j^fIRu|P4KfuF=WXDi;i-OHUApqNGFPW5nHp>hkI(*Ktuz~XkoA=CUGCc{`x^k!cl5~qrHDAqSna2JgTOfBkYC- z%{MpjHs3Gc`{FQ7h&Td2m+Hh9nv)g=sG28*C$@zQ{#M!5{E|%M^eSV+`{41Tdbg?= zwNGGr9aGTGDf-8C0TqErPC7ho`kCA{TvGuzeiD!GSR)S;;%hiRIEpnju)CdVei+cP zeS7bezK71)6dAec(2jx5DJxfz7D_ea9?7zbA+$?YpN_T5gb=Eq$Xm}vH#L+Mv;{+vp^IZ{yq?(_zdw;sQ7o`dv2B^{37)V{mDUV*2Xmm8om zdGq=NNc_o4Z+}iT(xd83uH{i#LrbAn-B94Kj!xz}sVGgxkzLs}&01GxK28_BJa+VF zgWbn!;2}S?KGKW2f_Qm#*Q1}Jj~D1H9$(xJN!m(6FczB{{ z)N(X7MdMCotXNG~-15Fv5;K>;n(}avC|T#s?d;8l*FSK6S{jYyD=V31ToMG2KSms15zL<6Md{gN3h4EftpTfjI1bPcn zO~CbzcgqEiF_n^$)l?Q0irf^^=D~;bN8~yiK$h#jn@%lO86y>5qi{aD`lQ%65vOyo zC32tz?%dkdgEk^2sUx*6UZ_E!Y;o#=eHI=KTZ;W)6M{hq*B0mG&)C=dVSKd&e*~GG zi)V4Kt6oQcBwQZ2X3uB>0Mt4|eY5eS9NWItNxcn~Wc94J!uT-CrY4VHs4FNY8*X8% z<`9g9J7UZc@^k!-?Ah2$0orT2hY{(7uXy^@=Rmm!73J^`tC=O_|VW8(GGcbM0k~J|5sUNHxXlzZh}ARwdtQ9 z7rt0JAoJQ=9IzoSzFlSyRl?4xm-pOQi*+Wr(NEhOxAMc`yjyP3%eIYpzOzoRg(L%V zjo3WDy)ea18{9fNxb!rg3qjNgI_MR_+#XCKRxSQ|eSRl#Cn)ZyiV%e*n(1vw*FN^5inU(-Xa9;h7v^`jK@T0JP(N%EjWE^b#EH5mh7Llf=OKo!xa5KXa z=PV5hA-}M~3O*~@xDRL2Suu)`2AdN*r? zo`ew(=?V4?u|y8JvR)Is;Fh(vnNbuUb5damAMpyx`=U=LCexQ7mxf>kG>+?6zB7X$ zb^u&Qp1U(|5FuDg^^L}js8tZu;s2uCAoz|C@%dAtn8plemkCV9yc z-J3p%t-My%@@3b1wh?W7!gaXHeAAZPDA{r!TfjaK{J5*E;D?iXKNOQ%L=h5SeeQ5X zX~9+TB8~-XiqKZGl^?p*MmzY$9EA!X6r~jw`;>Y@tZ<`leMILC&dv$%c~!8eGM!+J zwErG_6&pIxk}lhaV4hE)(%5Y+a;f^!$A2KCgAJD2I>|j)Ftn336?0_Q zy_+5fb|voRjd)KJ2A-DeAF{^aJT5}C60sDs4(^df=d|pJ-ojU!32kD*nHA61aqu_~ zU0CZRD>k5{Viue*GLzx!R3R?@FeY0pf*)_ed|YAPuPdQiCI#|$HXJUW028CE#clqa z<@T;V31Ykw_C=U+j)-X4D^P$i`{*D!%4Bl;unS|&0Rd3k%M8G>q=Bh z^7Ftm@j2f&_|;al)DzEnn&%GNU6@{Ot+LIZ4y+>Lgr~>88!DhQd_z9X@K&^Z=@~V! z9raNUNkni$U6xyi>JJD$b?;F%1yYg7?ix;!J=Hh_Yre*4RsdQ1iJE#^;n}trMNrn| zk@s6hH=t0LoOE8fXRN~t$dKx6<}WFNs93iEz~WBm9e5%$@~Yh<=F}69+#(IdpGY@Z zyE=EEl16u3Vo)?cb8(g48+cZNUD#HNdEFH-t-_X`%-F@xr{ZHkW(>S3K@sDzC;Rp| z;}*X?gOw4>i01e2?P`W)qm5u`C_py|o*y-0^}ew=tZ==#&BKjqf}lhX^u*|8fYPhV zrhA;(t2rMuMrS2g0?4ldGwYqwBel|YEq0x&5-$GAC z%uUA&x)_CG2EBTiTRpO^9&HE7Xn&PtJ%-$<)1a5cq?oJg(e5ZY6|<2oN+e>zCj;JM zTkXrMl8yJP%+gt-d`n&P%z+3XVeWO4|0@}`A14Q{n>LVngt`bA+Xc6jen;~FWN&!O zAoWgjHr3tM#BMavj}tr@KD};LOzZ87JZSdBJr}3AREm1mK{_A3qd&XSb@_C1QibBF zXK|C^Z5@z?a%gQDptlbt>@zRn>ZTF#Zj%|d@_q;SgZp}fpH?O<+B(%}WQ|=9fTZ>$ zA|~Bk@tc|Pi$-h)iVq_|X@9X2t_Brez-$clf!_OE%BNl$vy8@F$rVb-KdBt9n=Ql@nl&R3#MfKP9lAW7Vz0g+0}maYHo1ITRBFw-b6RYSfu6WwU#Fk0+7e$) zmqa|&CA3krP|VQV+mwRSx)PKj;9l$6GX4&$Ausq9a~;pDgvp;6hLyWtM}HT2r+FDGi8dQH4^6J1mAWG%s>W{!M4rti zb^-~pEo*52=g*Q3S?>z24I-4=pi!8d;uCjT3d+&t$EgZ>JGSE{77$_Gs}DNs5%J9$Zf`EAd2vhd_o+VCNg^d-XQs5Lg^=`60uSDbMgV36aM2}ZCx;n zle-gn1_Qg^4o%T#ujzd6sBN~fx1sO`3>?i~I32r!cFu?f(xB^^c+iUxH2@{+iht$= z7Y4+|-=NnYKC{BA@TaF5B}3@Kvv9`ZJpDdr_*?b^D3U)}dKZ3hyfkqMyKT-{%pn+5 zh8DZn<#3PmVssJzZ0Y`ty*Z{ zfz<--rQF=ot7W@>4b@ry1kPd|iW(z|`s*t=gPIa9xrQ=5YCO;mc zwpOSv){+%c31TXz8Y-Gn3>krn2cfA+6OAEY{ z6H%SSeE8Hu;{_&Ua|1pSFQIIj$O>Bs!WK?7N)g;~gC<@A+DyjGR~RomwpLRDY0LhQ zAc*)5&{1|V`-~P2Kn;VS4^Sx$f!aRqAzE!ef4vOe_yRzTV+Byb(iUm_CSa*9smzW# zCp`<6+J{Jg7?^fm_H2UTh zHhm?C{1>y*EqQqHG@r29COLHIzD-D+@Y8)z>ETJqmR_HIgv(x0XL~==8y1y8QLeze;4CL+c%0If%#+< zK$6Q15n5{RUlc;iHE?y^$@qf+0q~DzE_MsChp39eihwJt){h5EK%_G!;j5^@w~?7H zeMUvPf`skfwwujAMA+RFdJ&%4Bulhv$5vm!wUW}1HP1(S^|b|w^;U#$|Iy5%hW#)A zy3kO2zE9oC5p5|4n*PuScHBpGxn)Irgqu}7wB6fQvvSQfi^q#7v7_NpLE*bQ14&aa zR7?e=J6>kw@>%761@Y;de{aTni`T40)X?5*SjEe^1PU&jKRshjaJC8X&5=i(0SxlD z?cTPVZK(qXUUM5QnoU1cW}}{*w6piM5jfE|U*rm(eai`67^%r-XsXGkTW+{FF3<3W zqGiAThepYjd{l!TVSjI4%#rb^R`X3#*e7xNgH8h9Yn@a@Wq#-KOC*Apao#aPSI=i5 z_F``fEJ221sicNj|Haso$Mo*Bdyu4t&^PCTU}4tbBGOx=Hd;<>fAclV zdyz!+XM2LOXz;`C&Ec<{^q_bZW}sV1tGuTvH#piMNsoNgR5jVI_7Lf?h|Ise)^@zhxHa<|b^mD-UwU2{&GdRlKh$z(Z+KF+GT z20E|=g2u01fnx)akI&rlP>U=ti-S6ohMjC7@Bjv`Y_-J>X2ANb4jp^ z3PiFT)qW9%qkxHN2s_8`hu39N|Grk8V*vT}-SSKinoa~k7M^+K7tD^}x+T#jxuS7q zJF|A2E8ZN^4}6w|KY%saxI%6euXKRgEmEg98-gYIRf(HV?4o{m-%ByS;%;EEAHVUw zoF>&~*}Nl8-`v^!1N?K-^4WQViMkZz!GS+5o&2l7Dk7*X?Dw#7)38M^_|)6k@yID< zdJYCZVA&JPelUy?pEW*iDxGhP=p*iOfhV@HRX;tCCddtwpopf3@%W9o)mZt_1@D2m zDpK(!0s{68qRDm)i(L}RK3_%FtVh@5`Jx|0!22x{Gu2o9A!uGbZsl~NAV_F1JlXm! ze&c!{Tm2h~yC3FkqOx%EphJZ}-bOZ}QrW|)K7MU&akGh{I~V=&$<%>(I;(+}tYfro z*IT+GHGEA?zVC6Rn+hoDmEP}9q!p)$$+7JlMk{`bn3Xn#keWz~R>9|ouh2Mu0$$D& zF?|}&yRs(5cppXwqh!i7p^%T59Fxn0Z2lviwpkkZ1Q=kqb_Oy(&-_m7=@h74KDW6# zuY9rb2D^@;rX~1vs=o>UyH-I;T$JFA9%uuwzm9Tlt=z&vE{rNghVv!}CoFS^DC&woJU!1V&|P(hG^P zygf9?t`ajc2AJ=oXx~7Doig;|_|~WL`{udJ8T3IVtFubC7GjgSufE_u8vZIw1{+BA zGoc2BgrpKuRBjV`LK_h{Sd8Vqa~S*X3C)}P`l}$B8zes4Z>=lB0(=2;(TQ2tBeAl6 z9EzF0z&Tbj?RC_m=_4dQBK+rk=uV;x=4ndY=P^j>UdsMk0d&G~qH{XTtsx~m$` zqJiHBUPG3M+8a9)=F>c+R%yM3SH%V;ojq@EL9#Q<#e$AiOGg|(R86F(VF8mnQUWFH zFE%ado$M9nG3PdFE$uO2YvzZpnwOSqPUnSoG2?R~D$Q#bA}m|3f?5vbZ=U6RyXkD~ znYT0Dm$tky%1;ja{A&40Qf}>=J+U-@lNmdY^u-1|?<6OFH)s>v6&{EoEXEYIM&{?% zt@yJzP3001tqRB1Vx9Chg|?;M@)(XnN>!HtZae^^`LoD{pAnUPgnmm`cEh#zmQNO; zq}5chcP%A9o$XLGN+9!LY3L=!1|H&%&>*sv7Nr@Md5D?O=)<|%cpLZ}iDLwx+~{OK zrDa=0whE#^Y!FS9)J#YZT_i291B#-#eT07fB=9#xRsPIfp{KV;*$tkFj@x86UkOqc zV=f|eg%7YtabhgQiMlr1pvqRtb3-i}Av}Z7Fi&>|STku7R<;(fN=-d43^{9PBo=rh z%Fm~P8Qh=w-sIE$ks^iBdq8a2KM?A59wfy}aE*C9(wI%2fu)pzu6Lc%HET4`ds-JV zy~{u5=iIzuN{Zg^YUU7^&bb{OXYAVSB^pC5ic>w~4^KcY&S=ASqltpzD8g-O{&60z z^hzoQe;ZsReNr-7@8{O(?O=gu zF0Ti#-Qh>IbJG<-#^98AZe!es;6vt|3p{M99z>qKb!5Lr=sRHL$&-cW zyeDPnsg0F^E}l<1PKHve*C%=FcU(r9Wmy&$P|He0OAzsO<5N}x`!&DqY^;$0W{Rjw zHxT;a#&L);Po%dy4;ir;xLC-Gy(zqn%kA)enH6?d5+}yezR^68uvnVCzU)9(8uqY;Gy(;P*bCw!yC-f4aDzi5YNabqHKHoQs{Sx zgXYIg2^NwmURO0-HqLj2o#$?=FGIs(>qD`DFcd6ZX8M?SM%EzEYAA5 zpWwUF4h@hmI_Q~ER%1@$plzZ%9%H>8yj2G8(y*BsbFfMi%O(bCimX3o2A z9J#r%T*s-Nr{_Tl@|BWiq?o$QfTakyHJZdShTqwyaAY_haV(BTKs27HVGojxKjDX+ zhrOJ`5G}2go0GWd;#V_08G)!n15|HGqz)ES?%O=M;j0C;8-qszj<1cHgrO1UdH5!p z0smEKb90qp$2Bs#)i=y!V?ESkY%+e;l&U#4bi+IlH$GEeTfWLl@4?v)^s_rU^X|A0 z#ot;R{tUmihAAg}BzL7ZoXA3_lP7(bLfme0SZ9FXF!rJ@1@udxSxD^wQ}J|9hHKT771qK4+c?t2sSV<@ERR(o)>!*=5#_d{ zirgZ$*kcX;tYW=LUc7%Og_%qRrVrY{!%&3A;OtHE45)rTq?#7TZB|J@aW zHGyZ7nU$N-Z%}DnN*Tx|9M^F}u5AD>MqMf4V=*}{YXqb_?e9CqdD=^X!w{%M;GGvj z=+2~$uxHqH)3L))GCi$QJ-me_Xgw z6sQPAfWBt^s_Ev5{7~AN1tqX!o;>HjnYyx$-d8A7x)0l)PV4Thz{2-CAbR1SRO5Tg zbxQ-O&ALq0BI_#dz6(uxntt_6g(7xjkcCojbY6)`Wzz(fd2uWNWB7Qw2ugc7rcG{4 zT`^Sg2}1h{7giJ8`{P|RJ$#qq0z2(Tfha}_pF=Su%%(NQ`pwCJxF;;+hvQr|9g)C# z+6bX$qK?cInR!Q;J3q4W9T840_`F>OT$`IUj9k<=N$+m)>>B=2oRS)tYiGuEKM9#{ z`2x1q@L6lGSo0X%Rk9L4C!i@+VgSSB5g?TL`2itJpM9{hhba$=kBkgoQpt-_k3TLh zv6Cke^H7MY{aHO!UmBI!Ixvq&?)LD+<;@K4^4bU9rn^X~_&OH>$>x{ey)|5cxdbav3(d>*uOP_dxVY zn4tr#Du?R(^x61UU@n8He1aP_^f1*nlZ(W@y|I)$FqL2I0JxdRIk!P5iVRXYG3UL| zZTZ*+v(|KWbADh+H@^R+t%&Q#PYTPbr5~3RJ=U=Vd}>CeliFc4^dhhcSdCUSrD9h~ zjI+1fAco)xc$MnzG!k4k6}KYuQ_(H3lUN&J zEW-V^veE0@fHtZiM(Fz-!-BZEVojs+V?so*M<=H!nM>{fA|B_j_yK^4k8mx4-HH)X zgxx(M+y-y45}9Ao@w(C%pBoLVPPs}9LG{N)?H+`W;~dhSmk=!^eQYeJT}rhZKJG?4 zyNQ)CEikT@86h1)xWw=&wWcPk69LdMsysNAd;in%{b~fii3p6*X$LQ z`?xo(E-LbT{gFe0o8tkfj>Z_X9@BFTd0MyJrNUdPN6S}7dp8XA90I9IRM=VqO_bqX zn0jkcM7awdFUkPiC6I@R^L43uvUc;L@mNM!njZv5sqjN}UK^ zS(xzW9Kn7MO2%sE9f7__`T+X@Q(af>re`+tk&CEBiy#RU?(B^Mzm*o8*zErO-46W) z1Q;^Y;4>t^sgpG^2!RE9_^{8Me{QI1KfhUXd>_Q^Bw}p?&8)m>LNee~A&TZrebJPz z=F08tuWGa-;=nMZut;3g7d3#WI#+9FAP8r;YSN@@#jk3*OCiGp8bW4Qmg`z^z+^LK znAnLa<24>T3=!KJhb;UNytJ~~=s!I94a~zIoVYm^3rh6X#Gl}4{>7)UhHW!r@d2M@ zN6oBc?{lc|Js#Lxd3@BDQj$KO)i!)HcA-wyI;Z{*i^4E}ZYw&7j0;1?ZiPzeG1vg| zL_<1uz?a*btJmU)9`mi0IPtM_5s2>FZbA6Uo_TWgd{%`+u4m?Bq&OtBJZCk%RJC*Q zx$5v7$7M5T3A_gTn^QL32Nl(InJXVnzCYp&NRcA zF)f#%kFuzmEGOQ>s0Pi+-vh;iq< zEpGJ;_e=ZGR_7I|82_rP%sNp+I!$E1E|^tWH`>hJt3K^Z+S%)kZNFFnTD6kR^q}%_ z`lC%jH$aI);oDRT%GPB>4}W9b)^KUCj-MpNa|(k`DkH_N8@g0!0{?7SBM_u49(FB> z$+2%)zTYDl2jWeDMBI=)F#nmd=Ky8=mL=rCkBGlMN>zsJ%#O)?YO(KSXMDVVe6wY$ zubeK$Sc74GepoY>mf&&t{rKv9y3dMlYY)>ZLlTOdi@rt{F`}vY7Cg9~#UQN3l2KaX zVE$CT7(^o4TnwGcje!$jl}Sz*9f|m%bvqx7C44g`c{4ROjctdf1ufZ{Z^Q^;{t?~! zf`m(*f6{C%!{Ew9Uo{hjv^--~PeFu!T*v){22T@J+mzm4<2M!tJAxk*Z}HdK7B4Yg z^!-}dLaojJLfphv0_pd3)5MOgX_EcR1 z0Pl}0XfSNDL2ZvqTzr7`SIOt{0DLW-HPt=`7xk3G@GCmW90ETu4IbdZq$APlE?E+p8Tc?B1~PsOvh`2Z4v0xpQ}f^5Oz<> zC9dx8NBEf;M)`;%D(bvJX-w<4mAzWKJ!842*KcujNsROdz9P3IGeu#(jzuL$F&_|4 z9whyY#J47$c^nNuy5L9A+O6R;ba+P8!a9-8siP#Q6G9KRuD(anbLz0|XF9Ek>8c=5 zp3;OAu9pV>7f}NMQIDE)Q-#*dCU5$>7%F2I$4)BbLPKOlH;khM{&YNCwiPh_(Ti$7 zy}MFdC(J+MvIwB28n!Oj3A)i+M9Vi-&X2B{r6{(iV=R=_;v2Ox(|emh@tUoxw}c}7 zg%SSEAAw!^!#|kT@-{epBh{#Vo5{Yo;KV1G$XqV_KxiQob;G^h8%edBYQsVUw(za%8ivBvPs`Jow zj&8f<(d0BzYasdQ;4LNb=@Re%0^{l&%ejn${J%oahR)6^mOWh5sVjh;b6b^p{C5_2 zo77$-{hc;F!?`T0`VXe|{{;8l*8+z#I#L(kv1$J5dNLG(WS)SN%_4RD7kG2v*{^|D z8o*}{P}TY6>VMOzkPpjUnwSS=PF0B)v-G+SaLG`KK5o~WpMc`gH)&yKv^=h?erHtv z=38U-`7C4hjt9>5f@LD8%&Gih-(N}5-&}tNyzIE%DQ|SJ0YtCyoXD>i^MCLI*&3sUJQ~E{1eW#rS zyN~@P%_qFLN~)zdBslE0%=N)-p_;yV0gSW%t4{r`VLh0}jVATGs_y`GZPkqN2OofO z_WbItv^8vHn98`y*jLUcfjZTZkf76B<0QVRN!c29*hDr+HgHGzb6{Z>8YM;to!Yw& zTN5XRgJl`k?T-&f+oqM6rc7C+J;>0NiH>LAHVzF3UxiV2H+|7VWiJ2UjIFTp?aA0N zCG~Ke#g4`9Gaqd}C(7^tifPdtI=S;-XXn;&=40O*C6Fl%6l*;X^GoT^)=-LCxye0v zr>51I(ign)`SZa$oJs5SG|%)7)e1)~@!4}0ItRdo=T`PUb|L0Wed(Fm_V1<0)hi*$+t9q{4g+X8bF|j(cp}jTl@U5sy|Er9>>dBQmb#x0&V6Pv z;|3cJ^-EVymy`6V>IH`QYxeKd3T)M$XL5_kX|EKY-At5e*HSmryY=O3V4sfNO}oWw0v1jSbH?g zl4qaN^@~I7c_fp3!}+Y)oHEspa6NDJ8R;iA+(tqg-DLI?BT;#HZU^H3KZYFK0a;;jKoz=?G-7fsy9B7yrqz5M?}%`4jA>%eyT zHr~0(SZb~7nYL4Vr+U1*?yht4!mp_?rNx)90EqZrM8A^)c}+zxuw}F!1ne&;pIF%} zoGNg?y#e`y)fBAW0JTzyAc&~iDLFd1;PA1YU8G|=g{r*NMJ%-1R`A|yG@n=;XoOw^ z_AsBC01CYyw{@R{8&Ne18h?qr$8!Y^rWh~3mX~gMdn!!1O?Ax{sA9&3>bb`eo)R~!b=&sID2XGIb{Gz69>%l!@WrCuK!9qQ7XNJZM=l z7saffIZ66;JjNn!ZAr1+E*VpW5B_ahexBbz2M!ZX?*OVJaS(6znt5z*-Rj3*^UF>g zNlq#s(cc}GoYb_Ft!#C0cD5^cWwx(6%Mo~!KJ2B`*?4VrZ>GPJxM2OnClay7YxGbZ z5S8Nfku}MSF_!^Lty3)tbOHR5^*ytVq>YfleYDnCWy8 z(YM_fD)HtCr241mFUs-o5jav6b3ZD&qym1RQ>l=n8%KLy5ZdoEjD{&xc z?rv0#`OgZB-a)8$Hz*VaWO0zF<4qi`tnZT8sQ^#8DF)S}=YJP=2xF~@eQkWkW_oT) z!}a1E5|K}w?CY}`f2=>PGhNMDAg%IRIn$5V)fQlX&WzjyN@TndhJ`HfWK@-VY7Sg~ z&YcVfTqX-Qp)ywR!O?sV9R%JCY@DYOUU{a<(bRGUj$SS|<7TG|E<2|wE2=Q#xXYTf z%FGk*KO^d3KX>r;vY@hMGQY8^S-kw|HzeZY^#yap%!EM4TwBf2sx!1%U=q_L>Zl%K z?bj!raV)>c3BDqVZP7Y3B#nbtqgAq}8XJFaUd~c`SK96clusrNbFXUai!EE6fjVL& zuV>_0u>R5Y*Aq|WGfpCfCltORZ_J-|I4Ci1?$d^ru#dY#*8czjMc|#T4k`0@zRYth zFq9xQ#Q0rU2b~>>OB<9L$mJ)JqhVh>JwcXco|5pU96qeIbj_+gycsCqJ8K_m-qXtW zM{s>DF3}Nli)Qz>h z#JLEa18LZ!NR=L=7}X?S_VJtP7HcC{e|@=ssPl_kbmLx$zj98$zeoYBE=N=#{bt3O z9SCf%YlU0BsdbaKUX~Fze@sEtA72;jzNb4GdDtohj1SUP%N$^D2L4fhJ$o~^mlhF? z(pHO%QOHNQXyy?(+*a0p9blE5k5-|a3)?i}dk*y&R}Zf2v@3)=tBrI7o(RIQylCB1 zH%wudj_X0O6FO=gv?<`l->h*&!prHB1u>kF36vSz^Dsv$U~^|T!6mvgU=5ua8{hra zW>HHIV%cp`ag1vs_dWC8N{WeqhyOX1or@Gwh*5shMPNdltqFw!6VhN>%=F;^bS77O z&z<2GU+fH=I71!JfbA(EwQP`xt?OC8(GFe8g0#R#aw}b0bEhwpfI3|xp$pv8yc_Gc zfkJXiysPCvE;aWRL0nqqZ&i$Y?{`jqMkjU6x57sR9nm$xim0T4gg2qiJmq{{BcCur zv~lS4=i8Iog&R|U@%b(U+}20kVFa60p~cBV_^(sE$A1$1l^f`_WkWw~*^sj(VRlEg zN^dN>D>^-TJ6t5N?s>ZCl<$t`&3{J!wr|4-lrh|fkIt?-<9RGV*o3hXqm%OT6O8bU z8C|HPx<5s-B^Puq+wx|XIxqX!24|}G{==?Sf8YIv-bZ)IjQBu>^6#6nw;de9D8aaIjK4>IqBHXYpMSVZ)z=)E>eRG z7tc8TEkbYI%LaxxCntT#nmV}W5yE?aW?!11V{HKJtogUdjkXa2=|-(Hjv4Gn1tR%& z-h%`3ZU8|{K|01ARdTbu^1VE-KmWIQ>OUHANBI~~JfeA9VfTPKT@CF-*^or7v9%=}a#6Pj$mSH?YME^7D*-jz< zIt%#G{}pBxOgxYSX{SFZoE~@|JpK7`@aNCZ*24ypv9ZAEt5ndX7QOWQ!Nle-`tO-( zwRT#YCT*)0fG|Le-Ol{>|DFz!7%S{gmXR6lm0NVGXB4oMsd+v;l-KBlJT2%Yfpxjn zTq#Y(#N@zpH%>Tde!aSWe#Q7VBqBj9C#;9g?$7rT7f7QRK>xk5TX6YOZ!B@_sV&86W<`+59JYy0Ov0Ek5APC+D*O zJ@Bt${{MxBaH{g$`*-*)huC$Ux(&S5?%o^J==&T0Aq2dhL9Cg&^~+7iWXmh7@^=H7 zt(qQFtx?_t_GLR#jsr=g+&$A`tCwCAR+$93%d3iu6Ap@vn@v zSf}qU+dZIhdbyj- z__DvwNOW6yD`9lVI6^}-I!e>}0XWh0X3utW1>v#QWnMw>`swwqygMIM)IAUf6~2XR z3X%pN;U{Hdv35yeinJ=v;ahuYXW2<8<}F0#O4w4HM_YhaXI`3#A}+?EwN23$(_%dK zJs?Gk^_G#0xT=c>Kt$gq3DTGwbn^N_M({=w_`!)y(Rp6XR1^gX8IRzDhzWLOI}mO0 z$8*Wa-Y|BaES9Q$$8Gip;HOsdIfh!vFf9M91MKLQXZ)ncQ#HG z#qVLNTkf+IuBev{KeUUNPb0z9dj+^jT zTJ1fONYCb!8S@M}1AJqXy(M`E9;ioo0sptPik!IYYf0&kwmXh+{zN6 zIzvtFw>Xv=6tsd$2H%EO_tRuPic!j9RO5V(tZdXqqNpW717|tG9Wg0Iiw3z<$EBpI z=eO#*@9Od*b-qH<3AXVq!9kp3ao_8Scsaqt4IqbwSA<`Ob)Jw4yc|FL)HzM6A0-hR zQ@Xw?`^w2=v+;K)`SvOD9AYk{=J&z1il*@V_0TI)fo|-f>1(7;mZ?iDkb~VVzn0J# z5Ir5<6J0`U*oa0`Lsw!XOuHFW6(6kDF>Rw@>5?8U=!*yEUxYw_C12Y%Xxu=>FwvJS zK`+0Kuk`GMTobsjFCduhnA8nRvgarspT%C7(2$OYpv?<5OTut1Y_o(-fX z`R-~JPa3893tRoZI|kl8w6d|n>R&XJG`VD#4n@5dF0W*kos%A7ypFAnVzoU9K_>M~vA<3rqsDQGg2 z?1_!KlR5BOu~=hQ=i|l{ujX5v>f`alUamkYS7GO>Lmq0;)3B8vJYd!B z8s=s&hhp>0OwGdO%U}K7ZLUBU$hT=09?ZxI3YSZQ%gogS}gZQjN zhk;d}0eEp>(nHpptHkA;7J_nN-L%SK&k*4HPvYCI-_7?!5WcC!zX+ zj$xjjgJOF@>GD-sf-zG$@Y=z$=aE+$eoFS@iC}h6RJwWn+o~J78BadHhw#) zFV<$rA_rDKjw)oWP*i@zRK12P`cQS;`1SA+ciJfTmsEa!jfdL|I$)sBTrp#DXe6p=eWKGG?R6*;rIpNATM?fd!iWd}@0yLPkx>FgNGi*SjZt+X*e~ zrr?Fqi}ZF#o5lO$;2A0UT`&rb^;ud|oWxhGw_ z?|<#z{;TTqejpu%u_Sq2%ub>0z$0u9tP238i?UPI|GzV@W!=7T>5n-(7YURBr=>m| zxBnMtwd_XR(K6u45jRA^HHBZM_7+~#osVXh5aC%?9Mf7IdEMOu( zxCk^g^+srbM8&4*|0(`qfAzOZ{@?4ze*FJ=ttauJ-;WpElM}nW@@5`Ae1FdW8jGSQ zCoK5)U9-FU>C^0jf1giR#)F+Z9USM@OV^&*Het?A)2OP=91`5k+y7hEOxWkw)&BE` ztNQjej}jv-Y7F+6$$g8eD0s^10@B&w3JFNB=!tJXRGQV4Shx6}KO+z9W7_X1NMG4{ zSZU`|5&m=$uJ~#LnV)}tewdvy>!Z1_e9hW9&&;16e%@~*Ay-py%v|j8kE}Ztk&8u6 z&y!jQ3dao`uz=qrYxVK`)O%e2H>bu#8LX-AYdtJ^S>I^qQsDAdMg70m66bAN@%`uL z{hIN|n;twr{PX@5d;ep5!$bt7S&wJ!%8HqzH+O$jS!7QLD8?gL;L*c3*YfD$2o0a^ z_GD%)xn=jc?wET9ZV2R%QH{OU^Yobg#94gu{>w4kvbU@KY01auihpiiss)b3c+FY% z%XqP2=0}5>=9&_IqMWOz{NIF!+D<40At&jISmJ@Dmrd+Narf41|?2DTz@@f|(<#(&nadj5?XQrmd@KZB!K zrwLsA2jA+-;r0&Yk@4nkUF-uqzp1nST1ko|>ybN~y4qbo*{es1@hv}I`|nToWTpFi zfQIjid$#7`5pTFh=vKmIe?Udm1S9k<*Sq}tQf&t;ucLK6UE--gTp diff --git a/umn/source/_static/images/en-us_image_0285048674.png b/umn/source/_static/images/en-us_image_0285048674.png index 63e5249b3761369d319905afebe1098e6b2b91c4..d6de83da3769ae500487de81f98b4e44328b9b1e 100644 GIT binary patch literal 19325 zcmd_S2~<Akvf#U_(GfS|KQX9}oheOUkm85+oc% z=>nt_4bnyk5ZXjRh)9!y03igDf&eju03iejf$%n1=iNH@z5jpz9shfGj62>Q!{N@_ z-CVQ%)|_+k=$f64(%;qozHQq!rOTHt-q^Nn2WZ>2FHY_J3K-e7mj4Uz-xrZLY|d}1 z=+O`WKmO`}4t8$aw#u|!Yj?f`e*Z1}l56C)ZF^cb|9wG2y!P3)?dms|FP^)Jf{R9l zM4!n-eH7JnqowymUx4Bl?9*Q#k3%|Q_gx)I|K_A&a^A!-P1B&0$r(p|PT&9O0OVch zFA;BpK0H6VGi-OBUw_VSRra}i+jkp9Ct16P^hK%LMFwBMX@gN`=55V|H>73$0a$EQ}s481j7JthW(XcXN~zYH6{^AA5Fz?nFLguc1Ut2r;4_C7NH? zCHt~JjFNN#Aoj9xq&CTfO#&=Eix3lhS7=en6uqDF;zPeL5tW9fhA(D_7{KkaqGOGSL?*>(TXVKAhlEBM?bG685s4mpwupH1OyC8ZxrcF4pCAfqts* zt`i5pTvsb7y9Lqf+)unWT@%lM75bJ4%C&7)hiyF@kCJFV-BqaC5NRF3mRg>zn zq*;G{(~NOG=)zM?e_>_F2-TGaVYS0=SnMeD$6Qf5kk-9o(W4ejdKj}bG~pdoNfobk zNDSu0T60APiB)rfY+c>!_8{bq09(8?F1bVoIZn%+B@PY3#uSU$5?;;?Osd?K=n#Ua zn&F_dwr_HEDc9H-q$kXw@A~;NR7h8me=gbUh)QkFpHwJLq^cBf6znW}@T~m*#?b<|P&n#a~r8CH%#;b(d$0B4 zWehQ!>;4PUlj1kr3C10p6b747rK{?PAmV;E z(}?r6eP-=ZTCW0Ow7YS9aH;o++GjAf`V>T6+t`A5`AIV+ndwQoZWs%To`WQs*TNAj zVeH`ARD`1%j9}Y)Gq-6<=Q1rVeK5Pv4BLV3lr!tQSF;(3c4sTzO$P+ks6`6A|6z_b z1O&_saKAc=bPy(RQjo&Lpdx79> zV;C_lb|&)y`&iZX?wi-Jti3;&uwL_un6o4#vW|7YJ==r`Wn+-KkV5k;*rZbr(*mvkPSK-s&iG z*fULxoMN=RkI$z)Ei)vk_*>dtuOwD{`Gg<6TDM90wl}#_BT&k&oKaZ);`wmlPm#Qq zAo=+qceFW-w$zk>Dfd2gQ}yATmWXVO_^`wxI_oYmL;kAAiR#iU{W1z9xrPMa3`%8& z%B4(qa;YHO7}m}{mDPfHvRz>wXO~O{a!&_^AFtBM}FG6B>m!~x4s|J?x zU`x!p+xaKb3>r<$P^XMQjP~11uFcv|?>ui|YJ}ZZs~Q5Wonmse-2q`%4JCdGf?|C- z!CKU{l`O=K*@}ii(nIIofXl)Lw=lEk3FdZi21{6qTCd5{qP8cCbcpnsrJ2fK8}cci z)QHP7Qg^M+YV9k~uwx&+FKOMMvG7^0?0wxa=gG^i;;H9=DZA}$49hajcBImde5aYV zAj>l*augGlf)d{lk7T%u+YQ@)!ZN*u zQn+zw@=cmS`Q@jhX*W&%je&kxF!i}U1Cngb z7|(T;yjZLchENx1HG21_czBU_^)<uh_gKQqBc%SQyG)%9MTTfc=` z?u#GOnS+1xXL+aV(%o>_%CUpE)X!S-R#7=f@Lqe!JFAMh5vulia7cM@Fsh6?xxyoJ zi@{2t2WNH!heF%A%(yWc!Wp*};s8vy{XbP{{^Kf|W!@XLCZl6C3lf)D^NS4o&OOI1 zDB_3$T4W{44sX%?oA>5Q6o`2a-~l#kAB?v0gL@OIvZ2lHmo!8|9{*8lwS-Sk!mmx} zoY4_SxJ?*ru0gkL8#;-bCW#&qyl1dg5|!9I-Wd-iumC&!`D!$S5O*LK`#2CnyOPS?nP#a#rK^Y4J$Gw>F(M`w$9nHa&tI&&HaZ)%I{)dOxrUuH#6i_g zV+Ov_@+kcKc&}uQ+2Jb$7jiu2tSP;f}X(6 z=aW1n(R#x2QN~!fjk)d(y9X~dRpC0%1}7e`o`x%ThzDE)@M0u*u4d=f%ua`-!`rB9 zoz$N_*9Sb6vOLkTsKs8J)(5*(Tj=N|QuxeJ<$SSyVo6<()<&w*hd?8cw`Ah?vGA4O z--UZQ6?sn*yeXqq5k}-M3=4}%4$;j3*4SeY@_Zw%qvv8%hfhxXJbK8vGTMH{EyHk{ zB$0m4lQMo4eExc{G0|B}+*l=!Iin|?TeK8oS}LjSBaw7-RkVnSE)OtkN1V4K%>nju z?(Y2i2UXXfKzvFb+KF|`TU{A1175t3-C-li41~5jD({zT=b^<2XD$RoGgDiRj;$0=FR|u+KHJXy*-X=Jpwkydd*SM;8$*lf!4mS7xb=kv;6St5 ztkPO?`wR+*qyrPel4sb!wm50^OFJFuq2tETijGC~ERnUBKcmvc-#WC2mQ!{sVORYy zb0T|-n?G803mw-4ctzlf)N?~RKifFx0qx!kVRnK|yQ_1hoC(mC=w# zu=MJCH^5HQ);6rQ*Hg~jAF5;yVBcX_W_l07d)UP7jbLcVu7=tqss5^Ua~kie4iAO= zprX_oCwsYhY2f8)W+1QtTfHmn*3QN5VqW2lT%B%yJr`6jgVARAw*Cx*QBTV3Q-Zhm z*)}L>8A$U0M|PkSalBR8ayNDHDs{hNny4trt!h{wje4B=_@(JLI9(pWnse|nq6qfn z1l6Nd?RW+v&{HTIePm(CwQatQblF7`CRPf$TtB{J2WUL zr{qz#G3Zt&$kKS&sZlW0?B1}UU|nJu6qn}I^u1ulLXmKn&V6D#L^R<5c3K# z9Yo90IJ(7+H`%Vu$$*1VWpeQe3mriprql>3rlGVF$>1)yDE;@lw?0%(e zag{5>z{7&&+54XL1IZT!qfI!MXj9J{dk`-TM$IUUi$w&U-5PYj3>N?;z$iI2Px=En z2W^?bU{FRP0YHp=TZ$-7ofqmS1ZM&kqJAQNi;AHjQrv+J#oUG_T9$>WUujI0tgX;2 z_u$uO{9ElYtBjy43si@Z-Aj6r!K8VvVO@qjR#{&5I)Aar=L|nG8wE48*n|D ztM37$hn($hpIqHtE;xvp6!^IH{aBWTSdSY>I6Dayc@m+)^>-BwRXo53z)u26LB2tZ z%8{_)sE{%T1l2J^CM@a?gJNG2$?XRIM7$}@B=F&9IF*vkEL|DlTc}#dI_w{&S**U! z?Gx?tTsgl25Ua_-Y^(!xQbM6Bsn4vJ2{*xt-0t+DC{xt`Q8U)=yt zxD0M9>E_tjFbu9NF~c$|XcZ6;k7xqRFh1N#<+;%DMtdcQb1K~*&1#c@Q zQq=4U%nlXAPUVD;otLB)cfSyP$Ob|Wsb_e-%iqG#ZgEveOhb4g2OQg~SCIU;;cf`m z-L`Q|Lbr}w~&X_ zp~POul>EI~+!Yi0zARIWBEkPYEca0wL%=91wb`>Jm)jEXfIk}m49XTOzoLHd(s7E` z7K>BUBxVsgLzjfZ4~_O|6FIvw;j~}kHWkmrrrZm z+UOyR4Z+5Ky|dxpYWyNwK|G{`(BC$pirsv$9E(R3}MyobzQs$)91|oBW=neLM7b?a-4)nZz{+Q{q%x zyfHG|*xP&D-AVSCYcOGL8#ih#5G8)!8@@Y9{7k!v^6GvHuVy7^5e3PJ#EAwof25^H~nV3seE>q?xLEnofcG z`qL71tZY%ww>6?~rE#yOY2_+;Pu9NWQPRnS>M0D$@f>5&j)B+eE*CzF>UN|1-<2_n zA57-!cT6pJ!p+nyB7WaD_UUnZcP0c>*dTVn6pB;lhdffi8a95$qUbzAA>nfV1RJ;_)`a#cyu7k_{!#q{+@28dm!<3W@n|7+hwH165GIfU@gs8!7UnlV!7`I6rT%uw z_mn>txAK8C>+zon-hm_TooIM}9qSp<8GMZ4=heHdG>nF4v^x*apF+=?V54&G$~(@8 zO%@WngMV$4pAF5Qsr(ew{|bliBF-*1CEB!EKyzyc785W$woC#f7oyNI7ch>P8k(v} z?ojZJfdAmLa*OoJq`Blw`<{nToh1=?ufi3T@)oXN zcg5sOB{Fu3jq)Vr{!|LYd0B*|0J1^o$P5m_B$U01W<Y$P)fyuDn8B1{EG~3GXbm(qv>XacqW-Q$%`Kw!`dxK%nL5AG~cLL`J zAan`kqN=8;K{E>qt4#A@^@?o9wMmIKq+D#d=sl1H<4>3rcGQ042Q2&}llmRGZgg0C zi?p|jyNa>WR)nU>UOo9@>R2VI!}*Y9-Cnp^1ac+6bI;G)3uRgxBahoBJ}3eJX9BVt zL3^TB+IEd`OD}hx$aSl%ck%7xmgFMR`Z1D-r_~)MH;iVdV?n8vaq!U)954;*01)2FGgzVhtY$~X442ftZS95R=ayjV{1y=7NzG* zHpaJ)anupJA?+jbA5h}89Rp30v3oDYLj$k+qGo(mbFq~C9iKVS{w$T&iRSl&*XBOi zyhei2R+*K4)XRVP<>+UB*zUI9QvP4hI)Tt*A)g_Qjkl!?=zgZ<_9ejWi|;F2oKQ;> ztEc@-cI8aj%%gw4@O$_F{i&Zak3!^lg9rPmEOxoZVeB27s#(!Ey=yG_RKol0Z5r#dBy@sW*O^%h+key2ZY8g8SK0)6Vr z>gR_cO@4KcGf$X%ezql*=>e)JE0CP3Xo9-O@IYhl=BSz+k(>WjKqO9&ldABWqA3=J zdxC*v!2C#ksF&V!-nHTcABh`FJQeHVjd(W43}y=&^rD(`?Wgx$D6Ss9$LC z9_wH>FuB6(Nqr#R^BL-kNeps767kws=+TYyONX*|&#+VMaD~-K#ZpdPF0t8~k z*OvS@1-Pm0dVxT-N2kSkgTHZn&E6HgT;L4NEMHh*Ci_xWQM9I5S#R@Lj5-^0JVCfj zQBlNGMusJD)YMYxEgkY4MS24@Rh%)FqveNC5EIV2Yw25zC}zGzuiNw+Cyw2uyXLn? zs^T-K=oj^C)sJfpNnoE+QV<9&T+Zcn9>bwTowdFL&^(_73VB5CvWh-{(G2A+&nofV zIy=xGrjd0mvCO8^5(~2cuX`-2dr?;W(eje3+KhccXvIk2bfVV2Tpkc5fgX&f*)LiLD?MT=#i0VT^&5jfm(loVTMQj?GvbY>zxS-LDe>;s%4kMbc$v9d0F^0hKe_B^ zDf3QFW*$YUs9KA<_EmO4=Nqx;zJr` zR29XyBdeY~kISvL#U(xU?dC7P5@-x-FI;DL8og0-(z#S3DdX@JuV=;ZnhBbK=d`wuZLFLrCVq zNG6hkI=m)H75`Cuw!TazFmdu!Li>n$iLOy>_D<+`2;&%fhQq zeAa_-MUE2E+cx6s#xc0lOyowR-ZWj&WSm36vC8SAfQHf}&?|}+h^BB+=C-(AfBjU( z>bg@UK6@(CW0q=)c*8HGYwdD2&OPS1Z=nIR(?5CRy%>&K$m|uBVju9INPFIId`gG0 z0k1~F`kzUB4h_)=HZIp>lSHsld$dLK*g<6-b~cnKMJHlN1q-saGvbx0ftdPrYo#KZ z8zSariZsGF2o~o*37tV{vKhjNA`4=2V8IR~GmrwWw~KdA=>*dS$qk*fU+eja44N~` zb{g6r<=&?aWC8C-ijQ;-BDzYse|@5g2BVBPO;xdzDHPLyvP|dJN4>ZuW145KZDW){ zlWbTx*1fuP*8XRl4Pwa|a6vvf*U{l?R|_+K#tccRqJv17=Lu<~%Q3BqDn8Mr7EZ`@ zwp?aOGL&mm`K6U1HmMy2wnXUT;vhfw3#9h6hA`o3=V0h#kgM*;=ps*$wlUKY;y7x| zX)RF;K@SD>bkb-Q;y3W<#JSKaoNM!*vz&d5)eagZLGdY?^l(AcebCv4oC57>AGpgY zlUBuLz4MVmHC|QJ9Et2v_8+{kT$PcVcReO`81A1Bxaia#AtH9IxuY70oh=gxuwuR- zygMLAs1=u3)kWv*N^9H2Bj?)^I+|wi(5|Jg87?vRc%e-jF(LYwB~69iZk2O!=$i7H zCiJS$vPBFLo-|6oz-z7*yAwJg!dJ39U$&@(G~-^0#_KORTV@S3#hvX=^pWO<`aAFo zEuj%7+#|XZ$9C`n=N^!`aprlLQc9wMS+wMnDRmq>--QC$iQ)!mSnRh8>E%Y>OcII8 z+>>PD_b=1leIq|ar1l9#{!QQa zsovmO9mt@Z^FgQ>7;^tQRn~ad?trQ$K|!2k7VIQ@7{(P+7u3h_G@W)|PQrw+FoRb( z7T-}ldI>Q8-v0a1`5h7#T5+pW-)P8B=g2@+cVY+Jo(nAt)-Hb(wL9SPj`B(!5MTqk zh|-$%bU1S8AbFVQX^KT+hO!mtXQ`OBH6OMVQv8mQS_1)FUXNV+WMIAIjBE!ZOHm$eH zTcpldzzx?INtJNpxBkX7#)wL~dKAU2AzFn-?Q^eay-Q1dPuV>Ti;8w0b4U^PZ<2LW z?T&mq9lhEVZL!3PR-c=b#!11AY0s~3A84AYG!lMCoNSMdnNL`ZC#M!L)V1=BZm7kY zn?g#f$=A*3g2-od z+!BXnY-tYEE7a-nKu1XsVK~g=s3`6U#kFQnk)>*2s1Nc%O+mLTP?NIUK&#LIrT7KVt5FW31Si8JH*_ZUxO zK#tRc^FzV1CQ%?%rC5`(U|NAEh5TMx!0zEA25+Bj$Y-9Hjo4Kc@NYyLHVfaBnpMkl36F8tV|+vTmzNv8{ER`|xau{hchcntTE{RK zim?RV0uUxm;@9A4jc%;zRqq+%tiAVodv%3q&N_N7a(Nm#v~Fe#1cS=dPNOI0K#hog zu6EQ~si%T_mn#)bHBFhGi#%&cS6yKKpimQ}yTWK%Bj#!jHaxLzS`qg<;tN6cMNnp^ zc5!Ct2+`-UN04RXH@rI@`!b|DY>gtv?XDiRQ$@6F5Ms3{rvC??NtLL_%-Z#2>EIpn zrE1!PMOhDxXeF#}=G29y1hUo+c{?@w^&uteQPf%=z5}pk;XR3-#$i*Vnq7tw_yb6UHnf)q!_r_(*T~dII6nG$Qxa z66qA6{lf4;iJ7FC6pW60%o2kOmVrL7e%sp7Hu{%7y@2Oqz^SPM*};K?Jw?pG_-0q0 ztI(ydA;+~*hHmh@RV67FUSmXDz8?Uc5<;eGJiBB|!`si**p2u#!0FYBA0;N@IVJa< z2vyAQX7(GFzc*D}^kAr7Hl4SNHw?AFcpzFFcCahHzX1=un6Ffuo$o08UTat9P4C~IM(CB3rc5%MslGzv_P&Ifo5Wk`j>7O) zk_uPpz%ZvwQdNdkXXn?zX|lZCM*t@lZ=2`pOqzb33khWnE(DGm2ZiS&qqmUA`Q?tK z2eT{7PdN=kiC?Vsb&MbRz2EbJc0Qo}*=gj+DG2s?a3hJ#G~r}Vn+O9_X(f~mo`}z` z2utJ7jnq+YZGmkp|M~TOh3r)R84rtFG1GTtUU)=)kYCs-{Fl_y-V-X7xozx$SYF>rCtfW(7Wt92J zam+U!T~p@jvy`c;V^cQ6)LEX0hEQ_0HI3y&0c*Dug610ut-(}(4@VFw+c6fCa<0kz zHIpvz8MWN$xh|Z-MXj3+US2*KZ5Vl1jHf)8g)ffAdgg-HOVjKznBa1V}nNm_G|PX~FPm~vM}zW2!EhTzBbB7?YrCizXICLTx-*Vwdn z7e;P0+WRwXWapZ;q1%9!Ku^k#XLRL7d-#vJR+;KHY+j57(KK;QR$}rn%2UR#U2`dA z^Va8nucKVulJHcdlMY5JETJ|(P64@cLo1a}7Ap!Y6)efKX1*#tv^nHPX{)K0F7B9E zJr&_EDX5oU9m~aODe*}H%fzBJ0y8TOA8N_J5ieJUv-EAIGD>jP;gY@&2 zbdtru`oAl4T}K&tqWhq7e38&Cedf_j2q@ZE*=qQ+3%SLNvQ_XqdyLe^+miJ6Zv=l@ zDuUw|v=wlZjebzuhIPZjDq?Pxd$(*K5~j-X8T3r**!cU$4O$wZ(6(b$c+E$)mE0Q3 zYl{4C1PyC?vz|KtyM%%EoqjMsa)En7FVizpUOY&S@vOhd4k+`5&yLgw z2~$#p?>7@4q=h)t0?zZK-9uvC!l|*$Mk+`%e%c4MP^{B(KZdJT(RkNrJz4)}A;lDW zebyZl^Uc;w{x!w)?OfA-%_iB^LW%rT%QI$z`AGEISZ^%GY#C#sK@|zdaslKFSY;Bt zFWlW=`dR~twK!=40<@yh!vJv!&n6$1;UpJYORf&zRF@GPmW`cyr)> zZ?mWCs(@54c_hiJ1S^BLRFkLftPPHzdGvV}63J|EQOkWY#@s!|F?Re`-Wpu`ESx9e z?%~Fl%a!xz{GwkhUCd1Vm+VanzdH-RlZL2&9(2YDP>PYgVWx_UCK-xVM_1_dH9ubm zeB;2_k9P&q`R1hAoe+2olI8QLeqlO%G&Sbu9aKvZ4$cO2jpPMTxBtIWccSW2f5HDU znF*vT|FNm;R)mY9j{hOm`R|gMpVMvE7}tHS{Fi%mI8em=A9@}S1ps;PKX&LG)ccPX zHvj*(N&cu5JN7`e1P|7kjkFX2&0#-|R_f!hbIr@}I^iFQ*DLNi6+rp_P4Y4qLtPDw z9Jg3zpn*!%5C~AggSaGqPkw2bu3p7HCQzt!X;ViuU0<&@jljzTsX)*D5^7aYREl3B zG^5u#hyO@5N?n0Z4RL!4%y0eq*59H=ZW#f|mRSPt!M+`>_gafeZ-t~W#^&#BAN%3d zj@C!J298{91bUmy_Ch-+ftIlOw`0BVtm~SE3v55JX+i&ppw+{;-hFgG`(}`E zI@X1*M?h3NtuT6$u|v{KEznx?W@`@QU}}#y^BwBL>=g?`dKn3(r)n9=#N$;)HQ8@b zJ7zUTI zL3w`=w5n`H!yjl<`kUvprNw(?xAxOc2WZ9jlUm2b5Au?gB_U6sKHCZ~3fXi~_apfT zVO@o9)Z;BT(5x!`NUz;dIxbwzyD>a}w@r9taP0-#`_w_@d+QYeaijb6sNmqRHbG%v z1ZNsXyBYGLeDH@`uLVN^XPlH8t<=&0>{qcY=7w%&1DzR_CV`;*H+f4inyzutbLadf zO)PRR&V*IPdl;3z`kuV@d*sSRcXFOHW@k{|ZX0Ce2||RIdstyM8dbf~OZ|wzbt9ly zOS4I>7Yn)H)jAH8y}0vbgnNp&Q)#ccv^C)j8~|WJ8fDJ0 z#&K3|Q3NJ8j3rZ=@r8nHkiS@|JIbxOxnhz4)Zu1iE2_(f!6$4OLiriA#gjnw7n@Q; zGYo?A``;WNPkMSt^?Y&$a|UBKsPl%kBlmLQYsxmy?o+kb6Zc-Rf5;F>p#%4-mw8^@ z(ZOh!g8shuK5mh$gplOUwm8x7S6!;K7Y!7z^5d$ZgoJEFn)BqU)au^r71{4&K25m( z@2hn^liutz0?A*~oyP$cb@n&&$$EuUF}7&c1~<8zZJcg@W<{o{e6RVJei%{5t(!bF zbA>vlim`x(JwA|1iIbHa8Vu+=Ao+-A2qx*>h&`D~wSvS~&wvu=IxP2osyEP*?|s&a zq1QZ@!ON$(ldW>G&6*o)2a`hw$))^4-YxtF%{a$u^xB}a zlX@kkWYP%adilnM-j$#1`ek=0@lD@N8y?cP*U~J9G?;7d$VmL5vk$rRY%9^(V|2n2 zC=f1rnfZ|0hD(H}zniWoEGG9(K6%IhRC_LkUM}7{G&fCf9(GA#BtLWl>#j$83=ahv zby>HQi;O{?1eQ-+-}l1b8U-#!lMCL&u(Y(Akm&&$(~J`>A;#B-?J@?*EfgJ1gG6#S z9{+JezL9tkEhTI;_J%xu#Q3*Kch&EGQqW|bx^HM7<>)d~WjJ*XBM?|Pwycm8RL(x*OCy#eIrB+VaUX^mcRV?vuRZ#CjwUB$4^!%5-Z z==LP73dLBcV+5Z4hTHLAY)Sst6hqA_p&A}yoy-QongLgYsSqaiiYobslv$x|#+fgd z7T9mTzHC?;_E!~H>5E5MM$HTD9%m478K*)&_;%OV*^bca-hoGhV6>N}E*kNqO0dH3 z_Z64UNy+3#go<`rYu99h?qHPrx)?u_bfXe2Jjg)ma1!R$=e39yV7Q(_qeu#L{vLzb zs2K9kUs4>_Hod1Cbi_0#zyHz#41fOaSr%t8_ap9cE|#r7I5yEL9(j1j!zNHd$j;1L z9K3FFx-8htHi#r?O;|=breTVd(+17W-H0x?tIK<#I@Z$i(>Y zwLLa&#Na7I%`<dO@^%+7Y?7@Vn6)X&c6$9G z#vI!kFHnme zikGU;8qYkiT<;;zkF4m9YQON+;o|yq0p0*y%5+bNp9yTg@Z*i)uJ6!x)B{-% zHen6+E(kvCo(D7m)K>nm9U&ulBX{!x1>ynjUv1SA2i5~ZisDYYbyL#?oyc2tg1TuQ z9^#k+EK6}cbMvV*&(l?V{+OL3>CMqe|J;cQ{UhMuglpMmSRLf8^W=w2{bmlr4^4xH%cPtJO`^0+R4F-Y_4;&`}<(fC> zIVyL~d7$jbY-Hn7si5vV-r?5tgjtyI^hQWy`s8?ZR8GLhr6Dz7T33b_r$Yvh!`?+W zoDO~L=*26|jrr7AIH?iI{df(lb5i=c$K^hm38>N%l+_z;#Od;%6 z1-k`Ci)-w(Pp3WvAq;P^N+0_b)B(J{|7 zlJKV|M1U=jXF7q_maAER0@$D1Z+?7~$ojlDciXl>n}4FWPyZSFt9=0sNpHG)?$7%y zE`F7}xvxM#=cxX+iM5vR{+TFad&GZ zzsK>Gr#pab*)_1w@3*Q7)Jj~up6-Yo-SK$@HX$g&&*o8_tC(pR7N8E^z)GuRvj<`S z)(x)5aM8e~hCfk+`-Q;cBm=q2!GWlR>EZ1_ZyuESun3x&-kev|`dlo*O{KLq6Qgyh zmlQU2%cLDG&oe+0_&Q>Ybd`BM_HjNtL-%q5R>zpB5i@<-8PW!>81+Ovt)lFgN?02z z@XJL-JZ48QTVgf%k6E$4HfTF(dDdFjF4hyG`LXY0a3Dj^qv58H7qHBqG z%#XFt1i=)T zjc3ZYly5IX0JB<2_B+Ny~~fakW>12Gg4vXUNI2f;tS^0#IE(ri^jf zoTbf@k6(gHDv#r%k=GyGT=rqLuZ$>QUIc(r1VxQ2R|O_&wK>uCf)@g0%*y-cW%UP& z(gvhTT?#E(*8%3mTz$N6+P?r}_pnu@@VDUX!FO&eo}YT!(x z^h1~18)5PZ9ZOdq$NXiR+9M>36zE(A=qixxql`vqlE)^!x>e_dDPi`t-*#f`0udK3 z`lJ;F#hH%;QQG{RSCyzMlHLgKvVg^bPUr47))^Jq&Wb!ceM}fS@=eGam|9q@QxLRv z2@<#mj5V+4ri%8%8W$<{*qGJ3qprXX6rq@&_I$`Mu`$j9=vtED)6AiPwtkN!3zMp; zo9=)U6}8at>ZJa~LGEvdiYzX7A%)wPWjb=9-Npxr%6m+wQcV#ssQ~HLH`m}RC>McgZ$32 zJZ`n%^chIRTFE9`%DJoMfQxFftXg(x+F>s{o!cKATyTjyAvG>nfi$@Hg}X(?S1s?u zvtL;h-IQFsSbGx5I2Bsf7HDW0o&ZG0>L>2MqSXp|0irc3q<%C z`HGIjjmiOI&?RdV&G?5KQsIVkA?x72qPAE;Rp&*Z<^XKpQ_=ZeqIb80W6QMaJ|^f0 zw&ne`wrPb`_a+C}`5bB&3MB|t00w%yO&lqm5xwUpER3Pxt>GiThxPlHWwenG_dV;0 zD6S~%QI?1dqRcp{`a4q&skaM3dOsBxcs#KqTYi^$Bh7@w{pieLa9`R1ffw|Gd)j=*E!vf8 zgW_zQf}z^o@5YC4sWoEAb{fr153lcxCVd~P;iu<3*O=3mi!HTOWXP}eoEk)cyc=eZ z`Ewf%DtH65_Rcnd?u2^Z&1GwiF(~mL?1ip+lN`)1m+fv#5Z__d&y}aV=n(nDXH1rc zre#15N!V41kB}yZ{HMUXh0rTFNL%&9OENaY)78X-cjpE!Uu&w7RvNb!KRw*rpkpIE zfHWB%49JhSk%pRO$OLFi4>w-;K7!<48*iRIdFGJZDOAxG0KGETwQ|}G{-eD`(JwQX zoRoG!0x~&yu{ZV4UOptae)jZmlsl7W8R+KJ+0${KPW?vFijg%Q z5%Vj2GaqdlUSHH{JNGC1Tv#np`M}@Zu!nm;**7%xfPVLEAS1#|zq~Li-Zk++Dxo4& zRV&Z^htXNUC(%QpgT~-Oy(z?nV^{fBxi24OV?8@uvaueMVC@=r_x-Cg6D`+5&bL!V zLnBF-oC(dASqvRjb;+)|NDk9V<)hCG+lUHxZ11o*Wz;7t(5>3nv2lS_O+Scp)3dYp zR0aIdQk2tLUfQcv zhnL>Fxe)}}o<0cLjxbj+186r1cChTy;WMa&ja%QX2fNl5LW?JR^prp;nT?2GPZz1HRP_V87I*|Qukj~;!cT22NV|FZz_S~PS zwNV8?l_!M4Ex5SYL1?3L50XkMxJF6|(&aCim)$EMAcXniEVq+EY9 z-T7yn33!wPu8z#ay<5nTbz||3tc@9|?)T)>9zhBeniO`U?TjJ51=3&f;15kY0{;u^j<;_AtDMQ(xnrkAidW>AVfp~ zDWL=i5J>2uhnfH(@Nu8}lzZQ`-uqwwcdf6SwK#`4$>z+SnKOIlH?xU&rme<$hWpI1 zW5-z4pFGk#c8po}=y%E~rlYee3}}CJIS$fOdw8rAb9Lc}V6<1(Qa*O9B8FxE<;f%Z zw8s+@(6M7|KmPG^JW+^^=h!i;D)mRo2L6^S<185$XJO<+5$35&oNrTKz7M^iEBq$> z{Cl>yjo)=u-k&-3lJm){ACk-`MP@EFroW9H_gC4l%6d~N`fBXd@`csg9F13l)L%$2 zoaI0F3tZgWU!)qOZ)|Lg zhA=SyV^)70-zT8M(Bpqn$F5&I<#pmO>eQt-8GjMS9=^NI{}=W8*^Tzoe^J*B{?85@ z{gj-HW4kKTOR+QlIfj>TFIo{re(dXle|+|3MHM8QA1aOMx935F?^~uY)V)YiQk1*>*(HR+MsNeas=>=>SZKKD$m<N z_Zx+aE;(CYAXp38E;3k%v71L#^f(so>e&_qOIU}7b?rwyp83YMdH~@GyRASl=o)kt zWzNk%&|fAdgndHy2?p3UEi2{XpJLk`=;>lsfu5nAg$Kk9T-1u>o=zWV!A-NUcML!G z%cR259h&Nqe2A*xy378DU}u{6I%m8YGSae0nPB05EdldfE=0HCI~Y^@hdwLgwo#MC z%ga)f!GdO;`4>4brlixYW4TTg^ijQ!&;6+1Gq@uA-1B^b4hzddR*}C;m>GlsH)-_>qlQVd{&&R zl$bf?zo1-Kw~;(nI8nLLO=Cl%L!0dQftcK|*hpp^8MwLE&L*vCG(%{s9Z?9UfrGz! zrc=^;A}`;jH%UXh$LxJQ9zQL`re+syjUYqa${HF)q1h(UNT~7KU+1Fks*HJycKVf3 z?rj9$IxDC_a!S>FEh5ZO=3mIVu}gc8fd5?0RIH@EkZ^WgY8-}4pmH!0rz!l#9>lY& z4bcN_C*1dAGU%d6avQUabqtFJu_{zt_koc$@~TI)4n=J`sX4zYLs=ARRXD358gtcX z^6EgtS+1fA73BPD&^h+v%f`#=5`z^|2g=FAJ{(X@A4Eg@jzhpBgqn~WT`jontaNGv z^D985x|Ed;6J9?D)Fjuds`4Rpa_C`H3h=Q7n@cQ0HfI!mLW=PqY(fScEW|1d+V@Lv zfzJ7j6|a0uD84gZmlvmm`-gHo6UzmM21sI#(d5@j_Y!F^Qf7MA zf!m#JJ&Om}&ZN|S;zxF)WcR^FR+UE0v{dVXp9YH@zpNvNz2BA??^J9I;^K zu{&X0>S^A!t;do)h|}h(2MS~|JELQ0C#krhmc#xId(zyer-m*vpM_OEaM+{km7C^O zPW`&%^h2lXU`CR>m(Z@@p=2f$J`CxwtK60Q#N$vnaHWB)Af5B9)9wdzlAc_-i;4{q zzOe7_qU4(?*fy+*OjR+cmmGF;5cfD#z>enAX&KWxwzq`_7~e5;+T*n9PH4DCDS#3AV@Q3ZsfITp{Gv=Mi#>iCSHA65w_*W{75h=vitSZ1mn4-EKzG$#+u&LrpN-^HD~dmGq8n*`EOvt zz)yX6r0Zh2|NE|G>n*^AZeLKF8iP{eB_8kVG78=sK6AGZ=?Qf2)@;3%Or==R7H+T^ z3bmgc1md}%PO#ID-1N792p+jpbr`Aw=>Gk-^s`-cCa$QJYimTR$>%Em84X+J@w=VY zOC5$w`@Y~qi?lll-qD+QE+JZpf<;`Jc-Y_}TmN%rpS6k=Q7C+uCU^Ifg2lOZ?Wp;@ z(wYS{t;*JL5ygOk>!;jZ)N`1U#0Xy+&la0rhU(KH9kNUxw*hDK4Ho)KFikR&+-m}v zX%jcz1u{|~(!FzCI12-NtFgspSR6Ck88wH((~CA85^bjZw?udeL>%<#b-5u6raQZ| zu65BXS22*p9F3ZqNKm7AHYRc9sBgR7 z2N1&UUF?d8WiC75kA+yt&7soIYwuECuu(+8O(`w2A=kqD;ugZu1{!&H0+iaOrMTve zp7vmk5Z@-Gi>tvtPN@`d8!`5`Y;eP@5T_9$ZVJ$RI}oyR(EDVN<+D+hhlK& zV8y^_Ut8@&cN=niA`}QZgb22~fIMZO#4`&66T`c_sq=S}i{PUoT`|$@Qk~$@%{O1q zzvIL!*-TA1eNm@kPWZu>y*xFQN}A{dXXF6;lMzfeW7pkH%rqTBSid(~uk{w$_?jGI zE8gh2-u-dzfe3@l-nR&lgamVok{x*ReMLyP=_`hyg4WdO{1Jy&M)eKjSGG^ia-5QA zaWc)kdS3=DGJ$3>+$@R(3HqQG1&``Na*t&27z@FXOQx+@N{U#@whV+!+h3e@qn?9Qtuqnq&2$@mcisKaV=?zv2(O%SjT)B zKGz*JXN^yN8DoiieazmV;R&cZWc9en=62(0Y5<*w_LRM8o=L7{-BP=ZYhfle&C<^1 zv2sqiSGsVGvH+CGZu3Fvts@ebZuNN+J3XeUl1F^7Hp#sI{erodxcT%O2e(J}{qIr% zPNHr8im&Gtd*hwVlXjZBmBfqPibV^ALvmfSEsQFi>6Nuw9d_}>V^;(aXc;%D5-#_2 zM`_y*uveE!MQlY!Yk?Sr^eCSWPzarH15 zhnyaBv9w41>}nZz`?!TG!UfeKK5k1jnCgVt^@t|Vmu~RzjQ~qLHvs* zl>Zx(O}Cs}!Zpr6T-tRtNv+r_|KjutS&^nGM5TcS;xSQZ&d7sVa8D>nxGE9fealq9 zyr3U2h%+yFnN}?S*|xK`b~V>2>JnPN22gj`>~joYi#WL;jYBE{0<3*p`c6QQS!I}7 z@|rh8B72frE3|sTudoKb1R}g$8YsoM<9imoh+k66MkA`Ki5ODjDyFjJHynR$d(6GP z672xM^u_#%kS2^D=llzsY5AkDb8jRKUybfY#qFkf!tWO9rJtt1N*g|k*>2@JebnT8 zIi_-IuK8_1Gj%T@B%vhkx5R*$mk@AXmHVUqAwdaTDx9jIimo53@5_A(Bc>;pSck|H z9#x)!O?Qn2CQC*`$XSkhQt>YwLtpajC*MT2iIA;}8KH2n=6coi8@RmX#Qn4EPg9D0 zs`7o3C3Z0Fzz_wRrN(BB!SsHv3+b`+M@D>9fMVXPoeN(8F^A`3H2_B3N{5$px|d4U zvCE*r=@57CFueX(S;9`2Ij#3K)vafXl2@WZ-=1+12f-lMOO~hhYSI27=)qa}E$mN$ z*g)u?`GnUK4oTxB+ht9GEn){+w~1wx*gSaCv#?geXL&7IrcF>hBK1&nHZm*+D^ z)fbned|P$;Q?n6A+LG#$x{-cagrkaY1JlXkGnegaz|1&ZEGvOH!3c`yl!uhAa$@t-xp$ zIEpN+JHl>=uMh#y#(J$y!8QjwltB2svPy5q+t*Fhj#llIIs0TI|5*}K&kB*8RK|H< zM-pSv)^oB0GvX%LwzJgzQEExDyad_ZHw1Ba+IR2rcP~zdT{)f6V6tP^Xk2S)qK1&( zY{0O+Kpbi!_&23xNHI^LRu$v@k&@#5dP)#lLZ7O2Sfl-67#GGWp;;>4iv|iF-=(35 zQXv-Z4bf7H%lk$zUs(MkuRS_m$2#a+T3X6^OeodV7ej=w0S z{Btvme^KWI8UJ*YNB7>IQT`tdd-`WuJZf3}7>pltR{SF1Qv|bB{3|W~ED-nWzfE=% z`5a4q$pjSTZ!VA7aFYLxO$lR`znK0%oh$!`%sfXcARxdsJeq{J{ENL~?XGUIoADap z(f@L<$`9V@BJ%h5W~2!Jy-@yN1rGi{g+W$G9wFrFo0&QPt^Q+5E!B?L+=b8#zB;bu zza{Yb#@I1?eP&s$XPbv~^kE)UrVPdVH+pg`3j38jBcY5*OXJ4>8J8c8j>6d}Yoh~9 z6aGbf$42^RQZsTH{`%vuT^#%W1#UTJ!}C8g?*HLC@xOhTYe#3NGniW6MX}RybuDpn za`N7oQJ?i$wF$Rtvxh@+{fH1_c<^2U?;97n%`Wl5DtjH6XDgTQlUJWq_xdgJ{wb-5 zXY3rp_As9$VboTC_0pT)h#tSHgQzR`yjyC~&zg>!|Jlx-0i5=*ww zt7xrXcavr9(x6oWpOi7K_}coD-jor0{EhZn9fjRT;p~8+*<>rX@Y{ABSs)SyNXh^$ zpS!)e-Ue98j#1D<2h*3&{r>#dTdu?=3sqIs#ojNWyl>2Xx8`+M#v7zpkk>n;&Bg9n z>Bpq0PaHqS{T=#(FTq+L^aI}?C2K4Ase3Rj&*GGa)V-=;Y{Xc4<@Il=*Qzr8_5SH5 zBnBcl_)ool_g6{4Tpl)|($#x=y^%Z@R_iw66{lwAll!8@&zD|StyJ=Q=U=#Nt#LBfm zeUTok*{&~K5+rxYR*WGA$394J|!bLqz(tjEhUq;c89}hX;%9$S>C3ZS2>E z21I6^p$k2d=;ai;cIV!5S<&{isI}y5oX-Z&2SURnDNV}vV{oHGW^ho;Ez@MN{2_@` zUafMCMj|V`*`lU-8+-z>%1HY@(-Mm%Kahmoh(rzt>A^|{R;8sa2Ir5r2v~J1(UR^B z;7;9nSl`jzz3g z+`c@Aq^@&KMLmOVvX1et{;foNa37;-Wl-N+&DWckS5kGk3v`5F6>5lc^DduCtx}7B zC4`PkZ`-mxb2!eAC^cF**xb&6W)^>eA7=1!d)EqIl{JyJ@J*r!ABwoTE_h=)YWCJY z*#iAW%c||xZ>9Mzl^_Qfa_Kt(@`~2)efPamI|fxPfFld(=an%s;hi}3mR9He`wPE* zdd9UW@y$K3ue{=Bm&Zkoy-coc>F-x-X-!GKo&J9DWeKD`)o;e$&mmJBT@&%9B#sC| z?p11=MTnR~ayAqRCHKhq<4_@7;gej_(gt%I_;A}nYF<#z)0BgEL$fWgNV5FsG~L7HvcrcwmT`WL6|u+3|BNSYgB+$!9e28s0d*3aN9ob6 zUyCdsCm_fIq5Igh#jq%GHGk@gD0RmY_Ru5Hz1&#jzMPw7<}mpg=QHE%4qQ@CVLOt# zWZ$?QjI*#D0nf(e?{}4(RX^jA1ieMO-WIU8nd`l_()WTDa5d`NY*a>Z1ZLE7sZ8IG zxQ_GLKuY=nd|7Vl)(?%x$mf~Jj-Kr>EXp#;EE<#e2{Wzn4lk^+a^FdfT&+Iv4sm&$ zFut?VNvKOEek?vbB~23zJ}6j`=$!5mnj~NAPZw#!bOzZEYA4ilck9V-&2@&@o(XQF zncJt15xovB`G(X_be-)-(rl2qPW5$!eH(pK3@08O-$~} z7G{d6P}zj4TY{j2VYUrE2R}KNrpmT-IpwNl&(D1HeD3xU^o-w!J2;{Bt{JDpHQ(?# zEq^_veO!8otY+u3NBHSrZL?fakfz<7{9*-SEc!_sTM5W+u*8h%h8vYi8U5I+id55a z`tBHaX742Ah86H2?zB=<84kBPRBt?bw`X4v1-ssfl>pNyp6Ta-jp5bc5=-b|5G!{; z&W2BP;8{R{GKoJOgSl<9!NiW6h#~{?EW_)E>uqD~KBe(DJ(W}um;7#?n8Gh$l`?Pp zJdIxv770Hu-mr9%W;4vf0gJ>|i+mKpZS`|uY;liBG%T!1V&Aa@q&{RZF7B__fzlnd z7JmpMf=V;%pZ%lebnJSLikJ0^(9OnUzrNQj$Y(5T=vqw>@;aSwbU2$h)ly=DI#OE= zq(3bd#8pVsp=t6D#cjz;bfNY^hU5w#uZ)m_sjqrG)6~gM$-ZEhV9Y%=DA75~ zs|&S_wrT@L`-ne4_YW@MZQi^=NqD&cYK)B`wi{3KdRPK8?ZqFW`+d-aQ%n*?Id0Z4 zPvX9p3sb}Cb4{L_kS-Y#*qT<2*wn!=3Q4EVdXf^C{Wb^k(#6aC=<_q$s0MUVAZ0Np z)1t^{=9c@sn%c}htJ=(V@Yh>|cHEmh8Z{~qi6NUBAav_M`b{_0XsIz|j+zBUY%H&_o zv<#ex$Y7MUzAB6ZvSP0zZfl0kij{0yhlf+0%39}hCoM&{xu7vj_3*3AzC}U3^4!F> zE${xd^wzpi4k26uhYM3KUJFYAUv~UJ8{bNC!EPuYc#RVA4b1Z`HYyu)vJY}2f5=k#UWV>aJwwq6B4@~`bn(BZ{rK!+a7cy`WWTMs|rDrvLp5S z!&P~!rw1728IE_9$}{72Os355$CT>?*TZ=HwZyM4igB*+Nc!)*AfLG5{)PU$~T0$$nr+r)1Ep>nwM9)t6WrXG1iSj-u)uZs{zJ))cKoinVmrUB(S>_-GB-@WeLl&v9{I zJ@tugb>VPjI}t82zTl|Tqj zY*YGdosmZIA>G|S^?jT$-*hDkxxGGQU)B!%P=&pni*9_q8XvYsyYAmqp_OE#!+=c3KxE%8u6?04l%u0l4lJ$ARsdg7s*&7o; z(Wk>6GvsldzDx3``aIj<^DWv5b&wkqjgKi6M7gFXTQvG26ox$Se9#DP1iOCa8buUk z9H8669zqthlQ+8>q*m07?|+-G<+84NVEsc%S@e}%*HvzjHEr$9N4cPyC57>10qj^5 z`Xd4UU0>yQ<=&oF*uR?3=|MD4(7kxq1kxOgO4l7!-rovXB#Z}p-*H)wKd;X&T^Z9?|1PV|wfj!bYInCEChRxkwTm2MW^DvYieUTg z3|euAv$C{U`g8cqEVmH1Iq!|CC27@4Wl-56kUaD8SDogC&&4eg7S5qx-SlhQyzgJ& zT>ec__)3p!;Lss~r(jWn>Rg5_DAI2Y4$kHOMV{OC%q0kMq>t^c2K&^+^*&kK>}9ie z2?@NEk!OwJWaE7>cQ@DMX+qzEw$rSD6ovaa0KhA%Uf7-%Gz%BuEqZESVzf|Zh^Yln zl3bxIGKd8H*%fK3G`XAQ?$+Rx!BEB zrHPG4>0`UEX}#*o_~w=7_Cf3k6Klb(Jz5(^VQ{1y@d;DW-T4?;wlLzqTdR(L;#Z?} z_%UJCyM8q`z(&|V1lZ?3^pm`(usttzI3;~&$~#9q-qy=5kV79gi?!kZt#KrZ*P)Y>inY zAc04TOB)sxD@X0B_@M<@(AO}% z3-g1*U(%&f14!q4ABr~$fbr#5-SDH9T^z;FS=_RaP!TVH6>YT!V`oa}(T?oW0tuqK zwydilO?O7C+SDySt%RC>0)Pgf1u@sbw9j^==>9m~(F$WJ>zXQHtIb?M zD(ti@@eW8l{mj5&<)+UoTA*tQzw+ku5g^@!wDbyV=c*yF{6*P9%Aw5-4{x`ZlOX3d z)FAsQ(zo7ZH1RG~Yg$X(<`gde_qFaqXI5WIBg^kW@_%^k8$Z4Z5#}5Ql>v4s}S6{#b!GN>|{i0Z7w>-D# z4TQDa&aaqX+i=aY%tcd_3XkjZdT+Xjb5j+n&CYy?6iXO0fG&9lSY696rAY^n+lxtl zT0^Q~ir@Wv*d`>YM<1 zNy0?&C0vYJ-*qlC?BRe8RlZAi(YzTFy0q0f3-%d0Y}CDF>W!QKGAZqY6#=B?@t(%Y zDq^Ea@PS1)Yss&@Y)+3EWlMOMlGLrke%h+|_J4jEYH%>~YUMt;sgZPT;n!(5jtY_O zI<-D&cS_$US?g+-G)D#BH@@sFjb&Aq5Q&3KWsDz;^~XW$XItzT(O<9S1p0ihW8Jk> z?7a=Q9>>mB2h6P&m^(rYKpry12NmPrE_>SBbIZ1a-E*5h7ll)M*AXaBXFs`y(X}Gj zmkJC(LeDsJsfXlhIBQi9=Z3UbqqoQcoT;ORVijF8*x9BR4f~;wy9}tD`<$_Inr3?< z-hNhktCD77x*`v3iIL|fnlcpn8-JOyO1pNft`o)=>@4@DhbRW$Z|i_x`gC3=&(3Un z;WrQ>RenjHVdDB^a*6;+utWP|r)ySj1NtMvVe$uO+RSOO-(9-vdiz4_Lu5JN;Z%XpW7 zJHs*4;c|*sOWa*fbk`g#H6~ye-u#L`J$q^X0ixhJhrx1AoHcDe1=iEgs|T;R#SrrI z_88S-ue-a{=U`&TFMw}qf5;evjjrK4Wzs`NDn9}3M_I&M%J=B|)WFA6^GPX-5Tsee_B~Q@Bk9v4{&VLqf(`PmZz6@hrUQ}d$opG&M$|g`C|_a z8vG75ViXUAN}yzSprhKt3~`Hq+}*>$6OpMD{zAgw!R4Skd3}yM<7s^j=Gfe>{zcxz zxLjw&qOmW7Rk;qP0q*kN)bh&_x-|kKB4sP%Br$xtd`(SFVL?IPuLS-?oNNPhG*>Hq z>z&BkDuKTH0f%(zl6-wiW!+4?h6`Y^${AOBwc*7-fy9?D7hmQZpGwy3C?4s=NkjnA zc~3bWoQv6-@!rj3qO6V=xv@eL&7EJJh|-90n3$0`QQ9uRf7qbO!dW^5FVY^l(d63! zka=tj+lLt)5}gW`k|hQOh%8u_Zdt6ge&Bko(~2dnaqa=yh`iq&W~1oW#58_i6+w{D zl<#-I%D__ebKC#MvQMSMiX@;5Y%uDj6B#eJ>U)ys<*y1qUw2!rn<RQH@tOSem>6+z2bd=5yeilYgmY)C9}r51k^rfXutwE!2j4wEa+%DO4$LTC(FE${E| zZ!fp)Osa3WeE0b|u3FFO$9}`sG4hwW?E2fI$Ph9(?j<~EBciaV=oTHDr{k9=swfa`*XZQBjm;l90v!AE;KG z$G0a_erbGOlPjh2zU`ZVzmeLMz!dcUtjIvbySD`l$gO@2Y$;1tP|F?c#yG+q&T}Ov z=(xlkkS22C4U6}|E(w3504C%4U7jl8^RexRTHy9#;`XERXH5TscxE&mN$?NZ9#y6O zuXZHXeT%YeVM^asuf_KS0k9!7e>kTjM!Q|!5FxJt zV-e9k{DLd|>ZevQ3lAPviz})_td+;yF>C=2xq;RE5 z|7J5Yz+t*oEQ(uxlubD>+5x|D*!!U*+yE=3BmW_C5YbSt`yl5QxYn@KFtX%c-0c44+0%Gzzv#w{VO%m*VBTf2k( z-93sHu>!(s_{AQq)q59DqAm6i2C8r*e3Q(j%|Yw^9&hrLpEtOIH>tEx5(%0277#lW zEXhP_a(2Org&GCYdT*3KDUPV%&)Ivy*71+!{K9%O!EI3-rc=1LDq-oM*=&wFR5wz~e|@a2JQr=LX2D8SOMj70J&B+L zsj;k=8mSU+bg^SvNo75*C{6?K5I&?>R9|LTs6zBajxdrrzB*?DE473!-|eGhzeDat z<0U__9#%Iir2T{p2rmiM;&Az(JP^!_7H)lEeeUNOi>3x{lV6-;2NN)8?f`VXNgz4U-wl7I*J7 zEU($U5?l}5j`r>`8lDWRzXAtbjeS$!ZkbSgtgo>vO6$!=adLe@dfC0W9?XN>Qcs01 zvyVE(h9#Y>I&IKy=W1blva`SgdpFyjRhYXIMzX(n{h$fQeYJn@WbTD5#K8hM;b!8w zJhqiSDbhY7Z{w|ePmMA4OM--Jkh>%4CaUfrR_>xhz>P6A@%mEjU%Pk?gCDJ8mvRX1 zyJ${=_46mCI9=lx=|t2H4I_0p`Bh*EEZroSuYpn=yn686& zmX=NCB8udoV6OouBwPerbCY z>|jK}Sm@=1!%&B_M13JUEZ(ETvm1{w>0EUd)iJ{PMQ^(Qw(Nbt3Wt_@W8kZPTRz%6u$*ds#yw4zlKOaFWAH9(%;;$L=ph`(7W0P2x3D%5JY#?wg$`(-> zAxnkPz%|o?THSyT=I1sb5_8B=L*m9BuA4Zh)8t&GXs2^(pSR$W#e}(%Q;|Y7N1M?b z#?mS}8XDz?;%&HFLEOaYRyrRR8``~{3gq1u%ycP>Nm8XGq^#VpyN9QthFyOxvv}fz zyC5&UiI(!jL$_rG$I6UbX#2LGL~v>82gS!S7ld`ZcUCY57e*+dZQ+j#2Aqo!3)pMY zi+1U00k3dg-Mb43d$VQ9&OghbU*K|ZD98Akq<4SR;`)MANkAeifc2XKcUygJ%07g2 z)Pq}6w|j>UdqN*J@2;hS_&hQQ?v|f#f(lD_?r-?rF$G{^Y|F2aJuriw+m2&qZ#9Mh zkJ=ycZEIm9UvNB_c)gWMZ~7r?({198;M9i}F9`mc3eLO?dT@3~UYhU5nNzZFGHz@< z{dsba6SP(g>K9MEiaA*deOSvs-LCq1ebneuw*)i6-dn|9t}6~o7hnBZLuK3(-7?y1W%*&8f0P1dBabt;gSVk6a7!S-Rzoa=80?n>9Y0amRH=0@v9NB^(Ic#P83W> z9DY%U!HgiqPbV)~R+aPwH>~bO)$gu#WN?<&wsIhZgg)<@XJd1t9E-50Pj)imw<jZ zmdf2al4K`Cz2|EthW|``ombEP)EW<6LG)j-&s^%R8SdH2fUZpM6Y9=10PvoC)`ACw z&9I%+H2PS5j99m8+KNJ7Exm(#fyXz)?htHL3$|}D{@E9eTpWFc|74v*c)qgC0thvE24Iek!-xjht?j&6in__JohD4VlH?Em zaF|Jj4Fj#A3K)4Ud7qwDi8%7f&e22I47@$N1KQIJoZ#*MVZKs=eL8MvhE$Eeoxuan*UcA2D zm$aFN+L7FhX!!j2mf`$8j^d2q95=Ms>cX=Y^K(FH0D(2EV8m<=;j6#86*%oBay@P5wNhBQNhY=`KFVN>dK|=eY1`**~lfs4CaSRWe zVp`3O?KhFK-_7`gPkyf(nHz1kLn3u>I!1A3vM+^lrh>NLu#7=NFA)et9t(`nnDdpQ zMb{Ev;XeBICuj~ec1nTt94m99!BTB>pZTEFOFHkBg>9)P1DED1s%Jn_FwLbjTs%Mx z#yUr`n&=v=KiKPaduvDZDJ`O;eh@c1o*ccy?6O&QNF>M)Ren2}$oh1~s+YJ6l{&J; zPCrZyJaZ|-FPo>SX=9wcu&RzL?8UEj=ekP;;TgZ?^~xgPv;t73eT&+yiWnou?frS+ z6Ov#2P|O|c6A$A+H7NJZC8tFTKm;z^*v%8iXJlP!rZ-KV){WJ zGktILM#cWRB`m%GoPT(nnPXzBRCPL8QgHIf{34-Imdn>Jo|uZMdOXvtu5T9%tGKm5 zu{p_+IM9nENi62a%YQrm_M9@t{6gKlm`><;gN*WvJ0XSa2;d>QRrWZT9>r0&^Pxz| zF+&CDZLpYv>!Zkx!g46Qavi9%a(Z8W>WJW&T^p8==acKQA*+7TKq7*!C1`lZvQa{? zMC_%u6r!wN36Y+lW2ytVd9S&nYf5N5viU_q4dLVmsEVWT71%a>;-RP|c6{Q7{a$vY?*FcMcaY4`f#@%)$G7@2di%t48)B{8NoFzM=zi?CI&zFF*;bzVq)v z2Vx{SH23$(%)`-!k(>OK#KroPv%uih>kwCmiK~tTKO7QmKY zbUQWN>Z7x8tX8Rqkm%T~1qjwL7GAKt_8ORY`@DM6W()gx$0cfk>!$SRnUN2zfb#F2 zsOYnX3o3qXADE`chn|jg_>x9(t~dL)bc`do09`xzIv!^1YvOFJzYK~;I)){F*eLT) zDqf7$3eNzQRGk+>&LXfTD{?^6%gx>Qf|un>5&_j%Rb0%ot|W4Bo2*XNWVWt05hCGr zZOPV>0~9q^Og&Mzu&>?fqKc+o2Q7OIH7LXvtLaS5&JePE9D74gx$!DjUz_^C$S&|` zkv)E`4eWEJ!p9^+6|g}K&U;SuVE9_WKF%NbjV<+wca$Z9Yk592q4ugJt%Tt9c&I`C zB%sd4VH{-YV-NwDIQIShb$j7;cxkx>($&FU?)8*B>w!3`rpw^-4<@#>R)vxP-+JFn zjIYX+$*QFI;tOTbM_TTm$|!fM;v79tRp?f=(fJ-3u5_f{ZnZhn!V64BOziJ$ zyb>}hH{?`j!B~Sdc-R<=KkaLwe3|X`)#RzE@rGvcM4`UTa@vfIe&&gy&YGQFG2V8e zK1E_cC=%bSggJv%NSi?-)d3F#DQQyTmn;;kab5>L?eP-VJ{Jo8@&e*GmID8f<-6k}KDl4mmw1Ae^)e=7f2^O@(GvUn$5o0&wbMVs8t{}G9+ds_6I zz+s_nFMceZ$tW&Wu&iVs$jPpaCZ1JMasTX9abd1HzFFl)>LL0c(<9cj%p9Pz*t?Ae)@;uqB*{>yw4To^8jy zVDK9{pRhe(X*_=ap(;V++X?N3C)=lKkk7U?g%AlmuG_Pb`Y7F5wrrs+1r$p!@%D$7 zp)-QTgN?eD?(A8AGL7S>ye?d1+-Xen~zVz{fEn%a0r1&{^m`Pck2~e%s1VSc8#eNRCJ9 z`2dl~$))qA>&|u&ok#K}ms*6Rp|V0-Jkn;^gqo!!|1mR(^j3xUy*GUrZDu5854lm= zEP{?qDYx1(Z1DOSVMFrzYVWYD${3^O`e8|aeZ{I@O;-2EHJ=^68D$J<>?oRVV64O% zl*Hv-8}I2~_p2@FXNz#a=@3(bW19LzddD6=%Be-`mxwo5_21=uB_OmuWn)plTU*`~sNb;0P$r|Ye=I{$D>Q+9ewaRdy7BcJNbIDmJq#S0fP7UMu-B*Up5~v?)ZQ5^ z#*P@K8u)A3*^+KtE@%jpA;pg42@wG?$weM1Zt1~!rRrNdGX;Lt5Cmwi?yY@!--anp zA#K5@3c4(f#X%u2lCa?IkWJ~XGLJx4j)mNMf6=`>Taz%y~R&jl{V09k4qjZly-5i_ zi=e-r2)3GXL9Y6`r@t%$leu0{K=uJPW(ZLttg0zO9DX$bQ%~ud#snZ%!^(oESNo`K z+mVel;rxDC1V9lh+fy}pi+4GDp>xY`KOEY%<;Zy9Xo;;zW}PjT+my~V1qh7n@sLMn zh_FggtLm=bqcPiQ<+pXfH(?Jx%}L)|WF{^-6Qlyo*UUt!nyCwi4ZnJF@>uPOQYGuD z5V^pQ-n9(W?ej#OYjcuehVwRY*tPW@bNZ7{LEyroFYKCnM>eAMd&Br&I9btAe=qDo zfL;JhZsg0z`Z_=Va^CVzOmc9}5!#P$>gs|kS`nKTd@ADIjt;&s(oG>8U4j%gJ zCc~>i#V*N159-as!yv}e>>nTxDUW_a=OZqKdk?x2vA8oU-vTp06qBgY$BoI}_-ktA zQ$j$@15Z#6K}`DkYKn6P%Oq~=L%oL&yh&7NF_pzcyrW*(Q`oLsV;M!Z%m%|artXre z(7~u}UU~hTQWrV8M73r&Hh#7H(HMuWrK}~#c$3!Wk+J*83+!mW^>o2B@~48v4R1dd zju|fzn~&e9%WLgXMKJbR?!h(sfcY^X4fbnBb0Fi{K9YJzNJwot*tPZ&jc0Xuhb~&~ z&Li3xw+yDpHM{0ra$2rHNXpf$C~md8XMjdZF!gtzFL-=47ddzZ+i+`C!?iULv}sQd zwa`IAI@W-L+6%20U!Sdr3DX?gEmkk>=5Wki@)`K4Fd8qoO@o4s+-Jx0X-yW(O*jm~ zc{{<>(;>wTCh^-EM!PNI41Lej9$vTTtHskC1_izVsPcMJcL@;N@x5@DX~NBl$2iep z1-PTO?DM>H`tJ5iyJHoiKCIC%c$LTMp71KefLV1w2Izi|UC|VcKn?BW&=0RTI3dqz z%zS~Dd`ehnj4Xve>S=UZ7L{+hCT*8~>JuqrY9Z~iK5<69QT|S$+!;6c_JF+3!LvJ} zctfO*fiKc#+ePWtol#;}xy#M=h3oBH=VXqz!FzegpM38H=!v+K^F_uf78d&RRwj2! zC1eeE3p1f^sOT+vZEj4%?MZA^gvVyz5hVNvGF)(k>)6AGmec~Bmth!DQoUK?1ejIc<-=9u zHL_mZ@z{I%Cz`4pTP2$sSz*7u7eZO2MX7U-ms!8*h}8#Hy4G9ncS{-i)f*wk6(q8A z%j$L={)7pC!v<#ftDyq|<7(lHrA7Q7vAwIou8*G8P>QXxewMB1HZ*Z~x786uM{X-w zA0fC9E$HtssTtwRcF$t{5z5p=mKhH^LSZ$}H9qjMNjJLtJZoj}2Re6O;x6{rLwPc@fgOqKDO;Y~y#EzSH47qfLx#<>W2ah-R`7nd|}N%?+R zYWCP~5rx}dG|d1V)khbsv4zPO#YWRySFoT@V=K?lzku=g`$C76j>ek_Ib=>FRR}4Z$|#NZ%q0hZo>F4Wt@Lop6UybNK@yb;=aF)1!o0C zjUwFL!~dR{gA=1HZzQLPk-B<>FmnE;+--S4&{{}GM~6i4zQ5dG^`+0duA|lJ49slR zkVy{8tlDOFy=nNbi7tt6jwxiDH2U9rrapU~@|sHt72+>i8oO7^-t8Wli7anG4lVFG z?<&iww-#3KH;iu&*x`A+JrdpOJu;<62wVQ0DIUR39I@tkchL<`MOC@(hIVf*MyqLO zYns8sGMMSsKGrdjbI*xa?7%L+QOVjHekr@imND0c1LDNhklY`hob84ow3JV@7a(o> z)zE!fzBh@v+ATxv`1Kh!w}B|?-Dl}-(uMtO8&`+2+F+B^yM0+_*{2fAL@G8n=hla% z-2F#b?1CeLi#%^`vigcFS6VMslt@I)j^wm)mtX7eXIuhIs>Ok!@u4==Z?a6%CJTEC#{gbfaOfIAw#5|UBa2jyMX>Nfn$?@G|rzgtDO$Jk0O!l$f zr`0$INWM?A^=>oFbcW6Sqjs9d;cfZeo*;$dqZU!;Nl1bL`0&LgT<3k}%Z$}PB3-a<+mdD;G>xzeyd-;-PMXFQ?qRn?X;jz!Qru5gm zpT2*nM7Euxx(9uJw93PO=BY&B&gi^1Gu3f(?WT`@liR*(Ap6(@nQ&{iTTLl*1^@`#i?7|-H7wSK*D)R(rPiu&jPhmc zCyT)=nnm!?7kr{%?qff*0^X)aEDGf2;>4ND?)Wa#Lq&P<8TZYN)ReyzHk zVbJjZNDp&8y%6^~hy?^`J|NoSs15ig|=H%HIy<(qJB{+@8bD8+F zg`TzN8hd?L?5B~5R7g=a@T7tCvawV z2RW#&o8?VW+KNfb!B!82P*tF)d{m*d#{;Q4hkX0N(;9#1tyqhMippa1SUB!RlE+g5a|8x^jy6vb@L+W?W`N*Tc6ct;eyjM z-YZ4Hv0oa!JSKK1yS8VYurg;01=BZl9vyZGJcoFe?gaR~PhfF2OEx-MNymB_&SincRu0Jm*W}OwKvIW}D3-f>!)|h6*+{tH z-V(LI2eVb>IR3q0vl0feC=Muc4=)+kkDP)Eud9Ox_T~2%_0oDWl7?YDMR-{Qe zW?4sRwh=zU{bZtvdcte#*U|aF`v}cnKKEC2nP%jFfcP3?mEmk8AN7YB6)3=p^z zAQ-c8q_{DIawN`jdWTv!^EE_Ev!K!beaaAiiBT)xc>*}q>%-cN;2sRT>}+%fG9fj6 z)?9&z{)D%bySHg9>b`m(sr5E!YRY(DbHyKxsGRB(^JG(b>q!iz1EdUx)bH-9_E>_o z?5}0t;%k_xY-^CZdcQ75yl(PSX%iehrQ`d#$>=1M9a9e>Z?_L)XNULWyI)9O5pvZ6 zVc)HBeEyYn9?#9f^e}H!us|}}(|0NUpaM9gvoO=ayw9f{NTJ1W$5@G7hv4yziSq~*I^>sLLiC3bepG@f>sVqY`PDM;m*Do_TRFm% zb6ssMrPa=Q=qR(c@cT*MHdZ@VvuT^T#co*KHgYxG0Lu!?k`;JkY0-Ol?s3*w59}=T z4683SrSG<~Xt?eLIaa zX4UJ$TIzm>c>~`78!>^E1P8h{3aYa7(vbeZ%lzuE$*}{ePviBHp76099G;;`^<&eO z6HH8C+?^1u#8|;6V+H=ml6aW(_AynLYF2cB$2FdFtgK*9yzXjSX{;`gN-F}5&BVaK z()g53^sJLa25Y}mcHp9icbY!b6L|SizM2h87`Mm2=#CzU^OJCh$gyaz>iM19E$y#B zWa~cxD`gQ48MV~RrMOM&xs;{@bKX`?SvX0?REit@ zQss$iy=MzEUsg>>wyG0%eGcqaPoi;ZaFz5&6W8$1BnPq;bzM9%1zi-IXcaa04r;@b z>cY1WLt6A+GQE*_XtD+Yuy@;XT=1w@T}xVDZw%4bq|hh{*xB?OR<%2!ZCR^%f}i;O)#yT36IjXUMh3!1b=-8LNj~== zub*}e!x-I6-dP=7S64E?QDa5?QaEL^%0;I5iZ~=T-hY=-a!T9^2CE0)Eks?0th1TO4V z{))RF-10?6dFdKAs-fWGGhD2P-71K<7$5_xurF})TC2Ly>?B_W=?Y+$R)1^3rN&*V zi|v0O5uo|A;^cEJ2kSM?S-Ma18;-sE_4|TwVe68XajX5+tU-#E?dmE-r4+OflTt70 zbMwC%|M;rqXdw4O{@ldDC{X|9d~m1D@vLS*UqKK$XuR4L#mRfZOIq(s%6VeK-$n;d z(|sSr0PM0`xq=tSvQ30jE*?jHR8{@vv-vcCyxYw0326`cPbU;Mu|`$b_e_+TwF!UG zyM^dkH_`TZ(E%^yj*jV0=Ks|J&w63l6=LSd2y|$0 zaDKW2)wwj*!As-?QXdzUm07sD7RCcK+#>U^HzRq46&!y1i{PFn57&BF??_cVw!8fo z&)q3)QEhx7_Icq!rDK$Vfq`G2t|0ls0%IbA&&`P{==?-N)zUfyyJw_T$)oAIM7 z78I~yZoy-(dwg;mo#G=J#eIx`i|;!c;2|(VbI{%5nu^v#?$hCiOm~?+QKp%#%#8pZ zZ|t=sm#J#ToKwILPY*x?lzmeAxWg7*(Rt@=`v-Ov#~ZxqT%)yD2fxhi+dMiB!OV+| zGf5gFUbwm2#WJb6*E90!Ei~#EBcUq&S`^jx`;dW%;_H2fiG(Bkxg<@Q^4H1J>LXnP z=FRy@IPD1f0IR?5gqyJXzmE;w%s%8&oc*PNRz%GgQOem2mIMOrhqR+J-f9-8TH-Uq zP{!k?IXZ}tGd9Y%umHsDN&snzWG>Rr=T}>gf$krb2~TgBh#sx+>J+HGEqvFfeEp-f z5Nzv>)tAe%S=^4mBN5_Umg4{++XLWZl!0l(j!DSbLdgD(!XY731^dXJU;^(=N#5kr zWWBJP``7Q|9_gzlNk8+a`Pr%je-L+~C0iK+Q z6D`LUigl$cnV&&b)eWCDpNC|v&#Q~Xj(soT9J47&>h|^;lQ{rAO0x;#HQcM`C2jB5 z@mVhjoB!kInSp9)++Vf6HU-*7(R$B$C{yL(vopN9+eOvzq_OCv@RxN9txD474#SN8 z;EnkQ{MDP%Ud$V>$(Hy{bJy}w>-=WxoFuS|6sE+kkECate^~7!s=SYmSc-QM4Nbo~ z^5Zw9?BBl=1nf+okJtHFmdT&*HM?(9OdH*bp5_FxDWO>lZSJEE{&e|A(b1=}ZleQn zM5n5C`zYVFq=R1RDn0l<+YK77AiLSZGl<0bfp;km(*L7nuPwg9I-zGTMrkq#Z0*Bz z;!+yq%S@dZE$5xbQWdQJ_%PVKSici@1=SbW9JbQcZRER83ZBQB_jT#YXOn=9K^+$8P9<{Sh=nZutClcuto(3aF&SMp=3Lb$d4GKo;85#QQ zAUCE+H&unw^U9x)J3>eUS(R?bM4xi3*`p)(E(jluTk5)AeU5d~F>W=0ChMSCEcmX< zU^qZjggD{b_`0OC9-9~{Nx0De5YvFzFJewJMtbmH;|O?d#MoA}MRFTu2#r-m?wb#! zqZSCHd8zKEx{&$ZGVV-$KI4kfj{?+QU`3T)s5rzaHB(0EM~l_S>+h}PTT5dyRpB|4 zcV2Y1gtp-xMK@K(GI*-1{lb$fb{a^(LBF%I@w=o&=#Y~8&c|k`(C6(Vy(f%5TWU1jXk|ONb*Bh zklRIgcc;C49N8ne7WE0)9K%S|;R~Hn)M8uUT5n<~N3Aq&yscWcgQxV^ZQ|V%NbW1c zBFN-0)q+UUC?YXTl=~GYtCfEtT(xJj;{Wm|_RSt(-#v5l%LO|GzbHw1sz4`Eaor zGwZ9sIJJ(8y4hdH*nI5AVsIDKw8IN^BkFXc=h^Mp(xT8psV`>JyB)o@ zg{TYNd@gN@_{$u<54(yZcX3TQf!2%b>`}Vx3ATx{TFO=ZM-*AwTJ5krsiDq@p-t0m z15W?G4>OJYTm+xhv;V~8(R==HIjR1nBTM_f(bxh3#_Dekc>2{Df!R3-dDN>Ke zx2g-34IwwW4dJDWEvS%^>hGa|L3ZeG4FDeH{Y99u&E z{yFuy_^LymL&3&3Pls@EZNUK}qKrRv{J~wHh?X<;9q_DkzUYpPaOFM(a!(JDNKS3J z>a}q1pTIZ^`w5KqURL)D&4pdl?vb%@pGp2fy6PZ@XlPz_IRP^JGQ$sb8oAt@VMhf@^@m(BOG^4$>o(4@fT zEt2j~-bu)wKT zAbK(~BGV3fj?6oTfRYbjaxW(HWyV&MxQ1`mmcXDqORY}aY}^6sZ&e*K?aWyUS(eo} zdj-g!7!W{yojtc&o}D9!c=$$*VwZCWk#cL(PI|)ErbVwOA(>oo)wi0AbQnHjDL(h{ z^uSPV3**ooxuKe(;LIV}xaboI+-pQCyGxMO^#qu|Dt$519s`SJ9Kt?(K|vj6^LeOk z5(g%!rEJ_u+#ucDGQpck+ei!?S?tw9^lb+lu&fq~RPh>XodD_uZq-NJfq9)Kc}psZkRCd~{A8t?k_3SCYrFJ2CT?duA|n`wxMxVhrs zJ$R`5=6$gD>kyot+c#FE@8;xFT~}qxx3)0p!`t2OV#awJ-uyIJ`{^mRTv%G_50o*^ zR4;7mCWqqQb%D{D$i2Y7bsM;iVQY``Y-}#vEJv!EtW(9SBX26GTtB;O7iq~4-=dC} zm)8}N{=GNfUZe_#A7JD!L6S#Pi;7KhR*(GIkw2Y9Jc!8((Z5+NH#GJ?AweGW7L#~Lgq3Mng8%O6Jt$(iZA`c2|l}nWj^p1 z5U@V}TeaGMb6NMl;2-CD;8{4@*yB_S4t8^QH#arSMO`+LF895xrldw04gMVVHyb7r ivxT23+R`|Qd;*y^OS;}{1&N?+IbR+)}{_`. .. _en-us_topic_0052003963__fig9582182315479: -.. figure:: /_static/images/en-us_image_0148244691.png +.. figure:: /_static/images/en-us_image_0000001699135873.png :alt: **Figure 1** Security groups and firewalls **Figure 1** Security groups and firewalls @@ -28,7 +28,7 @@ For details, see :ref:`Figure 1 `. +----------+------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ | Category | Security Group | Firewall | +==========+================================================================================================================================================+=============================================================================================================================================================================================================================================================================================================================+ - | Targets | Operates at the ECS level. | Operates at the subnet level. | + | Scope | Operates at the ECS level. | Operates at the subnet level. | +----------+------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ | Rules | Does not support **Allow** or **Deny** rules. | Supports both **Allow** and **Deny** rules. | +----------+------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ diff --git a/umn/source/security/firewall/adding_a_firewall_rule.rst b/umn/source/access_control/firewall/adding_a_firewall_rule.rst similarity index 60% rename from umn/source/security/firewall/adding_a_firewall_rule.rst rename to umn/source/access_control/firewall/adding_a_firewall_rule.rst index 7421e07..c4dd1aa 100644 --- a/umn/source/security/firewall/adding_a_firewall_rule.rst +++ b/umn/source/access_control/firewall/adding_a_firewall_rule.rst @@ -10,6 +10,11 @@ Scenarios Add an inbound or outbound rule based on your network security requirements. +Notes and Constraints +--------------------- + +A firewall can contain no more than 20 rules in one direction, or performance will deteriorate. + Procedure --------- @@ -19,6 +24,8 @@ Procedure 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + 4. In the navigation pane on the left, choose **Access Control** > **Firewalls**. 5. Locate the target firewall and click its name to switch to the page showing details of that particular firewall. @@ -36,51 +43,51 @@ Procedure .. table:: **Table 1** Parameter descriptions - +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Parameter | Description | Example Value | - +========================+================================================================================================================================================================================================================================================================+=======================+ - | Priority | Priority of firewall rule. A smaller priority value represents a higher priority. Each network ACL includes a default rule whose priority value is an asterisk (``*``). Default rules have the lowest priority. | 3 | - +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Status | Status of a firewall. When you add a rule to it, its default status is **Enabled**. | Enabled | - +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Action | The action in the firewall. This parameter is mandatory. You can select a value from the drop-down list. Currently, the value can be **Allow** or **Deny**. | Allow | - +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Protocol | The protocol supported by the firewall. This parameter is mandatory. You can select a value from the drop-down list. The value can be **TCP**, **UDP**, **All**, or **ICMP**. If **ICMP** or **All** is selected, you do not need to specify port information. | TCP | - +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Source | The source from which the traffic is allowed. The source can be an IP address or IP address range. | 0.0.0.0/0 | - | | | | - | | - IP address: | | - | | | | - | | - Single IP address: 192.168.10.10/32 | | - | | - All IP addresses: 0.0.0.0/0 | | - | | - IP address range: 192.168.1.0/24 | | - | | | | - | | - Security group: sg-A | | - +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Source Port Range | The source port number or port number range. The value ranges from 1 to 65535. For a port number range, enter two port numbers connected by a hyphen (-). For example, **1-100**. | 22, or 22-30 | - | | | | - | | You must specify this parameter if **TCP** or **UDP** is selected for **Protocol**. | | - +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Destination | The destination to which the traffic is allowed. The destination can be an IP address or IP address range. | 0.0.0.0/0 | - | | | | - | | - IP address: | | - | | | | - | | - Single IP address: 192.168.10.10/32 | | - | | - All IP addresses: 0.0.0.0/0 | | - | | - IP address range: 192.168.1.0/24 | | - | | | | - | | - Security group: sg-A | | - +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Destination Port Range | The destination port number or port number range. The value ranges from 1 to 65535. For a port number range, enter two port numbers connected by a hyphen (-). For example, **1-100**. | 22, or 22-30 | - | | | | - | | You must specify this parameter if **TCP** or **UDP** is selected for **Protocol**. | | - +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Description | Supplementary information about the firewall rule. This parameter is optional. | N/A | - | | | | - | | The description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | - +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Parameter | Description | Example Value | + +========================+========================================================================================================================================================================================+=======================+ + | Type | The firewall type. This parameter is mandatory. You can select a value from the drop-down list. Currently, only **IPv4** and **IPv6** are supported. | IPv4 | + +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Action | The action in the firewall. This parameter is mandatory. You can select a value from the drop-down list. Currently, the value can be **Allow** or **Deny**. | Allow | + +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Protocol | The protocol supported by the firewall. This parameter is mandatory. You can select a protocol from the drop-down list. | TCP | + | | | | + | | You can select **TCP**, **UDP**, **ICMP**, or **All**. | | + +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Source | The source from which the traffic is allowed. The source can be an IP address or IP address range. | 0.0.0.0/0 | + | | | | + | | - IP address: | | + | | | | + | | - Single IP address: 192.168.10.10/32 | | + | | - All IP addresses: 0.0.0.0/0 | | + | | - IP address range: 192.168.1.0/24 | | + | | | | + | | - Security group: sg-A | | + +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Source Port Range | The source port number or port number range. The value ranges from 1 to 65535. For a port number range, enter two port numbers connected by a hyphen (-). For example, **1-100**. | 22, or 22-30 | + | | | | + | | You must specify this parameter if **TCP** or **UDP** is selected for **Protocol**. | | + +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Destination | The destination to which the traffic is allowed. The destination can be an IP address or IP address range. | 0.0.0.0/0 | + | | | | + | | - IP address: | | + | | | | + | | - Single IP address: 192.168.10.10/32 | | + | | - All IP addresses: 0.0.0.0/0 | | + | | - IP address range: 192.168.1.0/24 | | + | | | | + | | - Security group: sg-A | | + +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Destination Port Range | The destination port number or port number range. The value ranges from 1 to 65535. For a port number range, enter two port numbers connected by a hyphen (-). For example, **1-100**. | 22, or 22-30 | + | | | | + | | You must specify this parameter if **TCP** or **UDP** is selected for **Protocol**. | | + +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Description | Supplementary information about the firewall rule. This parameter is optional. | N/A | + | | | | + | | The description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | + +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ 7. Click **OK**. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001627054054.png diff --git a/umn/source/security/firewall/associating_subnets_with_a_firewall.rst b/umn/source/access_control/firewall/associating_subnets_with_a_firewall.rst similarity index 71% rename from umn/source/security/firewall/associating_subnets_with_a_firewall.rst rename to umn/source/access_control/firewall/associating_subnets_with_a_firewall.rst index eb4a1e2..9b7409a 100644 --- a/umn/source/security/firewall/associating_subnets_with_a_firewall.rst +++ b/umn/source/access_control/firewall/associating_subnets_with_a_firewall.rst @@ -8,7 +8,12 @@ Associating Subnets with a Firewall Scenarios --------- -On the page showing firewall details, you can associate desired subnets with a firewall. After a firewall is associated with a subnet, the firewall denies all traffic to and from the subnet until you add rules to allow traffic. +You can associate a firewall with a subnet to protect resources in the subnet. After a firewall is associated with a subnet, the firewall denies all traffic to and from the subnet until you add rules to allow traffic. + +Notes and Constraints +--------------------- + +You can associate a firewall with multiple subnets. However, a subnet can only be associated with one firewall at a time. Procedure --------- @@ -16,11 +21,19 @@ Procedure #. Log in to the management console. 2. Click |image1| in the upper left corner and select the desired region and project. + 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + + The **Virtual Private Cloud** page is displayed. + 4. In the navigation pane on the left, choose **Access Control** > **Firewalls**. + 5. Locate the target firewall and click its name to switch to the page showing details of that particular firewall. + 6. On the displayed page, click the **Associated Subnets** tab. + 7. On the **Associated Subnets** page, click **Associate**. + 8. On the displayed page, select the subnets to be associated with the firewall, and click **OK**. .. note:: @@ -28,4 +41,4 @@ Procedure Subnets with firewalls associated will not be displayed on the page for you to select. If you want to associate such a subnet with another firewall, you must first disassociate the subnet from the original firewall. One-click subnet association and disassociation are not supported currently. A subnet can only be associated with one firewall. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001626734158.png diff --git a/umn/source/security/firewall/changing_the_sequence_of_a_firewall_rule.rst b/umn/source/access_control/firewall/changing_the_sequence_of_a_firewall_rule.rst similarity index 91% rename from umn/source/security/firewall/changing_the_sequence_of_a_firewall_rule.rst rename to umn/source/access_control/firewall/changing_the_sequence_of_a_firewall_rule.rst index 4708ccf..f56ccf5 100644 --- a/umn/source/security/firewall/changing_the_sequence_of_a_firewall_rule.rst +++ b/umn/source/access_control/firewall/changing_the_sequence_of_a_firewall_rule.rst @@ -21,6 +21,8 @@ Procedure 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + 4. In the navigation pane on the left, choose **Access Control** > **Firewalls**. 5. Locate the target firewall and click its name to switch to the page showing details of that particular firewall. @@ -32,4 +34,4 @@ Procedure The rule is inserted. The procedure for inserting an outbound rule is the same as that for inserting an inbound rule. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001626894110.png diff --git a/umn/source/security/firewall/creating_a_firewall.rst b/umn/source/access_control/firewall/creating_a_firewall.rst similarity index 94% rename from umn/source/security/firewall/creating_a_firewall.rst rename to umn/source/access_control/firewall/creating_a_firewall.rst index e339786..32fdb05 100644 --- a/umn/source/security/firewall/creating_a_firewall.rst +++ b/umn/source/access_control/firewall/creating_a_firewall.rst @@ -8,7 +8,9 @@ Creating a Firewall Scenarios --------- -You can create a custom firewall. By default, a newly created firewall is disabled and has no inbound or outbound rules, or any subnets associated. Each user can create up to 200 firewalls by default. +You can create a custom firewall. By default, a newly created firewall is disabled and has no inbound or outbound rules, or any subnets associated. + +By default, you can create a maximum of 200 firewalls in a region. Procedure --------- @@ -19,6 +21,8 @@ Procedure 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + 4. In the navigation pane on the left, choose **Access Control** > **Firewalls**. 5. In the right pane displayed, click **Create Firewall**. @@ -48,4 +52,4 @@ Procedure 7. Click **OK**. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001626574358.png diff --git a/umn/source/security/firewall/deleting_a_firewall.rst b/umn/source/access_control/firewall/deleting_a_firewall.rst similarity index 76% rename from umn/source/security/firewall/deleting_a_firewall.rst rename to umn/source/access_control/firewall/deleting_a_firewall.rst index 83438d3..057b698 100644 --- a/umn/source/security/firewall/deleting_a_firewall.rst +++ b/umn/source/access_control/firewall/deleting_a_firewall.rst @@ -16,9 +16,15 @@ Procedure #. Log in to the management console. 2. Click |image1| in the upper left corner and select the desired region and project. + 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + + The **Virtual Private Cloud** page is displayed. + 4. In the navigation pane on the left, choose **Access Control** > **Firewalls**. -5. Locate the firewall in the right pane, click **More** in the **Operation** column, and click **Delete**. + +5. Locate the firewall, click **More** in the **Operation** column, and click **Delete**. + 6. Click **Yes**. .. note:: @@ -26,4 +32,4 @@ Procedure Deleting a firewall will also disassociate its associated subnets and delete the firewall rules. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001675613953.png diff --git a/umn/source/security/firewall/deleting_a_firewall_rule.rst b/umn/source/access_control/firewall/deleting_a_firewall_rule.rst similarity index 89% rename from umn/source/security/firewall/deleting_a_firewall_rule.rst rename to umn/source/access_control/firewall/deleting_a_firewall_rule.rst index 618b29e..278b692 100644 --- a/umn/source/security/firewall/deleting_a_firewall_rule.rst +++ b/umn/source/access_control/firewall/deleting_a_firewall_rule.rst @@ -16,10 +16,17 @@ Procedure #. Log in to the management console. 2. Click |image1| in the upper left corner and select the desired region and project. + 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + + The **Virtual Private Cloud** page is displayed. + 4. In the navigation pane on the left, choose **Access Control** > **Firewalls**. + 5. Locate the target firewall and click its name to switch to the page showing details of that particular firewall. + 6. On the **Inbound Rules** or **Outbound Rules** tab, locate the row that contains the target rule and click **Delete** in the **Operation** column. + 7. Click **Yes** in the displayed dialog box. **Deleting Multiple Firewall Rules at a Time** @@ -27,4 +34,4 @@ Procedure You can also select multiple firewall rules and click **Delete** above the firewall rule list to delete multiple rules at a time. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001627054082.png diff --git a/umn/source/security/firewall/disassociating_a_subnet_from_a_firewall.rst b/umn/source/access_control/firewall/disassociating_a_subnet_from_a_firewall.rst similarity index 90% rename from umn/source/security/firewall/disassociating_a_subnet_from_a_firewall.rst rename to umn/source/access_control/firewall/disassociating_a_subnet_from_a_firewall.rst index 848807e..808b884 100644 --- a/umn/source/security/firewall/disassociating_a_subnet_from_a_firewall.rst +++ b/umn/source/access_control/firewall/disassociating_a_subnet_from_a_firewall.rst @@ -16,11 +16,19 @@ Procedure #. Log in to the management console. 2. Click |image1| in the upper left corner and select the desired region and project. + 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + + The **Virtual Private Cloud** page is displayed. + 4. In the navigation pane on the left, choose **Access Control** > **Firewalls**. + 5. Locate the target firewall and click its name to switch to the page showing details of that particular firewall. + 6. On the displayed page, click the **Associated Subnets** tab. + 7. On the **Associated Subnets** page, locate the row that contains the target subnet and click **Disassociate** in the **Operation** column. + 8. Click **Yes** in the displayed dialog box. **Disassociating subnets from a firewall** @@ -28,4 +36,4 @@ Procedure Select multiple subnets and click **Disassociate** above the subnet list to disassociate the subnets from a firewall at a time. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001675413845.png diff --git a/umn/source/security/firewall/enabling_or_disabling_a_firewall.rst b/umn/source/access_control/firewall/enabling_or_disabling_a_firewall.rst similarity index 69% rename from umn/source/security/firewall/enabling_or_disabling_a_firewall.rst rename to umn/source/access_control/firewall/enabling_or_disabling_a_firewall.rst index e2fa5ca..60c71ff 100644 --- a/umn/source/security/firewall/enabling_or_disabling_a_firewall.rst +++ b/umn/source/access_control/firewall/enabling_or_disabling_a_firewall.rst @@ -8,7 +8,7 @@ Enabling or Disabling a Firewall Scenarios --------- -After a firewall is created, you may need to enable it based on network security requirements. You can also disable an enabled firewall if need. Before enabling a firewall, ensure that subnets have been associated with the firewall and that inbound and outbound rules have been added to the firewall. +After a firewall is created, you may need to enable it based on network security requirements. You can also disable an enabled firewall if needed. Before enabling a firewall, ensure that subnets have been associated with the firewall and that inbound and outbound rules have been added to the firewall. When a firewall is disabled, custom rules will become invalid while default rules still take effect. Disabling a firewall may interrupt network traffic. For information about the default firewall rules, see :ref:`Default Firewall Rules `. @@ -18,10 +18,16 @@ Procedure #. Log in to the management console. 2. Click |image1| in the upper left corner and select the desired region and project. + 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + + The **Virtual Private Cloud** page is displayed. + 4. In the navigation pane on the left, choose **Access Control** > **Firewalls**. -5. Locate the row that contains the firewall in the right pane, click **More** in the **Operation** column, and click **Enable** or **Disable**. + +5. Locate the row that contains the firewall, click **More** in the **Operation** column, and click **Enable** or **Disable**. + 6. Click **Yes** in the displayed dialog box. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001626894106.png diff --git a/umn/source/security/firewall/enabling_or_disabling_a_firewall_rule.rst b/umn/source/access_control/firewall/enabling_or_disabling_a_firewall_rule.rst similarity index 90% rename from umn/source/security/firewall/enabling_or_disabling_a_firewall_rule.rst rename to umn/source/access_control/firewall/enabling_or_disabling_a_firewall_rule.rst index 1684a77..6d66828 100644 --- a/umn/source/security/firewall/enabling_or_disabling_a_firewall_rule.rst +++ b/umn/source/access_control/firewall/enabling_or_disabling_a_firewall_rule.rst @@ -19,6 +19,8 @@ Procedure 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + 4. In the navigation pane on the left, choose **Access Control** > **Firewalls**. 5. Locate the target firewall and click its name to switch to the page showing details of that particular firewall. @@ -30,4 +32,4 @@ Procedure The rule is enabled or disabled. The procedure for enabling or disabling an outbound rule is the same as that for enabling or disabling an inbound rule. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001675254033.png diff --git a/umn/source/security/firewall/firewall_configuration_examples.rst b/umn/source/access_control/firewall/firewall_configuration_examples.rst similarity index 93% rename from umn/source/security/firewall/firewall_configuration_examples.rst rename to umn/source/access_control/firewall/firewall_configuration_examples.rst index 5a976f7..4f6d744 100644 --- a/umn/source/security/firewall/firewall_configuration_examples.rst +++ b/umn/source/access_control/firewall/firewall_configuration_examples.rst @@ -15,15 +15,15 @@ This section provides examples for configuring firewalls. Denying Access from a Specific Port ----------------------------------- -You might want to block TCP 445 to protect against the WannaCry ransomware attacks. You can add a firewall rule to deny all incoming traffic from TCP port 445. +You might want to block TCP port 445 to protect against the WannaCry ransomware attacks. You can add a firewall rule to deny all incoming traffic from TCP port 445. Firewall Configuration -:ref:`Table 1 ` lists the inbound rule required. +:ref:`Table 1 ` lists the inbound rules required. .. _acl_0002__table553618145582: -.. table:: **Table 1** firewall rules +.. table:: **Table 1** Firewall rules +-----------+--------+----------+-----------+-------------------+-------------+------------------------+------------------------------------------------------------------+ | Direction | Action | Protocol | Source | Source Port Range | Destination | Destination Port Range | Description | @@ -35,7 +35,7 @@ Firewall Configuration .. note:: - - By default, a firewall denies all inbound traffic. You need to allow all inbound traffic if necessary. + - By default, a firewall denies all inbound traffic. You can add a rule to allow all inbound traffic if necessary. - If you want a deny rule to be matched first, insert the deny rule above the allow rule. For details, see :ref:`Changing the Sequence of a Firewall Rule `. .. _acl_0002__section61291659102216: @@ -47,11 +47,11 @@ In this example, an ECS in a subnet is used as the web server, and you need to a Firewall Configuration -:ref:`Table 2 ` lists the inbound rule required. +:ref:`Table 2 ` lists the inbound and outbound rules required. .. _acl_0002__table195634095313: -.. table:: **Table 2** firewall rules +.. table:: **Table 2** Firewall rules +-----------+--------+----------+-----------+-------------------+-------------+------------------------+------------------------------------------------------------------------------------------+ | Direction | Action | Protocol | Source | Source Port Range | Destination | Destination Port Range | Description | diff --git a/umn/source/security/firewall/firewall_overview.rst b/umn/source/access_control/firewall/firewall_overview.rst similarity index 91% rename from umn/source/security/firewall/firewall_overview.rst rename to umn/source/access_control/firewall/firewall_overview.rst index de893bb..d585350 100644 --- a/umn/source/security/firewall/firewall_overview.rst +++ b/umn/source/access_control/firewall/firewall_overview.rst @@ -11,7 +11,7 @@ A firewall is an optional layer of security for your subnets. After you associat .. _acl_0001__fig9582182315479: -.. figure:: /_static/images/en-us_image_0148244691.png +.. figure:: /_static/images/en-us_image_0000001699135873.png :alt: **Figure 1** Security groups and firewalls **Figure 1** Security groups and firewalls @@ -42,7 +42,7 @@ By default, each firewall has preset rules that allow the following packets: - Metadata packets with the destination 169.254.169.254/32 and TCP port number 80, which is used to obtain metadata. -- Packets from CIDR blocks that are reserved for public services (for example, packets with the destination 100.125.0.0/16) +- Packets from CIDR blocks that are reserved for public services (for example, packets with the destination 100.125.0.0/16). - A firewall denies all traffic in and out of a subnet excepting the preceding packets. :ref:`Table 1 ` shows the default rules. You cannot modify or delete the default rules. @@ -102,7 +102,5 @@ Configuration Procedure Notes and Constraints --------------------- -- By default, you can create a maximum of 200 firewalls in your cloud account. -- You can associate a firewall with multiple subnets. However, a subnet can only be associated with one firewall at a time. +- By default, each account can have up to 200 firewalls in a region. - A firewall can contain no more than 20 rules in one direction, or performance will deteriorate. -- For optimal performance, import no more than 40 firewall rules at a time. Existing rules will still be available after new rules are imported. Each rule can be imported only once. diff --git a/umn/source/security/firewall/index.rst b/umn/source/access_control/firewall/index.rst similarity index 100% rename from umn/source/security/firewall/index.rst rename to umn/source/access_control/firewall/index.rst diff --git a/umn/source/security/firewall/modifying_a_firewall.rst b/umn/source/access_control/firewall/modifying_a_firewall.rst similarity index 82% rename from umn/source/security/firewall/modifying_a_firewall.rst rename to umn/source/access_control/firewall/modifying_a_firewall.rst index 8e8dfc7..e201d2b 100644 --- a/umn/source/security/firewall/modifying_a_firewall.rst +++ b/umn/source/access_control/firewall/modifying_a_firewall.rst @@ -16,15 +16,24 @@ Procedure #. Log in to the management console. 2. Click |image1| in the upper left corner and select the desired region and project. + 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + + The **Virtual Private Cloud** page is displayed. + 4. In the navigation pane on the left, choose **Access Control** > **Firewalls**. + 5. Locate the target firewall and click its name to switch to the page showing details of that particular firewall. + 6. On the displayed page, click |image3| on the right of **Name** and edit the firewall name. + 7. Click Y to save the new firewall name. -8. Click |image4| on the right of Description and edit the firewall description. + +8. Click |image4| on the right of **Description** and edit the firewall description. + 9. Click Y to save the new firewall description. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001675413841.png .. |image3| image:: /_static/images/en-us_image_0142359884.png .. |image4| image:: /_static/images/en-us_image_0142359884.png diff --git a/umn/source/security/firewall/modifying_a_firewall_rule.rst b/umn/source/access_control/firewall/modifying_a_firewall_rule.rst similarity index 60% rename from umn/source/security/firewall/modifying_a_firewall_rule.rst rename to umn/source/access_control/firewall/modifying_a_firewall_rule.rst index a4caeba..df4f444 100644 --- a/umn/source/security/firewall/modifying_a_firewall_rule.rst +++ b/umn/source/access_control/firewall/modifying_a_firewall_rule.rst @@ -19,6 +19,8 @@ Procedure 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + 4. In the navigation pane on the left, choose **Access Control** > **Firewalls**. 5. Locate the target firewall and click its name to switch to the page showing details of that particular firewall. @@ -35,51 +37,51 @@ Procedure .. table:: **Table 1** Parameter descriptions - +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Parameter | Description | Example Value | - +========================+================================================================================================================================================================================================================================================================+=======================+ - | Priority | Priority of firewall rule. A smaller priority value represents a higher priority. Each network ACL includes a default rule whose priority value is an asterisk (``*``). Default rules have the lowest priority. | 3 | - +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Status | Status of a firewall. When you add a rule to it, its default status is **Enabled**. | Enabled | - +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Action | The action in the firewall. This parameter is mandatory. You can select a value from the drop-down list. Currently, the value can be **Allow** or **Deny**. | Allow | - +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Protocol | The protocol supported by the firewall. This parameter is mandatory. You can select a value from the drop-down list. The value can be **TCP**, **UDP**, **All**, or **ICMP**. If **ICMP** or **All** is selected, you do not need to specify port information. | TCP | - +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Source | The source from which the traffic is allowed. The source can be an IP address or IP address range. | 0.0.0.0/0 | - | | | | - | | - IP address: | | - | | | | - | | - Single IP address: 192.168.10.10/32 | | - | | - All IP addresses: 0.0.0.0/0 | | - | | - IP address range: 192.168.1.0/24 | | - | | | | - | | - Security group: sg-A | | - +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Source Port Range | The source port number or port number range. The value ranges from 1 to 65535. For a port number range, enter two port numbers connected by a hyphen (-). For example, **1-100**. | 22, or 22-30 | - | | | | - | | You must specify this parameter if **TCP** or **UDP** is selected for **Protocol**. | | - +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Destination | The destination to which the traffic is allowed. The destination can be an IP address or IP address range. | 0.0.0.0/0 | - | | | | - | | - IP address: | | - | | | | - | | - Single IP address: 192.168.10.10/32 | | - | | - All IP addresses: 0.0.0.0/0 | | - | | - IP address range: 192.168.1.0/24 | | - | | | | - | | - Security group: sg-A | | - +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Destination Port Range | The destination port number or port number range. The value ranges from 1 to 65535. For a port number range, enter two port numbers connected by a hyphen (-). For example, **1-100**. | 22, or 22-30 | - | | | | - | | You must specify this parameter if **TCP** or **UDP** is selected for **Protocol**. | | - +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Description | Supplementary information about the firewall rule. This parameter is optional. | N/A | - | | | | - | | The description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | - +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Parameter | Description | Example Value | + +========================+========================================================================================================================================================================================+=======================+ + | Type | The firewall type. This parameter is mandatory. You can select a value from the drop-down list. Currently, only **IPv4** and **IPv6** are supported. | IPv4 | + +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Action | The action in the firewall. This parameter is mandatory. You can select a value from the drop-down list. Currently, the value can be **Allow** or **Deny**. | Allow | + +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Protocol | The protocol supported by the firewall. This parameter is mandatory. You can select a protocol from the drop-down list. | TCP | + | | | | + | | You can select **TCP**, **UDP**, **ICMP**, or **All**. | | + +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Source | The source from which the traffic is allowed. The source can be an IP address or IP address range. | 0.0.0.0/0 | + | | | | + | | - IP address: | | + | | | | + | | - Single IP address: 192.168.10.10/32 | | + | | - All IP addresses: 0.0.0.0/0 | | + | | - IP address range: 192.168.1.0/24 | | + | | | | + | | - Security group: sg-A | | + +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Source Port Range | The source port number or port number range. The value ranges from 1 to 65535. For a port number range, enter two port numbers connected by a hyphen (-). For example, **1-100**. | 22, or 22-30 | + | | | | + | | You must specify this parameter if **TCP** or **UDP** is selected for **Protocol**. | | + +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Destination | The destination to which the traffic is allowed. The destination can be an IP address or IP address range. | 0.0.0.0/0 | + | | | | + | | - IP address: | | + | | | | + | | - Single IP address: 192.168.10.10/32 | | + | | - All IP addresses: 0.0.0.0/0 | | + | | - IP address range: 192.168.1.0/24 | | + | | | | + | | - Security group: sg-A | | + +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Destination Port Range | The destination port number or port number range. The value ranges from 1 to 65535. For a port number range, enter two port numbers connected by a hyphen (-). For example, **1-100**. | 22, or 22-30 | + | | | | + | | You must specify this parameter if **TCP** or **UDP** is selected for **Protocol**. | | + +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Description | Supplementary information about the firewall rule. This parameter is optional. | N/A | + | | | | + | | The description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | + +------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ 7. Click **Confirm**. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001675613957.png diff --git a/umn/source/security/firewall/viewing_a_firewall.rst b/umn/source/access_control/firewall/viewing_a_firewall.rst similarity index 87% rename from umn/source/security/firewall/viewing_a_firewall.rst rename to umn/source/access_control/firewall/viewing_a_firewall.rst index 238258b..eb2ded4 100644 --- a/umn/source/security/firewall/viewing_a_firewall.rst +++ b/umn/source/access_control/firewall/viewing_a_firewall.rst @@ -16,10 +16,16 @@ Procedure #. Log in to the management console. 2. Click |image1| in the upper left corner and select the desired region and project. + 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + + The **Virtual Private Cloud** page is displayed. + 4. In the navigation pane on the left, choose **Access Control** > **Firewalls**. + 5. Locate the target firewall and click its name to switch to the page showing details of that particular firewall. + 6. On the displayed page, click the **Inbound Rules**, **Outbound Rules**, and **Associated Subnets** tabs one by one to view details about inbound rules, outbound rules, and subnet associations. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001675373917.png diff --git a/umn/source/security/index.rst b/umn/source/access_control/index.rst similarity index 92% rename from umn/source/security/index.rst rename to umn/source/access_control/index.rst index 43617e9..829a69e 100644 --- a/umn/source/security/index.rst +++ b/umn/source/access_control/index.rst @@ -2,8 +2,8 @@ .. _vpc_SecurityGroup_0000: -Security -======== +Access Control +============== - :ref:`Differences Between Security Groups and Firewalls ` - :ref:`Security Group ` diff --git a/umn/source/security/security_group/adding_a_security_group_rule.rst b/umn/source/access_control/security_group/adding_a_security_group_rule.rst similarity index 66% rename from umn/source/security/security_group/adding_a_security_group_rule.rst rename to umn/source/access_control/security_group/adding_a_security_group_rule.rst index 4ab1dd9..adc8d75 100644 --- a/umn/source/security/security_group/adding_a_security_group_rule.rst +++ b/umn/source/access_control/security_group/adding_a_security_group_rule.rst @@ -8,14 +8,33 @@ Adding a Security Group Rule Scenarios --------- -A security group is a collection of access control rules for cloud resources, such as cloud servers, containers, and databases, to control inbound and outbound traffic. Cloud resources associated with the same security group have the same security requirements and are mutually trusted within a VPC. +A security group is a collection of access control rules to control the traffic that is allowed to reach and leave the cloud resources that it is associated with. The cloud resources can be cloud servers, containers, databases, and more. Cloud resources associated with the same security group have the same security requirements and are mutually trusted within a VPC. A security group consists of inbound and outbound rules. -If the rules of the security group associated with your instance cannot meet your requirements, for example, you need to allow inbound traffic on a specified TCP port, you can add an inbound rule. +Each ECS must be associated with at least one security group. If you do not have a security group when creating an ECS, the system provides a default security group. -- Inbound rules control incoming traffic to cloud resources in the security group. -- Outbound rules control outgoing traffic from cloud resources in the security group. +Like whitelists, security group rules work as follows: -For details about the default security group rules, see :ref:`Default Security Groups and Security Group Rules `. For details about security group rule configuration examples, see :ref:`Security Group Configuration Examples `. +- Inbound rules control incoming traffic to instances in the security group. + + If an inbound request matches the source in an inbound security group rule, the request is allowed and other requests are denied. + + By default, you do not need to configure deny rules in the inbound direction because requests that do not match allow rules will be denied. + +- Outbound rules control outgoing traffic from instances in the security group. + + If the destination of an outbound security group rule is 0.0.0.0/0, all outbound requests are allowed. + + 0.0.0.0/0 represents all IPv4 addresses. + + ::/0 represents all IPv6 addresses. + +If the rules of the security group associated with your instance cannot meet your requirements, for example, you need to allow inbound traffic on a specific TCP port, you can add an inbound rule to allow traffic on the TCP port. + +Security Group Rule Configuration Examples +------------------------------------------ + +- The system provides a default security group. For details about the default security group rules, see :ref:`Default Security Group and Its Rules `. If the default security group rules cannot meet your requirements, you can modify them. +- Before configuring security group rules, you need to plan access policies for instances in the security group. For details about common security group rule configuration examples, see :ref:`Security Group Configuration Examples `. Procedure --------- @@ -26,11 +45,21 @@ Procedure #. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + #. In the navigation pane on the left, choose **Access Control** > **Security Groups**. -#. On the **Security Groups** page, locate the target security group and click **Manage Rule** in the **Operation** column to switch to the page for managing inbound and outbound rules. + The security group list is displayed. -#. On the **Inbound Rules** tab, click **Add Rule**. In the displayed dialog box, set required parameters to add an inbound rule. +#. Locate the row that contains the target security group, and click **Manage Rule** in the **Operation** column. + + The page for configuring security group rules is displayed. + +#. On the **Inbound Rules** tab, click **Add Rule**. + + The **Add Inbound Rule** dialog box is displayed. + +#. Configure required parameters. You can click **+** to add more inbound rules. @@ -45,11 +74,16 @@ Procedure +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ | Parameter | Description | Example Value | +=======================+==========================================================================================================================================================================+=======================+ - | Protocol & Port | **Protocol**: The network protocol. Currently, the value can be **All**, **TCP**, **UDP**, **ICMP**, **GRE**, or others. | TCP | + | Protocol & Port | The network protocol used to match traffic in a security group rule. | TCP | + | | | | + | | Currently, the value can be **All**, **TCP**, **UDP**, **GRE**, **ICMP**, or more. | | +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | | **Port**: The port or port range over which the traffic can reach your ECS. The value ranges from 1 to 65535. | 22, or 22-30 | + | | **Port**: The port or port range over which traffic can reach your ECS. The value can be from 1 to 65535. | 22, or 22-30 | +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Type | IPv4 | IPv4 | + | Type | Source IP address version. You can select: | IPv4 | + | | | | + | | - IPv4 | | + | | - IPv6 | | +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ | Source | Source of the security group rule. The value can be an IP address or a security group to allow access from IP addresses or instances in the security group. For example: | 0.0.0.0/0 | | | | | @@ -68,7 +102,15 @@ Procedure | | The security group rule description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ -#. On the **Outbound Rules** tab, click **Add Rule**. In the displayed dialog box, set required parameters to add an outbound rule. +#. Click **OK**. + + The inbound rule list is displayed. + +#. On the **Outbound Rules** tab, click **Add Rule**. + + The **Add Outbound Rule** dialog box is displayed. + +#. Configure required parameters. You can click **+** to add more outbound rules. @@ -83,11 +125,16 @@ Procedure +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ | Parameter | Description | Example Value | +=======================+=============================================================================================================================================================================+=======================+ - | Protocol & Port | **Protocol**: The network protocol. Currently, the value can be **All**, **TCP**, **UDP**, **ICMP**, **GRE**, or others. | TCP | + | Protocol & Port | The network protocol used to match traffic in a security group rule. | TCP | + | | | | + | | Currently, the value can be **All**, **TCP**, **UDP**, **GRE**, **ICMP**, or more. | | +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | | **Port**: The port or port range over which the traffic can leave your ECS. The value ranges from 1 to 65535. | 22, or 22-30 | + | | **Port**: The port or port range over which traffic can leave your ECS. The value can be from 1 to 65535. | 22, or 22-30 | +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Type | IPv4 | IPv4 | + | Type | Source IP address version. You can select: | IPv4 | + | | | | + | | - IPv4 | | + | | - IPv6 | | +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ | Destination | Destination of the security group rule. The value can be an IP address or a security group to allow access to IP addresses or instances in the security group. For example: | 0.0.0.0/0 | | | | | @@ -106,5 +153,7 @@ Procedure #. Click **OK**. + The outbound rule list is displayed. + .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001626734166.png diff --git a/umn/source/access_control/security_group/adding_an_instance_to_or_removing_an_instance_from_a_security_group.rst b/umn/source/access_control/security_group/adding_an_instance_to_or_removing_an_instance_from_a_security_group.rst new file mode 100644 index 0000000..e24950e --- /dev/null +++ b/umn/source/access_control/security_group/adding_an_instance_to_or_removing_an_instance_from_a_security_group.rst @@ -0,0 +1,84 @@ +:original_name: SecurityGroup_0017.html + +.. _SecurityGroup_0017: + +Adding an Instance to or Removing an Instance from a Security Group +=================================================================== + +Scenarios +--------- + +When you create an instance, the system automatically adds the instance to a security group for protection. + +- If one security group cannot meet your requirements, you can add an instance to multiple security groups. +- An instance must be added to at least one security group. If you want to change the security group for an instance, you can add the instance to a new security group and then remove the instance from the original security group. + +Adding an Instance to a Security Group +-------------------------------------- + +#. Log in to the management console. + +#. Click |image1| in the upper left corner and select the desired region and project. + +#. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + + The **Virtual Private Cloud** page is displayed. + +#. In the navigation pane on the left, choose **Access Control** > **Security Groups**. + + The security group list is displayed. + +#. In the security group list, locate the row that contains the security group and click **Manage Instances** in the **Operation** column. + + The **Associated Instances** tab is displayed. + +#. Click an instance type. + + The following operations use **Servers** as an example. + +#. Click the **Servers** tab and click **Add**. + + The **Add Server** dialog box is displayed. + +#. In the server list, select one or more servers and click OK to add them to the current security group. + +Removing an Instance from a Security Group +------------------------------------------ + +An instance must be added to at least one security group. If you want to remove an instance from a security group, the instance must be associated with at least two security groups now. + +#. Log in to the management console. + +#. Click |image3| in the upper left corner and select the desired region and project. + +#. Click |image4| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + + The **Virtual Private Cloud** page is displayed. + +#. In the navigation pane on the left, choose **Access Control** > **Security Groups**. + + The security group list is displayed. + +#. In the security group list, locate the row that contains the security group and click **Manage Instances** in the **Operation** column. + + The **Associated Instances** tab is displayed. + +#. Click an instance type. + + The following operations use **Servers** as an example. + +#. Click the **Servers** tab, select one or more servers, and click **Remove** in the upper left corner of the server list. + + A confirmation dialog box is displayed. + +#. Confirm the information and click **Yes**. + +Follow-Up Operations +-------------------- + +You can delete the security groups that you no longer need. Deleting a security group will also delete all security group rules in the security group. For details, see :ref:`Deleting a Security Group `. + +.. |image1| image:: /_static/images/en-us_image_0141273034.png +.. |image2| image:: /_static/images/en-us_image_0000001627054058.png +.. |image3| image:: /_static/images/en-us_image_0141273034.png +.. |image4| image:: /_static/images/en-us_image_0000001626734162.png diff --git a/umn/source/security/security_group/changing_the_security_group_of_an_ecs.rst b/umn/source/access_control/security_group/changing_the_security_group_of_an_ecs.rst similarity index 91% rename from umn/source/security/security_group/changing_the_security_group_of_an_ecs.rst rename to umn/source/access_control/security_group/changing_the_security_group_of_an_ecs.rst index a93952e..4467f82 100644 --- a/umn/source/security/security_group/changing_the_security_group_of_an_ecs.rst +++ b/umn/source/access_control/security_group/changing_the_security_group_of_an_ecs.rst @@ -24,12 +24,12 @@ Procedure The **Change Security Group** dialog box is displayed. - .. figure:: /_static/images/en-us_image_0122999741.png + .. figure:: /_static/images/en-us_image_0162733894.png :alt: **Figure 1** Change Security Group **Figure 1** Change Security Group -#. Select the target NIC and security groups as prompted. +#. Select the target NIC and security groups. You can select multiple security groups. In such a case, the rules of all the selected security groups will be aggregated to apply on the ECS. diff --git a/umn/source/security/security_group/cloning_a_security_group.rst b/umn/source/access_control/security_group/cloning_a_security_group.rst similarity index 53% rename from umn/source/security/security_group/cloning_a_security_group.rst rename to umn/source/access_control/security_group/cloning_a_security_group.rst index 66695e7..5248029 100644 --- a/umn/source/security/security_group/cloning_a_security_group.rst +++ b/umn/source/access_control/security_group/cloning_a_security_group.rst @@ -14,6 +14,7 @@ You can clone a security group in the following scenarios: - For example, you have security group **sg-A** in region A. If ECSs in region B require the same security group rules as those configured for security group **sg-A**, you can clone security group **sg-A** to region B, freeing you from creating a new security group in region B. - If you need new security group rules, you can clone the original security group as a backup. +- Before you modify security group rules used by a service, you can clone the security group and modify the security group rules in the test environment to ensure that the modified rules work. .. note:: @@ -22,7 +23,12 @@ You can clone a security group in the following scenarios: Notes and Constraints --------------------- -If you clone security group across regions, the system will clone only rules whose source and destination are CIDR blocks or are in the current security group. +- You can clone a security group from the same or a different region. + + - If you want to clone a security group from the same region, you can clone all rules in the security group. + - If you want to clone a security group from a different region, the system will clone only rules whose source and destination are IP addresses and rules whose source and destination is the current security group. + +- Cloning a security group clones its security group rules, but not the instances associated with the security group. Procedure --------- @@ -33,11 +39,15 @@ Procedure #. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + #. In the navigation pane on the left, choose **Access Control** > **Security Groups**. -#. On the **Security Groups** page, locate the row that contains the target security group and choose **More** > **Clone** in the **Operation** column. + The security group list is displayed. -#. Set required parameters as prompted. +#. Locate the row that contains the security group, click **More** in the **Operation** column, and click **Clone**. + +#. Select the region and name of the new security group as prompted. .. figure:: /_static/images/en-us_image_0000001602035305.png @@ -45,7 +55,9 @@ Procedure **Figure 1** Clone Security Group -#. Click **OK**. You can then switch to the required region to view the cloned security group in the security group list. +#. Click **OK**. + + You can then switch to the required region to view the cloned security group in the security group list. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001675373901.png diff --git a/umn/source/security/security_group/creating_a_security_group.rst b/umn/source/access_control/security_group/creating_a_security_group.rst similarity index 54% rename from umn/source/security/security_group/creating_a_security_group.rst rename to umn/source/access_control/security_group/creating_a_security_group.rst index b415adf..e6844a6 100644 --- a/umn/source/security/security_group/creating_a_security_group.rst +++ b/umn/source/access_control/security_group/creating_a_security_group.rst @@ -8,11 +8,18 @@ Creating a Security Group Scenarios --------- -You can create security groups and add ECSs in a VPC to different security groups to improve ECS access security. We recommend that you allocate ECSs that have different Internet access requirements to different security groups. +A security group is a collection of access control rules to control the traffic that is allowed to reach and leave the cloud resources that it is associated with. The cloud resources can be cloud servers, containers, databases, and more. Cloud resources associated with the same security group have the same security requirements and are mutually trusted within a VPC. A security group consists of inbound and outbound rules. -Each ECS must be associated with at least one security group. If you have no security group when creating an ECS, the system provides a default security group. +If your instances have different Internet access requirements, you can allocate them to different security groups when creating them. -You have an option to create a new security group for the ECS. This section describes how to create a security group on the management console. +Each ECS must be associated with at least one security group. If you do not have a security group when creating an ECS, the system provides a default security group. + +Notes and Constraints +--------------------- + +If you have not created any security groups yet, the system automatically creates a default security group for you and associates it with the instance (such as an ECS) when you create it. + +The default security group name is **default**. For details, see :ref:`Default Security Group and Its Rules `. Procedure --------- @@ -23,11 +30,17 @@ Procedure #. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + #. In the navigation pane on the left, choose **Access Control** > **Security Groups**. -#. On the **Security Groups** page, click **Create Security Group**. + The security group list is displayed. -#. In the **Create Security Group** area, set the parameters as prompted. :ref:`Table 1 ` lists the parameters to be configured. +#. In the upper right corner, click **Create Security Group**. + + The **Create Security Group** page is displayed. + +#. Configure the parameters as prompted. .. figure:: /_static/images/en-us_image_0000001197426329.png @@ -35,39 +48,43 @@ Procedure **Figure 1** Create Security Group - .. _en-us_topic_0013748715__table65377617111335: - .. table:: **Table 1** Parameter description - +-----------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------+ - | Parameter | Description | Example Value | - +=======================+=======================================================================================================================================================================================================================================================+============================+ - | Name | The security group name. This parameter is mandatory. | sg-318b | - | | | | - | | The security group name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces. | | - | | | | - | | .. note:: | | - | | | | - | | You can change the security group name after a security group is created. It is recommended that you give each security group a different name. | | - +-----------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------+ - | Enterprise Project | When creating a security group, you can add the security group to an enabled enterprise project. | default | - | | | | - | | An enterprise project facilitates project-level management and grouping of cloud resources and users. The name of the default project is **default**. | | - | | | | - | | For details about creating and managing enterprise projects, see the *Enterprise Management User Guide*. | | - +-----------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------+ - | Template | A template comes with default security group rules, helping you quickly create security groups. The following templates are provided: | General-purpose web server | - | | | | - | | - **Custom**: This template allows you to create security groups with custom security group rules. | | - | | - **General-purpose web server**: The security group that you create using this template is for general-purpose web servers and includes default rules that allow all inbound ICMP traffic and allow inbound traffic on ports 22, 80, 443, and 3389. | | - | | - **All ports open**: The security group that you create using this template includes default rules that allow inbound traffic on any port. Note that allowing inbound traffic on any port poses security risks. | | - +-----------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------+ - | Description | Supplementary information about the security group. This parameter is optional. | N/A | - | | | | - | | The security group description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | - +-----------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------+ + +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------+ + | Parameter | Description | Example Value | + +=======================+=======================================================================================================================================================================================================================================================================+============================+ + | Name | Mandatory | sg-AB | + | | | | + | | Enter the security group name. | | + | | | | + | | The security group name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces. | | + | | | | + | | .. note:: | | + | | | | + | | You can change the security group name after a security group is created. It is recommended that you give each security group a different name. | | + +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------+ + | Enterprise Project | Mandatory | default | + | | | | + | | When creating a security group, you can add the security group to an enabled enterprise project. | | + | | | | + | | An enterprise project facilitates project-level management and grouping of cloud resources and users. The name of the default project is **default**. | | + +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------+ + | Template | Mandatory | General-purpose web server | + | | | | + | | A template comes with default security group rules, helping you quickly create security groups. The following templates are provided: | | + | | | | + | | - **Custom**: This template allows you to create security groups with custom security group rules. | | + | | - **General-purpose web server** (default value): The security group that you create using this template is for general-purpose web servers and includes default rules that allow all inbound ICMP traffic and allow inbound traffic on ports 22, 80, 443, and 3389. | | + | | - **All ports open**: The security group that you create using this template includes default rules that allow inbound traffic on any port. Note that allowing inbound traffic on any port poses security risks. | | + +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------+ + | Description | Optional | N/A | + | | | | + | | Supplementary information about the security group. This parameter is optional. | | + | | | | + | | The security group description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | + +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------+ -#. Click **OK**. +#. Confirm the inbound and outbound rules of the template and click **OK**. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001627054062.png diff --git a/umn/source/security/security_group/default_security_groups_and_security_group_rules.rst b/umn/source/access_control/security_group/default_security_group_and_its_rules.rst similarity index 67% rename from umn/source/security/security_group/default_security_groups_and_security_group_rules.rst rename to umn/source/access_control/security_group/default_security_group_and_its_rules.rst index 3d7394c..dc6f8da 100644 --- a/umn/source/security/security_group/default_security_groups_and_security_group_rules.rst +++ b/umn/source/access_control/security_group/default_security_group_and_its_rules.rst @@ -2,13 +2,13 @@ .. _SecurityGroup_0003: -Default Security Groups and Security Group Rules -================================================ +Default Security Group and Its Rules +==================================== -The system creates a default security group for each account. By default, the default security group rules: +If you have not created any security group, the system automatically creates a default security group for you and associates it with the instance (such as an ECS) when you create it. A default security group has the following rules: -- Allow all outbound packets: Instances in the default security group can send requests to and receive responses from instances in other security groups. -- Deny all inbound packets: Requests from instances in other security groups will be denied by the default security group. +- Inbound rules control incoming traffic to instances in a security group. Only instances in the same security group can communicate with each other, and all inbound requests are denied. +- Outbound rules allow all outbound traffic and response traffic to the outbound requests. .. figure:: /_static/images/en-us_image_0000001230120807.png @@ -18,8 +18,8 @@ The system creates a default security group for each account. By default, the de .. note:: - - You cannot delete the default security group, but you can modify the rules for the default security group. - - If two ECSs are in the same security group but in different VPCs, the ECSs cannot communicate with each other. To enable communications between the ECSs, use a VPC peering connection to connect the two VPCs. + - You cannot delete the default security group, but you can modify existing rules or add rules to the group. + - The default security group is automatically created to simplify the process of creating an instance for the first time. The default security group denies all external requests. To log in to an instance, add a security group rule by referring to :ref:`Remotely Logging In to an ECS from a Local Server `. :ref:`Table 1 ` describes the default rules for the default security group. diff --git a/umn/source/security/security_group/deleting_a_security_group.rst b/umn/source/access_control/security_group/deleting_a_security_group.rst similarity index 73% rename from umn/source/security/security_group/deleting_a_security_group.rst rename to umn/source/access_control/security_group/deleting_a_security_group.rst index 34f080c..c288840 100644 --- a/umn/source/security/security_group/deleting_a_security_group.rst +++ b/umn/source/access_control/security_group/deleting_a_security_group.rst @@ -8,16 +8,14 @@ Deleting a Security Group Scenarios --------- -This section describes how to delete security groups. +If your security group is no longer required, you can delete it. Notes and Constraints --------------------- - The default security group is named **default** and cannot be deleted. -- A security group cannot be deleted if it is being used by instances, such as cloud servers, containers, and databases. - - If you need to delete such a security group, delete the instances or change the security group used by the instance first. +- If you want to delete a security group that is associated with instances, such as cloud servers, containers, and databases, you need to remove the instances from the security group first. For details, see :ref:`Adding an Instance to or Removing an Instance from a Security Group `. - A security group cannot be deleted if it is used as the source or destination of a rule in another security group. @@ -34,6 +32,8 @@ Procedure #. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + #. In the navigation pane on the left, choose **Access Control** > **Security Groups**. The security group list is displayed. @@ -45,4 +45,4 @@ Procedure #. Confirm the information and click **Yes**. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001626574362.png diff --git a/umn/source/access_control/security_group/deleting_a_security_group_rule.rst b/umn/source/access_control/security_group/deleting_a_security_group_rule.rst new file mode 100644 index 0000000..251fdfd --- /dev/null +++ b/umn/source/access_control/security_group/deleting_a_security_group_rule.rst @@ -0,0 +1,52 @@ +:original_name: vpc_SecurityGroup_0006.html + +.. _vpc_SecurityGroup_0006: + +Deleting a Security Group Rule +============================== + +Scenarios +--------- + +If your security group rule is no longer required, you can delete it. + +Notes and Constraints +--------------------- + +Security group rules use whitelists. Deleting a security group rule may result in ECS access failures. Security group rules work as follows: + +- Inbound rule: If an inbound request matches the source in an inbound security group rule with **Action** set to **Allow**, the request is allowed. +- Outbound rule: If the destination of an outbound security group rule with **Action** set to **Allow** is 0.0.0.0/0, all outbound requests are allowed. + +Procedure +--------- + +#. Log in to the management console. + +2. Click |image1| in the upper left corner and select the desired region and project. + +3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + + The **Virtual Private Cloud** page is displayed. + +4. In the navigation pane on the left, choose **Access Control** > **Security Groups**. + + The security group list is displayed. + +5. In the security group list, click the name of the security group. + + The security group details page is displayed. + +6. Click the **Inbound Rules** or **Outbound Rules** tab as required. + + The security group rule list is displayed. + +7. In the security group rule list: + + - To delete a single security group rule, locate the row that contains the rule and click **Delete** in the **Operation** column. + - To delete multiple security group rules, select multiple security group rules and click **Delete** in the upper left corner of the rule list. + +8. Click **Yes**. + +.. |image1| image:: /_static/images/en-us_image_0141273034.png +.. |image2| image:: /_static/images/en-us_image_0000001675413825.png diff --git a/umn/source/access_control/security_group/fast-adding_security_group_rules.rst b/umn/source/access_control/security_group/fast-adding_security_group_rules.rst new file mode 100644 index 0000000..7928959 --- /dev/null +++ b/umn/source/access_control/security_group/fast-adding_security_group_rules.rst @@ -0,0 +1,123 @@ +:original_name: SecurityGroup_0004.html + +.. _SecurityGroup_0004: + +Fast-Adding Security Group Rules +================================ + +Scenarios +--------- + +The fast-adding rule function of security groups allows you to quickly add rules with common ports and protocols for remote login, ping tests, common web services, and database services. + +Procedure +--------- + +#. Log in to the management console. + +2. Click |image1| in the upper left corner and select the desired region and project. + +3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + + The **Virtual Private Cloud** page is displayed. + +4. In the navigation pane on the left, choose **Access Control** > **Security Groups**. + + The security group list is displayed. + +5. Locate the row that contains the target security group and click **Manage Rule** in the **Operation** column. + + The page for configuring security group rules is displayed. + +6. On the **Inbound Rules** tab, click **Fast-Add Rule**. + + The **Fast-Add Inbound Rule** dialog box is displayed. + +7. Configure required parameters. + + + .. figure:: /_static/images/en-us_image_0211552164.png + :alt: **Figure 1** Fast-Add Inbound Rule + + **Figure 1** Fast-Add Inbound Rule + + .. table:: **Table 1** Inbound rule parameter description + + +-----------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Parameter | Description | Example Value | + +=======================+==============================================================================================================================================================================+=======================+ + | Protocols and Ports | Common protocols and ports are provided for: | SSH (22) | + | | | | + | | - Remote login and ping | | + | | - Web services | | + | | - Databases | | + +-----------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Type | Source IP address version. You can select: | IPv4 | + | | | | + | | - IPv4 | | + | | - IPv6 | | + +-----------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Source | Source of the security group rule. The value can be an IP address or a security group to allow access from IP addresses or instances in the security group. You can specify: | 0.0.0.0/0 | + | | | | + | | - xxx.xxx.xxx.xxx/32 (IPv4 address) | | + | | - xxx.xxx.xxx.0/24 (IPv4 address range) | | + | | - 0.0.0.0/0 (all IPv4 addresses) | | + | | - sg-abc (security group) | | + | | | | + | | If the source is a security group, this rule will apply to all instances associated with the selected security group. | | + +-----------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Description | (Optional) Supplementary information about the security group rule. | ``-`` | + | | | | + | | The description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | + +-----------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + +8. Click **OK**. + + The inbound rule list is displayed and you can view your added rule. + +9. On the **Outbound Rules** tab, click **Fast-Add Rule**. + + The **Fast-Add Outbound Rule** dialog box is displayed. + +10. Configure required parameters. + + + .. figure:: /_static/images/en-us_image_0211560998.png + :alt: **Figure 2** Fast-Add Outbound Rule + + **Figure 2** Fast-Add Outbound Rule + + .. table:: **Table 2** Outbound rule parameter description + + +-----------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Parameter | Description | Example Value | + +=======================+=================================================================================================================================================================================+=======================+ + | Protocols and Ports | Common protocols and ports are provided for: | SSH (22) | + | | | | + | | - Remote login and ping | | + | | - Web services | | + | | - Databases | | + +-----------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Type | Source IP address version. You can select: | IPv4 | + | | | | + | | - IPv4 | | + | | - IPv6 | | + +-----------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Destination | Destination of the security group rule. The value can be an IP address or a security group to allow access to IP addresses or instances in the security group. You can specify: | 0.0.0.0/0 | + | | | | + | | - xxx.xxx.xxx.xxx/32 (IPv4 address) | | + | | - xxx.xxx.xxx.0/24 (IPv4 address range) | | + | | - 0.0.0.0/0 (all IPv4 addresses) | | + | | - sg-abc (security group) | | + +-----------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Description | (Optional) Supplementary information about the security group rule. | ``-`` | + | | | | + | | The description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | + +-----------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + +11. Click **OK**. + + The outbound rule list is displayed and you can view your added rule. + +.. |image1| image:: /_static/images/en-us_image_0141273034.png +.. |image2| image:: /_static/images/en-us_image_0000001675373905.png diff --git a/umn/source/security/security_group/importing_and_exporting_security_group_rules.rst b/umn/source/access_control/security_group/importing_and_exporting_security_group_rules.rst similarity index 64% rename from umn/source/security/security_group/importing_and_exporting_security_group_rules.rst rename to umn/source/access_control/security_group/importing_and_exporting_security_group_rules.rst index bc8fac3..3a8afd2 100644 --- a/umn/source/security/security_group/importing_and_exporting_security_group_rules.rst +++ b/umn/source/access_control/security_group/importing_and_exporting_security_group_rules.rst @@ -8,24 +8,37 @@ Importing and Exporting Security Group Rules Scenarios --------- -- If you want to quickly create or restore security group rules, you can import existing rules to the security group. +You can configure security group rules in an Excel file and import the rules to the security group. You can also export security group rules to an Excel file. You are advised to use this function in the following scenarios: + +- If you want to quickly create or restore a security group rule, you can import your exported security group rule file to the security group. - If you want to back up security group rules locally, you can export the rules to an Excel file. - If you want to quickly apply the rules of one security group to another, or if you want to modify multiple rules of the current security group at once, you can import or export existing rules. Notes and Constraints --------------------- -- When modifying exported security group rules, you can only modify existing fields in the exported file based on the template and cannot add new fields or modify the field names. Otherwise, the file will fail to be imported. -- Duplicate rules are not allowed. +- The security group rules to be imported must be configured based on the template. Do not add parameters or change existing parameters. Otherwise, the import will fail. +- Duplicate rules are not allowed, you can delete the rule and try again. Procedure --------- #. Log in to the management console. + #. Click |image1| in the upper left corner and select the desired region and project. + #. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + + The **Virtual Private Cloud** page is displayed. + #. In the navigation pane on the left, choose **Access Control** > **Security Groups**. -#. On the **Security Groups** page, click the security group name. + + The security group list is displayed. + +#. On the security group list, click the name of the target security group. + + The security group details page is displayed. + #. Export and import security group rules. - Click |image3| to export all rules of the current security group to an Excel file. @@ -38,36 +51,38 @@ Procedure .. table:: **Table 1** Template parameters - +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Parameter | Description | Example Value | - +=======================+=============================================================================================================================================================================+=======================+ - | Direction | The direction in which the security group rule takes effect. | Inbound | - | | | | - | | - Inbound rules control incoming traffic to cloud resources in the security group. | | - | | - Outbound rules control outgoing traffic from cloud resources in the security group. | | - +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Protocol & Port | **Protocol**: The network protocol. Currently, the value can be **All**, **TCP**, **UDP**, **ICMP**, **GRE**, or others. | TCP | - +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | | **Port**: The port or port range over which the traffic can reach your ECS. The value ranges from 1 to 65535. | 22, or 22-30 | - +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Source | Source of the security group rule. The value can be an IP address or a security group to allow access from IP addresses or instances in the security group. For example: | 0.0.0.0/0 | - | | | | - | | - IP address: | | - | | | | - | | - Single IP address: 192.168.10.10/32 | | - | | - All IP addresses: 0.0.0.0/0 | | - | | - IP address range: 192.168.1.0/24 | | - | | | | - | | - Security group: sg-A | | - +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Destination | Destination of the security group rule. The value can be an IP address or a security group to allow access to IP addresses or instances in the security group. For example: | 0.0.0.0/0 | - +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Description | Supplementary information about the security group rule. This parameter is optional. | ``-`` | - | | | | - | | The security group rule description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | - +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------+------------------------------------+ + | Parameter | Description | Example Value | + +=======================+=============================================================================================================================================================================+====================================+ + | Direction | The direction in which the security group rule takes effect. | Inbound | + | | | | + | | - **Inbound**: Inbound rules control incoming traffic to instances in the security group. | | + | | - **Outbound**: Outbound rules control outgoing traffic from instances in the security group. | | + +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------+------------------------------------+ + | Protocol & Port | The network protocol used to match traffic in a security group rule. | TCP | + | | | | + | | Currently, the value can be **All**, **TCP**, **UDP**, **GRE**, **ICMP**, or more. | | + +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------+------------------------------------+ + | | **Port**: The port or port range over which traffic can reach your ECS. The value can be from 1 to 65535. | 22, or 22-30 | + +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------+------------------------------------+ + | Source | Source of the security group rule. The value can be an IP address or a security group to allow access from IP addresses or instances in the security group. For example: | sg-test[96a8a93f-XXX-d7872990c314] | + | | | | + | | - IP address: | | + | | | | + | | - Single IP address: 192.168.10.10/32 | | + | | - All IP addresses: 0.0.0.0/0 | | + | | - IP address range: 192.168.1.0/24 | | + | | | | + | | - Security group: sg-A | | + +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------+------------------------------------+ + | Destination | Destination of the security group rule. The value can be an IP address or a security group to allow access to IP addresses or instances in the security group. For example: | sg-test[96a8a93f-XXX-d7872990c314] | + +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------+------------------------------------+ + | Description | Supplementary information about the security group rule. This parameter is optional. | ``-`` | + | | | | + | | The security group rule description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | + +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------+------------------------------------+ .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001675254013.png .. |image3| image:: /_static/images/en-us_image_0142360062.png .. |image4| image:: /_static/images/en-us_image_0142360094.png diff --git a/umn/source/security/security_group/index.rst b/umn/source/access_control/security_group/index.rst similarity index 78% rename from umn/source/security/security_group/index.rst rename to umn/source/access_control/security_group/index.rst index 5a4b40c..d3a2872 100644 --- a/umn/source/security/security_group/index.rst +++ b/umn/source/access_control/security_group/index.rst @@ -5,20 +5,20 @@ Security Group ============== -- :ref:`Security Group Overview ` -- :ref:`Default Security Groups and Security Group Rules ` +- :ref:`Security Groups and Security Group Rules ` +- :ref:`Default Security Group and Its Rules ` - :ref:`Security Group Configuration Examples ` - :ref:`Creating a Security Group ` -- :ref:`Adding a Security Group Rule ` -- :ref:`Fast-Adding Security Group Rules ` -- :ref:`Replicating a Security Group Rule ` -- :ref:`Modifying a Security Group Rule ` -- :ref:`Deleting a Security Group Rule ` -- :ref:`Importing and Exporting Security Group Rules ` -- :ref:`Deleting a Security Group ` -- :ref:`Adding Instances to and Removing Them from a Security Group ` - :ref:`Cloning a Security Group ` - :ref:`Modifying a Security Group ` +- :ref:`Deleting a Security Group ` +- :ref:`Adding a Security Group Rule ` +- :ref:`Fast-Adding Security Group Rules ` +- :ref:`Modifying a Security Group Rule ` +- :ref:`Replicating a Security Group Rule ` +- :ref:`Importing and Exporting Security Group Rules ` +- :ref:`Deleting a Security Group Rule ` +- :ref:`Adding an Instance to or Removing an Instance from a Security Group ` - :ref:`Viewing the Security Group of an ECS ` - :ref:`Changing the Security Group of an ECS ` @@ -26,19 +26,19 @@ Security Group :maxdepth: 1 :hidden: - security_group_overview - default_security_groups_and_security_group_rules + security_groups_and_security_group_rules + default_security_group_and_its_rules security_group_configuration_examples creating_a_security_group - adding_a_security_group_rule - fast-adding_security_group_rules - replicating_a_security_group_rule - modifying_a_security_group_rule - deleting_a_security_group_rule - importing_and_exporting_security_group_rules - deleting_a_security_group - adding_instances_to_and_removing_them_from_a_security_group cloning_a_security_group modifying_a_security_group + deleting_a_security_group + adding_a_security_group_rule + fast-adding_security_group_rules + modifying_a_security_group_rule + replicating_a_security_group_rule + importing_and_exporting_security_group_rules + deleting_a_security_group_rule + adding_an_instance_to_or_removing_an_instance_from_a_security_group viewing_the_security_group_of_an_ecs changing_the_security_group_of_an_ecs diff --git a/umn/source/access_control/security_group/modifying_a_security_group.rst b/umn/source/access_control/security_group/modifying_a_security_group.rst new file mode 100644 index 0000000..5a6798e --- /dev/null +++ b/umn/source/access_control/security_group/modifying_a_security_group.rst @@ -0,0 +1,37 @@ +:original_name: vpc_SecurityGroup_0010.html + +.. _vpc_SecurityGroup_0010: + +Modifying a Security Group +========================== + +**Scenarios** +------------- + +After a security group is created, you can change its name and description. + +Procedure +--------- + +#. Log in to the management console. + +#. Click |image1| in the upper left corner and select the desired region and project. + +#. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + + The **Virtual Private Cloud** page is displayed. + +#. In the navigation pane on the left, choose **Access Control** > **Security Groups**. + + The security group list is displayed. + +#. Locate the row that contains the security group, click **More** in the **Operation** column, and click **Modify**. + + The **Modify Security Group** dialog box is displayed. + +#. Modify the name and description of the security group as required. + +#. Click **OK** to save the modification. + +.. |image1| image:: /_static/images/en-us_image_0141273034.png +.. |image2| image:: /_static/images/en-us_image_0000001626894086.png diff --git a/umn/source/security/security_group/modifying_a_security_group_rule.rst b/umn/source/access_control/security_group/modifying_a_security_group_rule.rst similarity index 54% rename from umn/source/security/security_group/modifying_a_security_group_rule.rst rename to umn/source/access_control/security_group/modifying_a_security_group_rule.rst index 7ecafef..ffc6be5 100644 --- a/umn/source/security/security_group/modifying_a_security_group_rule.rst +++ b/umn/source/access_control/security_group/modifying_a_security_group_rule.rst @@ -14,12 +14,28 @@ Procedure --------- #. Log in to the management console. + #. Click |image1| in the upper left corner and select the desired region and project. + #. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + + The **Virtual Private Cloud** page is displayed. + #. In the navigation pane on the left, choose **Access Control** > **Security Groups**. -#. On the **Security Groups** page, click the security group name. -#. On the displayed page, locate the row that contains the security group rule to be modified, and click **Modify** in the **Operation** column. -#. Modify the rule and click **Confirm**. + + The security group list is displayed. + +#. In the security group list, click the name of the security group. + + The security group details page is displayed. + +#. Click the **Inbound Rules** or **Outbound Rules** tab as required. + + The security group rule list is displayed. + +#. Locate the row that contains the rule and click **Modify** in the **Operation** column. + +#. Modify the security group rule information as prompted and click **Confirm**. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001675613937.png diff --git a/umn/source/access_control/security_group/replicating_a_security_group_rule.rst b/umn/source/access_control/security_group/replicating_a_security_group_rule.rst new file mode 100644 index 0000000..4559c3a --- /dev/null +++ b/umn/source/access_control/security_group/replicating_a_security_group_rule.rst @@ -0,0 +1,39 @@ +:original_name: vpc_SecurityGroup_0004.html + +.. _vpc_SecurityGroup_0004: + +Replicating a Security Group Rule +================================= + +**Scenarios** +------------- + +You can replicate an existing security group rule and modify it to quickly generate a new rule. + +Procedure +--------- + +#. Log in to the management console. + +#. Click |image1| in the upper left corner and select the desired region and project. + +#. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + + The **Virtual Private Cloud** page is displayed. + +#. In the security group list, click the name of the security group. + + The security group details page is displayed. + +#. Click the **Inbound Rules** or **Outbound Rules** tab as required. + + The security group rule list is displayed. + +#. Locate the row that contains the rule and click **Replicate** in the **Operation** column. + + The **Replicate Inbound Rule** dialog box is displayed. + +#. Modify the security group rule information as prompted and click **OK**. + +.. |image1| image:: /_static/images/en-us_image_0141273034.png +.. |image2| image:: /_static/images/en-us_image_0000001626894090.png diff --git a/umn/source/access_control/security_group/security_group_configuration_examples.rst b/umn/source/access_control/security_group/security_group_configuration_examples.rst new file mode 100644 index 0000000..916f963 --- /dev/null +++ b/umn/source/access_control/security_group/security_group_configuration_examples.rst @@ -0,0 +1,201 @@ +:original_name: en-us_topic_0081124350.html + +.. _en-us_topic_0081124350: + +Security Group Configuration Examples +===================================== + +Here are some common security group configuration examples for different scenarios, including remote login to ECSs, website access, and internal communication between instances in different security groups. + +Generally, a security group denies all external requests by default. You need to add inbound rules to a security group based on the whitelist principle to allow specific external requests to access instances in the security group. + +- :ref:`Remotely Logging In to an ECS from a Local Server ` +- :ref:`Remotely Connecting to an ECS from a Local Server to Upload or Download Files ` +- :ref:`Setting Up a Website on an ECS to Provide Services Externally ` +- :ref:`Using ping Command to Verify Network Connectivity ` +- :ref:`Enabling ECSs In Different Security Groups to Communicate Through an Internal Network ` +- :ref:`ECS Providing Database Access Service ` +- :ref:`Allowing ECSs to Access Only Specific External Websites ` + +By default, all outbound rules of a security group allow all requests from instances in the security group to access external networks. :ref:`Table 1 ` lists the rules. + +.. _en-us_topic_0081124350__table102261597217: + +.. table:: **Table 1** Default outbound rules in a security group + + +-----------+------+-----------------+-------------+-------------------------------------------------------------------------------------------------+ + | Direction | Type | Protocol & Port | Destination | Description | + +===========+======+=================+=============+=================================================================================================+ + | Outbound | IPv4 | All | 0.0.0.0/0 | This rule allows access from instances in the security group to any IPv4 address over any port. | + +-----------+------+-----------------+-------------+-------------------------------------------------------------------------------------------------+ + | Outbound | IPv6 | All | ::/0 | This rule allows access from instances in the security group to any IPv6 address over any port. | + +-----------+------+-----------------+-------------+-------------------------------------------------------------------------------------------------+ + +.. _en-us_topic_0081124350__section14933617154810: + +Remotely Logging In to an ECS from a Local Server +------------------------------------------------- + +A security group denies all external requests by default. To remotely log in to an ECS from a local server, add an inbound security group rule based on the OS running on the ECS. + +- To remotely log in to a Linux ECS using SSH, enable the SSH (22) port. For details, see :ref:`Table 2 `. + +- To remotely log in to a Windows ECS using RDP, enable the RDP (3389) port. For details, see :ref:`Table 3 `. + + .. _en-us_topic_0081124350__table20321112045011: + + .. table:: **Table 2** Remotely logging in to a Linux ECS using SSH + + ========= ==== =============== ===================== + Direction Type Protocol & Port Source + ========= ==== =============== ===================== + Inbound IPv4 TCP: 22 IP address: 0.0.0.0/0 + ========= ==== =============== ===================== + + .. _en-us_topic_0081124350__table1579314381815: + + .. table:: **Table 3** Remotely logging in to a Windows ECS using RDP + + ========= ==== =============== ===================== + Direction Type Protocol & Port Source + ========= ==== =============== ===================== + Inbound IPv4 TCP: 3389 IP address: 0.0.0.0/0 + ========= ==== =============== ===================== + + .. important:: + + If the source is set to 0.0.0.0/0, remotely logging in to the ECS through any IP address is allowed. To ensure security, set the source to a specific IP address based on service requirements. For details about the configuration example, see :ref:`Table 4 `. + + .. _en-us_topic_0081124350__table1919016251434: + + .. table:: **Table 4** Remotely logging in to an ECS using a specified IP address + + =========== ========= ==== =============== ========================== + ECS Type Direction Type Protocol & Port Source + =========== ========= ==== =============== ========================== + Linux ECS Inbound IPv4 TCP: 22 IP address: 192.168.0.0/24 + Windows ECS Inbound IPv4 TCP: 3389 IP address: 10.10.0.0/24 + =========== ========= ==== =============== ========================== + +.. _en-us_topic_0081124350__section8685162114185: + +Remotely Connecting to an ECS from a Local Server to Upload or Download Files +----------------------------------------------------------------------------- + +By default, a security group denies all external requests. If you need to remotely connect to an ECS from a local server to upload or download files, you need to enable FTP ports 20 and 21. + +.. table:: **Table 5** Remotely connecting to an ECS from a local server to upload or download files + + ========= ==== =============== ===================== + Direction Type Protocol & Port Source + ========= ==== =============== ===================== + Inbound IPv4 TCP: 20-21 IP address: 0.0.0.0/0 + ========= ==== =============== ===================== + +.. important:: + + You must first install the FTP server program on the ECSs and check whether ports 20 and 21 are working properly. + +.. _en-us_topic_0081124350__section316061115481: + +Setting Up a Website on an ECS to Provide Services Externally +------------------------------------------------------------- + +A security group denies all external requests by default. If you have set up a website on an ECS that can be accessed externally, you need to add an inbound rule to the ECS security group to allow access over specific ports, such as HTTP (80) and HTTPS (443). + +.. table:: **Table 6** Setting up a website on an ECS to provide services externally + + ========= ==== =============== ===================== + Direction Type Protocol & Port Source + ========= ==== =============== ===================== + Inbound IPv4 TCP: 80 IP address: 0.0.0.0/0 + Inbound IPv4 TCP: 443 IP address: 0.0.0.0/0 + ========= ==== =============== ===================== + +.. _en-us_topic_0081124350__section29561427142511: + +Using **ping** Command to Verify Network Connectivity +----------------------------------------------------- + +By default, a security group denies all external requests. If you need to run the **ping** command on an ECS to verify network connectivity, add an inbound rule to the ECS security group to allow access over the ICMP port. + +.. table:: **Table 7** Using **ping** command to verify network connectivity + + ========= ==== =============== ===================== + Direction Type Protocol & Port Source + ========= ==== =============== ===================== + Inbound IPv4 ICMP: All IP address: 0.0.0.0/0 + Inbound IPv6 ICMP: All IP address: ::/0 + ========= ==== =============== ===================== + +.. _en-us_topic_0081124350__section094514632817: + +Enabling ECSs In Different Security Groups to Communicate Through an Internal Network +------------------------------------------------------------------------------------- + +ECSs in the same VPC but associated with different security groups cannot communicate with each other. If you want to share data between ECSs in a VPC, for example, ECSs in security group sg-A need to access MySQL databases in security group sg-B, you need to add an inbound rule to security group sg-B to allow access from ECSs in security group sg-A over MySQL port 3306. + +.. table:: **Table 8** Enabling instances in different security groups to communicate through an internal network + + ========= ==== =============== ==================== + Direction Type Protocol & Port Source + ========= ==== =============== ==================== + Inbound IPv4 TCP: 3306 Security group: sg-A + ========= ==== =============== ==================== + +.. _en-us_topic_0081124350__section7465183583515: + +ECS Providing Database Access Service +------------------------------------- + +A security group denies all external requests by default. If you have deployed the database service on an ECS and need to allow other ECSs to access the database service through an internal network, you need to add an inbound rule to the security group of the ECS with the database service deployed to allow access over ports, for example, MySQL (3306), Oracle (1521), MS SQL (1433), PostgreSQL (5432) and Redis (6379). + +.. table:: **Table 9** ECS providing database access service + + +-----------+------+-----------------+----------------------------+-------------------------------------------------------------------------------------------------------------------------------+ + | Direction | Type | Protocol & Port | Source | Description | + +===========+======+=================+============================+===============================================================================================================================+ + | Inbound | IPv4 | TCP: 3306 | Security group: sg-A | This rule allows ECSs in security group sg-A to access the MySQL database service. | + +-----------+------+-----------------+----------------------------+-------------------------------------------------------------------------------------------------------------------------------+ + | Inbound | IPv4 | TCP: 1521 | Security group: sg-B | This rule allows ECSs in security group sg-B to access the Oracle database service. | + +-----------+------+-----------------+----------------------------+-------------------------------------------------------------------------------------------------------------------------------+ + | Inbound | IPv4 | TCP: 1433 | IP address: 172.16.3.21/32 | This rule allows the ECS whose private IP address is 172.16.3.21 to access the MS SQL database service. | + +-----------+------+-----------------+----------------------------+-------------------------------------------------------------------------------------------------------------------------------+ + | Inbound | IPv4 | TCP: 5432 | IP address: 192.168.0.0/24 | This rule allows ECSs whose private IP addresses are in the 192.168.0.0/24 network to access the PostgreSQL database service. | + +-----------+------+-----------------+----------------------------+-------------------------------------------------------------------------------------------------------------------------------+ + +.. important:: + + In this example, the source is for reference only. Set the source address based on actual requirements. + +.. _en-us_topic_0081124350__section949023514612: + +Allowing ECSs to Access Only Specific External Websites +------------------------------------------------------- + +By default, a security group allows all outbound traffic. :ref:`Table 11 ` lists the default rules. If you want to allow ECSs to access only specific websites, configure the security groups of the ECSs as follows: + +#. First, add outbound rules to allow traffic over specific ports and to specific IP addresses. + + .. table:: **Table 10** Enabling instances in different security groups to communicate through an internal network + + ========= ==== =============== ========================= + Direction Type Protocol & Port Source + ========= ==== =============== ========================= + Outbound IPv4 TCP: 80 IP address: 132.15.XX.XX + Outbound IPv4 TCP: 443 IP address: 145.117.XX.XX + ========= ==== =============== ========================= + +#. Then, delete the original outbound rules that allow all traffic shown in :ref:`Table 11 `. + + .. _en-us_topic_0081124350__table5759161135518: + + .. table:: **Table 11** Default outbound rules in a security group + + +-----------+------+-----------------+-------------+-------------------------------------------------------------------------------------------------+ + | Direction | Type | Protocol & Port | Destination | Description | + +===========+======+=================+=============+=================================================================================================+ + | Outbound | IPv4 | All | 0.0.0.0/0 | This rule allows access from instances in the security group to any IPv4 address over any port. | + +-----------+------+-----------------+-------------+-------------------------------------------------------------------------------------------------+ + | Outbound | IPv6 | All | ::/0 | This rule allows access from instances in the security group to any IPv6 address over any port. | + +-----------+------+-----------------+-------------+-------------------------------------------------------------------------------------------------+ diff --git a/umn/source/access_control/security_group/security_groups_and_security_group_rules.rst b/umn/source/access_control/security_group/security_groups_and_security_group_rules.rst new file mode 100644 index 0000000..1879e47 --- /dev/null +++ b/umn/source/access_control/security_group/security_groups_and_security_group_rules.rst @@ -0,0 +1,122 @@ +:original_name: en-us_topic_0073379079.html + +.. _en-us_topic_0073379079: + +Security Groups and Security Group Rules +======================================== + +Security Groups +--------------- + +A security group is a collection of access control rules for cloud resources, such as cloud servers, containers, and databases, that have the same security protection requirements and that are mutually trusted. After a security group is created, you can create various access rules for the security group, these rules will apply to all cloud resources added to this security group. + +If you have not created any security group yet, the system automatically creates a default security group for you and associates it with the instance (such as an ECS) when you create it. For details about the default security group, see :ref:`Default Security Group and Its Rules `. + +Security groups are stateful. If you send a request from your instance and the outbound traffic is allowed, the response traffic for that request is allowed to flow in regardless of inbound security group rules. Similarly, if inbound traffic is allowed, responses to allowed inbound traffic are allowed to flow out, regardless of outbound rules. + +Security groups use connection tracking to track traffic to and from instances that they contain and security group rules are applied based on the connection status of the traffic to determine whether to allow or deny traffic. + +- If you add, modify, or delete a security group rule, or add or remove an instance to or from a security group, the inbound connection tracking of all instances in the security group will be automatically cleared. The inbound or outbound traffic of the instance will be considered as new connections, which need to match the inbound or outbound security group rules to ensure that the rules take effect immediately and the security of incoming traffic. + +- If there is no inbound or outbound traffic of an instance for a long time, the traffic will be considered as new connections after the connection tracking times out, and the connections need to match the outbound and inbound rules. The timeout period of connection tracking varies according to the protocol. The timeout period of a TCP connection in the established state is 600s, and the timeout period of an ICMP connection is 30s. For other protocols, if packets are received in both inbound and outbound directions, the connection tracking timeout period is 180s. If packets are received only in one direction, the connection tracking timeout period is 30s. For protocols other than TCP, UDP, and ICMP, only the IP address and protocol number are tracked. + +Security Group Rules +-------------------- + +A security group has inbound and outbound rules to control traffic that's allowed to reach or leave the instances associated with the security group. You can specify protocol, port, source/destination for a security group rule. :ref:`Table 1 ` describes key information about a security group rule. + +.. _en-us_topic_0073379079__table1919155115499: + +.. table:: **Table 1** Security group rule information + + +-----------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ + | Parameter | Description | + +===================================+========================================================================================================================================================================================================================+ + | Protocol | The network protocol used to match traffic in a security group rule. Currently, the value can be **All**, **TCP**, **UDP**, **GRE**, **ICMP**, or more. | + +-----------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ + | Port | Destination port used to match traffic in a security group rule. The value can be from 1 to 65535. | + | | | + | | - Inbound rules control incoming traffic over specific ports to instances in the security group. | + | | - Outbound rules control outgoing traffic over specific ports from instances in the security group. | + +-----------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ + | Source (Inbound) | The source in an inbound rule is used to match the IP address or address range of an external request. The source can be: | + | | | + | | - IP address: | + | | | + | | - Example IPv4 address: 192.168.10.10/32 | + | | - Example IPv6 address: 2002:50::44/128 | + | | - Example IPv4 address range: 192.168.52.0/24 All IPv4 addresses: 0.0.0.0/0 | + | | - Example IPv6 address range: 2407:c080:802:469::/64 All IPv6 addresses: ::/0 | + | | | + | | - Security group: You can select another security group in the same region under the current account as the source. | + | | | + | | For example, instance A is in security group A and instance B is in security group B. If security group A has a rule with **Source** set to security group B, access from instance B is allowed to instance A. | + +-----------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ + | Destination (Outbound) | The destination in an outbound rule is used to match the IP address or address range of an internal request. The destination can be: | + | | | + | | - IP address: | + | | | + | | - Example IPv4 address: 192.168.10.10/32 | + | | - Example IPv6 address: 2002:50::44/128 | + | | - Example IPv4 address range: 192.168.52.0/24 All IPv4 addresses: 0.0.0.0/0 | + | | - Example IPv6 address range: 2407:c080:802:469::/64 All IPv6 addresses: ::/0 | + | | | + | | - Security group: You can select another security group in the same region under the current account as the destination. | + | | | + | | For example, instance A is in security group A and instance B is in security group B. If security group A has a rule with **Destination** set to security group B, access from instance A is allowed to instance B. | + +-----------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ + +Like whitelists, security group rules work as follows: + +- Inbound rules control incoming traffic to instances in the security group. + + If an inbound request matches the source in an inbound security group rule, the request is allowed and other requests are denied. + + By default, you do not need to configure deny rules in the inbound direction because requests that do not match allow rules will be denied. + +- Outbound rules control outgoing traffic from instances in the security group. + + If the destination of an outbound security group rule is 0.0.0.0/0, all outbound requests are allowed. + + 0.0.0.0/0 represents all IPv4 addresses. + + ::/0 represents all IPv6 addresses. + +:ref:`Table 2 ` uses custom security group sg-AB as an example to describe its inbound and outbound rules in detail. + +.. _en-us_topic_0073379079__table102261597217: + +.. table:: **Table 2** Rules in security group sg-AB + + +-----------+------+-----------------+------------------------+------------------------------------------------------------------------------------------------------------------------------+ + | Direction | Type | Protocol & Port | Source/Destination | Description | + +===========+======+=================+========================+==============================================================================================================================+ + | Inbound | IPv4 | All | Source: sg-AB | Allows ECSs in the security group to communicate with each other. | + +-----------+------+-----------------+------------------------+------------------------------------------------------------------------------------------------------------------------------+ + | Inbound | IPv4 | TCP: 22 | Source: 0.0.0.0/0 | Allows all IPv4 addresses to access ECSs in the security group over port 22 (SSH) for remotely logging in to Linux ECSs. | + +-----------+------+-----------------+------------------------+------------------------------------------------------------------------------------------------------------------------------+ + | Inbound | IPv4 | TCP: 3389 | Source: 0.0.0.0/0 | Allows all IPv4 addresses to access ECSs in the security group over port 3389 (RDP) for remotely logging in to Windows ECSs. | + +-----------+------+-----------------+------------------------+------------------------------------------------------------------------------------------------------------------------------+ + | Inbound | IPv4 | TCP: 80 | Source: 10.5.6.30/32 | Allows IP address 10.5.6.30 to access ECSs in the security group over port 80. | + +-----------+------+-----------------+------------------------+------------------------------------------------------------------------------------------------------------------------------+ + | Outbound | IPv4 | All | Destination: 0.0.0.0/0 | Allows access from ECSs in the security group to any IPv4 address over any port. | + +-----------+------+-----------------+------------------------+------------------------------------------------------------------------------------------------------------------------------+ + | Outbound | IPv6 | All | Destination: ::/0 | Allows access from ECSs in the security group to any IPv6 address over any port. | + +-----------+------+-----------------+------------------------+------------------------------------------------------------------------------------------------------------------------------+ + +.. important:: + + - After a port is enabled in a security group rule, ensure that the port in the instance is also enabled to ensure normal network communication. + - Generally, instances in the same security group can communicate with each other by default. If instances in the same security group cannot communicate with each other, the possible causes are as follows: + + - The inbound rule for communication between instances in the same security group is deleted. + + - Different VPCs cannot communicate with each other. The instances belong to the same security group but different VPCs. + + You can use :ref:`VPC peering connections ` to connect VPCs in different regions. + +Security Group Constraints +-------------------------- + +- By default, you can create a maximum of 100 security groups in your cloud account. +- By default, you can add up to 50 security group rules to a security group. diff --git a/umn/source/security/security_group/viewing_the_security_group_of_an_ecs.rst b/umn/source/access_control/security_group/viewing_the_security_group_of_an_ecs.rst similarity index 80% rename from umn/source/security/security_group/viewing_the_security_group_of_an_ecs.rst rename to umn/source/access_control/security_group/viewing_the_security_group_of_an_ecs.rst index 0cc3518..2abb587 100644 --- a/umn/source/security/security_group/viewing_the_security_group_of_an_ecs.rst +++ b/umn/source/access_control/security_group/viewing_the_security_group_of_an_ecs.rst @@ -17,7 +17,7 @@ Procedure #. Click |image1| in the upper left corner and select the desired region and project. -#. Under **Computing**, click **Elastic Cloud Server**. +#. In the upper left corner of the page, click |image2|. In the service list, choose **Computing** > **Elastic Cloud Server**. The ECS list is displayed. @@ -30,3 +30,4 @@ Procedure You can view the security groups associated with the ECS and the inbound and outbound rules. .. |image1| image:: /_static/images/en-us_image_0141273034.png +.. |image2| image:: /_static/images/en-us_image_0000001675413821.png diff --git a/umn/source/change_history.rst b/umn/source/change_history.rst index ad6b13c..de4e8b9 100644 --- a/umn/source/change_history.rst +++ b/umn/source/change_history.rst @@ -8,9 +8,75 @@ Change History +-----------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ | Released On | Description | +===================================+====================================================================================================================================================================================================================================================================================================================================+ +| 2023-10-10 | This release incorporates the following changes: | +| | | +| | - Added the figure for configuring route tables in :ref:`Route Table `. | +| | - Modified :ref:`Step 4: Add a Security Group Rule `. | +| | | +| | - Changed the location of parameter **Type**. | +| | - Added protocol **GRE**. | +| | | +| | - Modified :ref:`Step 5: Add a Security Group Rule ` and :ref:`Adding a Security Group Rule `. | +| | | +| | - Added description that each ECS must be associated with at least one security group. | +| | - Modified description about port. | +| | - Changed the location of parameter **Type**. | +| | - Added protocol **GRE**. | +| | | +| | - Added the function of adding multiple tags for search in :ref:`Managing VPC Tags `. | +| | - Added figures and modified steps in :ref:`Viewing and Deleting Resources in a Subnet `. | +| | - Modified :ref:`Security Groups and Security Group Rules `. | +| | | +| | - Added protocol **GRE** and deleted content about **Action**. | +| | - Modified description about security group sg-AB. | +| | - Added description about security group configuration. | +| | - Added support for IPv6. | +| | | +| | - Changed the section name in :ref:`Default Security Group and Its Rules `. | +| | - Optimized description in :ref:`Creating a Security Group `. | +| | - Modified the figure and added parameter **Type** in :ref:`Fast-Adding Security Group Rules `. | +| | - Modified notes and constraints in :ref:`Importing and Exporting Security Group Rules `. | +| | - Added description about the maximum number of security groups that can be created in :ref:`Creating a Firewall `. | +| | - Modified figures and parameter settings in :ref:`Adding a Firewall Rule `. | +| | - Added the route table quota in notes and constraints in :ref:`Creating a Custom Route Table `. | +| | - Added constraints on the maximum number of routes that can be added to a route table in :ref:`Adding a Custom Route `. | +| | - Modified :ref:`Creating a VPC Peering Connection with Another VPC in Your Account `. | +| | | +| | - Added description that you need to add routes to the route tables of the local and peer VPCs after creating a VPC peering connection. | +| | - Added parameter **Description** for creating a VPC peering connection. | +| | | +| | - Added parameter **Description** for creating a VPC peering connection in :ref:`Creating a VPC Peering Connection with a VPC in Another Account `. | +| | | +| | - Added description about the maximum number of flow log records that can be recorded in :ref:`VPC Flow Log Overview `. | +| | - Modified the section name and scenarios in :ref:`Disabling Source and Destination Check (HA Load Balancing Cluster Scenario) `. | +| | - Modified the verification procedure in :ref:`Creating a User and Granting VPC Permissions `. | ++-----------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ +| 2023-09-08 | This release incorporates the following changes: | +| | | +| | Updated the following content: | +| | | +| | - Optimized description in :ref:`Step 4: Add a Security Group Rule `. | +| | - Optimized the procedure for verifying IAM permissions in :ref:`Creating a User and Granting VPC Permissions `. | ++-----------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ +| 2023-07-18 | This release incorporates the following changes: | +| | | +| | Updated the following content: | +| | | +| | Added description about enabling shared SNAT using an API in :ref:`Shared SNAT `. | +| | | +| | Security group | +| | | +| | Firewall | ++-----------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ +| 2023-06-12 | This release incorporates the following changes: | +| | | +| | Updated the following content: | +| | | +| | Added description about viewing monitoring metrics in :ref:`Viewing Metrics `. | ++-----------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ | 2023-05-26 | This release incorporates the following changes: | | | | -| | Added the following section: | +| | Added the following content: | | | | | | Added information about cloning a security group in :ref:`Cloning a Security Group `. | +-----------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ @@ -110,7 +176,7 @@ Change History +-----------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ | 2020-05-30 | Added the following content: | | | | -| | Added basic information to :ref:`Security Group Overview ` and :ref:`Firewall Overview `. | +| | Added basic information to :ref:`Security Groups and Security Group Rules ` and :ref:`Firewall Overview `. | | | | | | Modified the following content: | | | | @@ -144,7 +210,7 @@ Change History | | - Optimized figure examples in this document. | | | - Optimized descriptions in :ref:`Firewall Configuration Examples `. | | | - Optimized descriptions in :ref:`Firewall Overview `. | -| | - Changed the position of :ref:`Security `. | +| | - Changed the position of :ref:`Access Control `. | | | - Optimized :ref:`What Is a Quota? ` | | | | | | Deleted the following content: | @@ -162,7 +228,7 @@ Change History +-----------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ | 2019-12-13 | Added the following content: | | | | -| | - Added restrictions on ports and port ranges in :ref:`Security Group Overview `. | +| | - Added restrictions on ports and port ranges in :ref:`Security Groups and Security Group Rules `. | | | - Added description about IP address groups in :ref:`Importing and Exporting Security Group Rules `. | | | - Added impacts caused by IP address group modification or deletion in "Managing an IP Address Group". | | | | @@ -177,7 +243,7 @@ Change History | | - Optimized figure examples in this document. | | | - Optimized descriptions in :ref:`Firewall Configuration Examples `. | | | - Optimized descriptions in :ref:`Firewall Overview `. | -| | - Changed the position of :ref:`Security `. | +| | - Changed the position of :ref:`Access Control `. | | | | | | Deleted the following content: | | | | @@ -224,14 +290,14 @@ Change History | | Modified the following content: | | | | | | - Modified description about **NTP Server Address** in :ref:`Modifying a Subnet `. | -| | - Modified description about replication in the "Default Route Table and Custom Route Table" part in :ref:`Route Table Overview `. | -| | - Modified descriptions about system routes and custom routes in :ref:`Route Table Overview `. | -| | - Modified description about usage restrictions in :ref:`Route Table Overview `. | +| | - Modified description about replication in the "Default Route Table and Custom Route Table" part in :ref:`Route Tables and Routes `. | +| | - Modified descriptions about system routes and custom routes in :ref:`Route Tables and Routes `. | +| | - Modified description about usage restrictions in :ref:`Route Tables and Routes `. | | | | | | Deleted the following content: | | | | | | - Deleted parameter **Enterprise Project** from the document. | -| | - Deleted the Cloud Connect service from the "Default Route Table and Custom Route Table" part in :ref:`Route Table Overview `. | +| | - Deleted the Cloud Connect service from the "Default Route Table and Custom Route Table" part in :ref:`Route Tables and Routes `. | +-----------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ | 2019-08-02 | Added the following content based on the RM-584 requirements: | | | | diff --git a/umn/source/elastic_ip/assigning_an_eip_and_binding_it_to_an_ecs.rst b/umn/source/elastic_ip/assigning_an_eip_and_binding_it_to_an_ecs.rst index 711e2f0..1ff3f9e 100644 --- a/umn/source/elastic_ip/assigning_an_eip_and_binding_it_to_an_ecs.rst +++ b/umn/source/elastic_ip/assigning_an_eip_and_binding_it_to_an_ecs.rst @@ -67,8 +67,6 @@ Assigning an EIP | Enterprise Project | The enterprise project that the EIP belongs to. | default | | | | | | | An enterprise project facilitates project-level management and grouping of cloud resources and users. The name of the default project is **default**. | | - | | | | - | | For details about creating and managing enterprise projects, see the *Enterprise Management User Guide*. | | +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ | Bandwidth Name | The name of the bandwidth. | bandwidth | +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ diff --git a/umn/source/elastic_ip/unbinding_an_eip_from_an_ecs_and_releasing_the_eip.rst b/umn/source/elastic_ip/unbinding_an_eip_from_an_ecs_and_releasing_the_eip.rst index 03c4ace..2db8bb8 100644 --- a/umn/source/elastic_ip/unbinding_an_eip_from_an_ecs_and_releasing_the_eip.rst +++ b/umn/source/elastic_ip/unbinding_an_eip_from_an_ecs_and_releasing_the_eip.rst @@ -22,7 +22,7 @@ Notes and Constraints - You are advised to bind BGP EIPs to or unbind them from dedicated load balancers. - EIP assigned together with your load balancers will also be displayed in the EIP list. -- You can only release EIPs that are not bound to any resources. +- Only EIPs with no instance bound can be released. If you want to release an EIP with an instance bound, you need to unbind EIP from the instance first. Procedure --------- @@ -32,7 +32,7 @@ Procedure #. Log in to the management console. #. Click |image1| in the upper left corner and select the desired region and project. #. Click |image2| in the upper left corner and choose **Network** > **Elastic IP**. -#. On the displayed page, locate the row that contains the target EIP, and click **Unbind**. +#. On the displayed page, locate the row that contains the EIP, and click **Unbind**. #. Click **Yes** in the displayed dialog box. **Releasing a single EIP** diff --git a/umn/source/faq/bandwidth/how_do_i_buy_a_shared_bandwidth.rst b/umn/source/faq/bandwidth/how_do_i_buy_a_shared_bandwidth.rst deleted file mode 100644 index 974d645..0000000 --- a/umn/source/faq/bandwidth/how_do_i_buy_a_shared_bandwidth.rst +++ /dev/null @@ -1,15 +0,0 @@ -:original_name: vpc_faq_0035.html - -.. _vpc_faq_0035: - -How Do I Buy a Shared Bandwidth? -================================ - -#. Log in to the management console. -#. Click |image1| in the upper left corner and select the desired region and project. -#. Click |image2| in the upper left corner and choose **Network** > **Elastic IP**. -#. In the navigation pane on the left, choose **Shared Bandwidths**. -#. In the upper right corner, click **Assign Shared Bandwidth**. On the displayed page, configure parameters as prompted to assign a shared bandwidth. - -.. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001454059512.png diff --git a/umn/source/faq/bandwidth/index.rst b/umn/source/faq/bandwidth/index.rst index 09f2fb0..b35debe 100644 --- a/umn/source/faq/bandwidth/index.rst +++ b/umn/source/faq/bandwidth/index.rst @@ -8,7 +8,6 @@ Bandwidth - :ref:`What Is the Bandwidth Size Range? ` - :ref:`What Bandwidth Types Are Available? ` - :ref:`What Are the Differences Between a Dedicated Bandwidth and a Shared Bandwidth? Can a Dedicated Bandwidth Be Changed to a Shared Bandwidth or the Other Way Around? ` -- :ref:`How Do I Buy a Shared Bandwidth? ` .. toctree:: :maxdepth: 1 @@ -17,4 +16,3 @@ Bandwidth what_is_the_bandwidth_size_range what_bandwidth_types_are_available what_are_the_differences_between_a_dedicated_bandwidth_and_a_shared_bandwidth_can_a_dedicated_bandwidth_be_changed_to_a_shared_bandwidth_or_the_other_way_around - how_do_i_buy_a_shared_bandwidth diff --git a/umn/source/faq/bandwidth/what_bandwidth_types_are_available.rst b/umn/source/faq/bandwidth/what_bandwidth_types_are_available.rst index 7df0e75..96fc9bf 100644 --- a/umn/source/faq/bandwidth/what_bandwidth_types_are_available.rst +++ b/umn/source/faq/bandwidth/what_bandwidth_types_are_available.rst @@ -5,4 +5,4 @@ What Bandwidth Types Are Available? =================================== -There are dedicated bandwidth and shared bandwidth. A dedicated bandwidth can only be used by one EIP, but a shared bandwidth can be used by multiple EIPs. +There are dedicated bandwidths and shared bandwidths. A dedicated bandwidth can only be used by one EIP, but a shared bandwidth can be used by multiple EIPs. diff --git a/umn/source/faq/eips/how_do_i_access_an_ecs_with_an_eip_bound_from_the_internet.rst b/umn/source/faq/eips/how_do_i_access_an_ecs_with_an_eip_bound_from_the_internet.rst index 7c32ff7..29c444b 100644 --- a/umn/source/faq/eips/how_do_i_access_an_ecs_with_an_eip_bound_from_the_internet.rst +++ b/umn/source/faq/eips/how_do_i_access_an_ecs_with_an_eip_bound_from_the_internet.rst @@ -7,7 +7,7 @@ How Do I Access an ECS with an EIP Bound from the Internet? Each ECS is automatically added to a security group after being created to ensure its security. The security group denies access traffic from the Internet by default. To allow external access to ECSs in the security group, add an inbound rule to the security group. -You can set **Protocol** to **TCP**, **UDP**, **ICMP**, or **All** as required on the page for creating a security group rule. +You can set **Protocol** to **TCP**, **UDP**, **ICMP**, **GRE**, or **All** as required on the page for creating a security group rule. - If your ECS needs to be accessible over the Internet and you know the IP address used to access the ECS, set **Source** to the IP address range containing the IP address. diff --git a/umn/source/faq/security/how_many_firewalls_can_i_create.rst b/umn/source/faq/security/how_many_firewalls_can_i_create.rst deleted file mode 100644 index ab1055c..0000000 --- a/umn/source/faq/security/how_many_firewalls_can_i_create.rst +++ /dev/null @@ -1,8 +0,0 @@ -:original_name: vpc_faq_0072.html - -.. _vpc_faq_0072: - -How Many Firewalls Can I Create? -================================ - -You can create up to 200 firewalls. It is recommended that you configure no more than 20 inbound or outbound rules for each firewall. If you configure more than 20 inbound or outbound rules for a firewall, forwarding performance will deteriorate. diff --git a/umn/source/faq/security/how_many_security_groups_can_i_create.rst b/umn/source/faq/security/how_many_security_groups_can_i_create.rst deleted file mode 100644 index b84715f..0000000 --- a/umn/source/faq/security/how_many_security_groups_can_i_create.rst +++ /dev/null @@ -1,10 +0,0 @@ -:original_name: vpc_faq_0040.html - -.. _vpc_faq_0040: - -How Many Security Groups Can I Create? -====================================== - -Each account can have up to 100 security groups and 5000 security group rules. - -When you create an ECS, you can select multiple security groups, but it is recommended that you select no more than five. diff --git a/umn/source/faq/security/index.rst b/umn/source/faq/security/index.rst index 787188c..7aaef8a 100644 --- a/umn/source/faq/security/index.rst +++ b/umn/source/faq/security/index.rst @@ -5,10 +5,9 @@ Security ======== +- :ref:`Why Can't I Delete a Security Group? ` - :ref:`Can I Change the Security Group of an ECS? ` -- :ref:`How Many Security Groups Can I Create? ` - :ref:`How Do I Configure a Security Group for Multi-Channel Protocols? ` -- :ref:`How Many Firewalls Can I Create? ` - :ref:`Does a Security Group Rule or a Firewall Rule Immediately Take Effect for Existing Connections After It Is Modified? ` - :ref:`Which Security Group Rule Has Priority When Multiple Security Group Rules Conflict? ` @@ -16,9 +15,8 @@ Security :maxdepth: 1 :hidden: + why_cant_i_delete_a_security_group can_i_change_the_security_group_of_an_ecs - how_many_security_groups_can_i_create how_do_i_configure_a_security_group_for_multi-channel_protocols - how_many_firewalls_can_i_create does_a_security_group_rule_or_a_firewall_rule_immediately_take_effect_for_existing_connections_after_it_is_modified which_security_group_rule_has_priority_when_multiple_security_group_rules_conflict diff --git a/umn/source/faq/security/why_cant_i_delete_a_security_group.rst b/umn/source/faq/security/why_cant_i_delete_a_security_group.rst new file mode 100644 index 0000000..0682f0b --- /dev/null +++ b/umn/source/faq/security/why_cant_i_delete_a_security_group.rst @@ -0,0 +1,16 @@ +:original_name: faq_security_0003.html + +.. _faq_security_0003: + +Why Can't I Delete a Security Group? +==================================== + +- The default security group is named **default** and cannot be deleted. + +- If you want to delete a security group that is associated with instances, such as cloud servers, containers, and databases, you need to remove the instances from the security group first. + +- A security group cannot be deleted if it is used as the source or destination of a rule in another security group. + + You need to delete or modify the rule first and delete the security group. + + For example, if the source of a rule in security group **sg-B** is set to **sg-A**, you need to delete or modify the rule in **sg-B** before deleting **sg-A**. diff --git a/umn/source/faq/vpc_peering_connections/why_did_communication_fail_between_vpcs_that_were_connected_by_a_vpc_peering_connection.rst b/umn/source/faq/vpc_peering_connections/why_did_communication_fail_between_vpcs_that_were_connected_by_a_vpc_peering_connection.rst index 4db7cfd..3f105ce 100644 --- a/umn/source/faq/vpc_peering_connections/why_did_communication_fail_between_vpcs_that_were_connected_by_a_vpc_peering_connection.rst +++ b/umn/source/faq/vpc_peering_connections/why_did_communication_fail_between_vpcs_that_were_connected_by_a_vpc_peering_connection.rst @@ -137,7 +137,7 @@ Incorrect Network Configuration #. Check whether security group rules of the ECSs that need to communicate allow inbound traffic from each other by referring to :ref:`Viewing the Security Group of an ECS `. - If the ECSs are associated with the same security group, you do not need to check their rules. - - If the ECSs are associated with different security groups, add an inbound rule to allow access from each other by referring to :ref:`Enabling ECSs in Different Security Groups to Communicate with Each Other Through an Internal Network `. + - If the ECSs are associated with different security groups, add an inbound rule to allow access from each other by referring to :ref:`Security Group Configuration Examples `. #. Check whether the firewall of the ECS NIC blocks traffic. diff --git a/umn/source/faq/vpcs_and_subnets/can_subnets_communicate_with_each_other.rst b/umn/source/faq/vpcs_and_subnets/can_subnets_communicate_with_each_other.rst index 38e7aeb..6d684da 100644 --- a/umn/source/faq/vpcs_and_subnets/can_subnets_communicate_with_each_other.rst +++ b/umn/source/faq/vpcs_and_subnets/can_subnets_communicate_with_each_other.rst @@ -5,7 +5,8 @@ Can Subnets Communicate with Each Other? ======================================== -Subnets in the same VPC can communicate with each other, but subnets in different VPCs cannot communicate with each other by default. However, you can create VPC peering connections to enable subnets in different VPCs to communicate with each other. +- Subnets in the same VPC can communicate with each other by default. +- VPCs are isolated from each other. Subnets from different VPCs cannot communicate with each other. You can use a VPC peering connection to enable communication between VPCs in the same region. .. note:: diff --git a/umn/source/faq/vpcs_and_subnets/what_subnet_cidr_blocks_are_available.rst b/umn/source/faq/vpcs_and_subnets/what_subnet_cidr_blocks_are_available.rst index 115d849..067d789 100644 --- a/umn/source/faq/vpcs_and_subnets/what_subnet_cidr_blocks_are_available.rst +++ b/umn/source/faq/vpcs_and_subnets/what_subnet_cidr_blocks_are_available.rst @@ -5,4 +5,6 @@ What Subnet CIDR Blocks Are Available? ====================================== -A subnet CIDR block must be included in its VPC CIDR block. Supported VPC CIDR blocks are **10.0.0.0/8-24**, **172.16.0.0/12-24**, and **192.168.0.0/16-24**. The allowed block size of a subnet is between the netmask of its VPC CIDR block and the /29 netmask. +A subnet is an IP address range from a VPC. The VPC service supports CIDR blocks 10.0.0.0/8-24, 172.16.0.0/12-24, and 192.168.0.0/16-24. + +Subnets must reside within your VPC, and the subnet masks used to define them can be between the netmask of its VPC CIDR block and /29 netmask. diff --git a/umn/source/faq/vpcs_and_subnets/which_cidr_blocks_are_available_for_the_vpc_service.rst b/umn/source/faq/vpcs_and_subnets/which_cidr_blocks_are_available_for_the_vpc_service.rst index 32287a9..6f067aa 100644 --- a/umn/source/faq/vpcs_and_subnets/which_cidr_blocks_are_available_for_the_vpc_service.rst +++ b/umn/source/faq/vpcs_and_subnets/which_cidr_blocks_are_available_for_the_vpc_service.rst @@ -10,14 +10,18 @@ The following table lists the private CIDR blocks that you can specify when crea - Number of IP addresses: Reserve sufficient IP addresses in case of business growth. - IP address range: Avoid IP address conflicts if you need to connect a VPC to an on-premises data center or connect two VPCs. -The VPC service supports the following CIDR blocks: +:ref:`Table 1 ` lists the supported VPC CIDR blocks. -+-------------------+-----------------------------+--------------------------------+ -| VPC CIDR Block | IP Address Range | Maximum Number of IP Addresses | -+===================+=============================+================================+ -| 10.0.0.0/8-24 | 10.0.0.0-10.255.255.255 | 2^24-2=16777214 | -+-------------------+-----------------------------+--------------------------------+ -| 172.16.0.0/12-24 | 172.16.0.0-172.31.255.255 | 2^20-2=1048574 | -+-------------------+-----------------------------+--------------------------------+ -| 192.168.0.0/16-24 | 192.168.0.0-192.168.255.255 | 2^16-2=65534 | -+-------------------+-----------------------------+--------------------------------+ +.. _vpc_faq_0004__table3240172772213: + +.. table:: **Table 1** VPC CIDR blocks + + +-------------------+-----------------------------+--------------------------------+ + | VPC CIDR Block | IP Address Range | Maximum Number of IP Addresses | + +===================+=============================+================================+ + | 10.0.0.0/8-24 | 10.0.0.0-10.255.255.255 | 2^24-2=16777214 | + +-------------------+-----------------------------+--------------------------------+ + | 172.16.0.0/12-24 | 172.16.0.0-172.31.255.255 | 2^20-2=1048574 | + +-------------------+-----------------------------+--------------------------------+ + | 192.168.0.0/16-24 | 192.168.0.0-192.168.255.255 | 2^16-2=65534 | + +-------------------+-----------------------------+--------------------------------+ diff --git a/umn/source/faq/vpcs_and_subnets/why_cant_i_delete_my_vpcs_and_subnets.rst b/umn/source/faq/vpcs_and_subnets/why_cant_i_delete_my_vpcs_and_subnets.rst index 4d32cd9..97a7da5 100644 --- a/umn/source/faq/vpcs_and_subnets/why_cant_i_delete_my_vpcs_and_subnets.rst +++ b/umn/source/faq/vpcs_and_subnets/why_cant_i_delete_my_vpcs_and_subnets.rst @@ -26,7 +26,7 @@ You can refer to :ref:`Table 1 ` to delete sub +=================================================================================================+============================================================================+============================================================================================================================================================+ | You do not have permission to perform this operation. | Your account does not have permissions to delete subnets. | Contact the account administrator to grant permissions to your account and then delete the subnet. | +-------------------------------------------------------------------------------------------------+----------------------------------------------------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------+ - | Delete custom routes from the associated route table of the subnet and then delete the subnet. | The route table has custom routes with the following as the next hop type: | Delete the custom route from the route table and then delete the subnet. | + | Delete custom routes from the associated route table of the subnet and then delete the subnet. | The route table has custom routes with the following as the next hop type: | Delete the custom routes from the route table and then delete the subnet. | | | | | | | - Server | #. :ref:`Viewing the Route Table Associated with a Subnet ` | | | - Extension NIC | #. :ref:`Deleting a Route ` | @@ -37,7 +37,7 @@ You can refer to :ref:`Table 1 ` to delete sub | | | | | | | :ref:`Releasing a Virtual IP Address ` | +-------------------------------------------------------------------------------------------------+----------------------------------------------------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------+ - | Release any private IP addresses configured in the subnet and then delete the subnet. | The subnet has virtual IP addresses that are not used by any instance. | On the **IP Addresses** tab, view and release these private IP addresses and then delete the subnet. | + | Release any private IP addresses configured in the subnet and then delete the subnet. | The subnet has virtual IP addresses that are not used by any instance. | On the **IP Addresses** tab, release these private IP addresses that are not required and then delete the subnet. | | | | | | | | #. :ref:`Viewing IP Addresses in a Subnet ` | | | | #. In the private IP address list, locate the IP address that is not being used and click **Release** in the **Operation** column. | diff --git a/umn/source/getting_started/configuring_a_vpc_for_ecss_that_access_the_internet_using_eips/index.rst b/umn/source/getting_started/configuring_a_vpc_for_ecss_that_access_the_internet_using_eips/index.rst index 0256770..4efe30f 100644 --- a/umn/source/getting_started/configuring_a_vpc_for_ecss_that_access_the_internet_using_eips/index.rst +++ b/umn/source/getting_started/configuring_a_vpc_for_ecss_that_access_the_internet_using_eips/index.rst @@ -11,6 +11,8 @@ Configuring a VPC for ECSs That Access the Internet Using EIPs #. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + #. Click **Create VPC**. #. On the **Create VPC** page, set parameters as prompted. @@ -19,91 +21,89 @@ Configuring a VPC for ECSs That Access the Internet Using EIPs .. table:: **Table 1** VPC parameter descriptions - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Category | Parameter | Description | Example Value | - +=====================================+========================+=========================================================================================================================================================================================================================================================================================================+=====================+ - | Basic Information | Region | Regions are geographic areas that are physically isolated from each other. The networks inside different regions are not connected to each other, so resources cannot be shared across different regions. For lower network latency and faster access to your resources, select the region nearest you. | eu-de | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Basic Information | Name | The VPC name. | VPC-001 | - | | | | | - | | | The name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces. | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Basic Information | CIDR Block | The CIDR block of the VPC. The CIDR block of a subnet can be the same as the CIDR block for the VPC (for a single subnet in the VPC) or a subset of the CIDR block for the VPC (for multiple subnets in the VPC). | 192.168.0.0/16 | - | | | | | - | | | The following CIDR blocks are supported: | | - | | | | | - | | | 10.0.0.0/8-24 | | - | | | | | - | | | 172.16.0.0/12-24 | | - | | | | | - | | | 192.168.0.0/16-24 | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Basic Information | Enterprise Project | The enterprise project to which the VPC belongs. | default | - | | | | | - | | | An enterprise project facilitates project-level management and grouping of cloud resources and users. The name of the default project is **default**. | | - | | | | | - | | | For details about creating and managing enterprise projects, see the *Enterprise Management User Guide*. | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Basic Information/Advanced Settings | Tag | The VPC tag, which consists of a key and value pair. You can add a maximum of 20 tags to each VPC. | - Key: vpc_key1 | - | | | | - Value: vpc-01 | - | | | The tag key and value must meet the requirements listed in :ref:`Table 2 `. | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Basic Information/Advanced Settings | Description | Supplementary information about the VPC. This parameter is optional. | N/A | - | | | | | - | | | The VPC description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Default Subnet | Name | The subnet name. | Subnet | - | | | | | - | | | The name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces. | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Default Subnet | CIDR Block | The CIDR block for the subnet. This value must be within the VPC CIDR block. | 192.168.0.0/24 | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Default Subnet | Associated Route Table | The default route table to which the subnet will be associated. You can change the route table to a custom route table on the **Subnets** page. | Default | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Default Subnet/Advanced Settings | Gateway | The gateway address of the subnet. | 192.168.0.1 | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Default Subnet/Advanced Settings | DNS Server Address | By default, two DNS server addresses are configured. You can change them as required. A maximum of five DNS server addresses can be configured. Multiple IP addresses must be separated using commas (,). | 100.125.x.x | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Default Subnet/Advanced Settings | NTP Server Address | The IP address of the NTP server. This parameter is optional. | 192.168.2.1 | - | | | | | - | | | You can configure the NTP server IP addresses to be added to the subnet as required. The IP addresses are added in addition to the default NTP server addresses. If this parameter is left empty, no IP address of the NTP server is added. | | - | | | | | - | | | A maximum of four IP addresses can be configured. Multiple IP addresses must be separated using commas (,). | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Default Subnet/Advanced Settings | Tag | The subnet tag, which consists of a key and value pair. You can add a maximum of 20 tags to each subnet. | - Key: subnet_key1 | - | | | | - Value: subnet-01 | - | | | The tag key and value must meet the requirements listed in :ref:`Table 3 `. | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Default Subnet/Advanced Settings | Description | Supplementary information about the subnet. This parameter is optional. | N/A | - | | | | | - | | | The subnet description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Category | Parameter | Description | Example Value | + +=====================================+========================+=============================================================================================================================================================================================================================================================+=====================+ + | Basic Information | Region | Select the region nearest to you to ensure the lowest latency possible. | eu-de | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Basic Information | Name | The VPC name. | VPC-001 | + | | | | | + | | | The name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces. | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Basic Information | IPv4 CIDR Block | The CIDR block of the VPC. The CIDR block of a subnet can be the same as the CIDR block for the VPC (for a single subnet in the VPC) or a subset of the CIDR block for the VPC (for multiple subnets in the VPC). | 192.168.0.0/16 | + | | | | | + | | | The following CIDR blocks are supported: | | + | | | | | + | | | 10.0.0.0/8-24 | | + | | | | | + | | | 172.16.0.0/12-24 | | + | | | | | + | | | 192.168.0.0/16-24 | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Basic Information | Enterprise Project | The enterprise project to which the VPC belongs. | default | + | | | | | + | | | An enterprise project facilitates project-level management and grouping of cloud resources and users. The name of the default project is **default**. | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Basic Information/Advanced Settings | Tag | The VPC tag, which consists of a key and value pair. You can add a maximum of 20 tags to each VPC. | - Key: vpc_key1 | + | | | | - Value: vpc-01 | + | | | The tag key and value must meet the requirements listed in :ref:`Table 2 `. | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Basic Information/Advanced Settings | Description | Supplementary information about the VPC. This parameter is optional. | N/A | + | | | | | + | | | The VPC description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Default Subnet | Name | The subnet name. | Subnet | + | | | | | + | | | The name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces. | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Default Subnet | CIDR Block | The CIDR block for the subnet. This value must be within the VPC CIDR block. | 192.168.0.0/24 | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Default Subnet | Associated Route Table | The default route table to which the subnet will be associated. You can change the route table to a custom route table on the **Subnets** page. | Default | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Default Subnet/Advanced Settings | Gateway | The gateway address of the subnet. | 192.168.0.1 | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Default Subnet/Advanced Settings | DNS Server Address | By default, two DNS server addresses are configured. You can change them as required. A maximum of five DNS server addresses can be configured. Multiple IP addresses must be separated using commas (,). | 100.125.x.x | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Default Subnet/Advanced Settings | NTP Server Address | The IP address of the NTP server. This parameter is optional. | 192.168.2.1 | + | | | | | + | | | You can configure the NTP server IP addresses to be added to the subnet as required. The IP addresses are added in addition to the default NTP server addresses. If you do not specify this parameter, no additional NTP server IP addresses will be added. | | + | | | | | + | | | A maximum of four IP addresses can be configured. Multiple IP addresses must be separated using commas (,). | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Default Subnet/Advanced Settings | Tag | The subnet tag, which consists of a key and value pair. You can add a maximum of 20 tags to each subnet. | - Key: subnet_key1 | + | | | | - Value: subnet-01 | + | | | The tag key and value must meet the requirements listed in :ref:`Table 3 `. | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Default Subnet/Advanced Settings | Description | Supplementary information about the subnet. This parameter is optional. | N/A | + | | | | | + | | | The subnet description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ .. _en-us_topic_0017816228__en-us_topic_0013935842_table248245914136: .. table:: **Table 2** VPC tag key and value requirements - +-----------------------+----------------------------------------------------------------------------+-----------------------+ - | Parameter | Requirements | Example Value | - +=======================+============================================================================+=======================+ - | Key | - Cannot be left blank. | vpc_key1 | - | | - Must be unique for the same VPC and can be the same for different VPCs. | | - | | - Can contain a maximum of 36 characters. | | - | | - Can contain only the following character types: | | - | | | | - | | - Uppercase letters | | - | | - Lowercase letters | | - | | - Digits | | - | | - Special characters, including hyphens (-) and underscores (_) | | - +-----------------------+----------------------------------------------------------------------------+-----------------------+ - | Value | - Can contain a maximum of 43 characters. | vpc-01 | - | | - Can contain only the following character types: | | - | | | | - | | - Uppercase letters | | - | | - Lowercase letters | | - | | - Digits | | - | | - Special characters, including hyphens (-) and underscores (_) | | - +-----------------------+----------------------------------------------------------------------------+-----------------------+ + +-----------------------+------------------------------------------------------------------------+-----------------------+ + | Parameter | Requirements | Example Value | + +=======================+========================================================================+=======================+ + | Key | - Cannot be left blank. | vpc_key1 | + | | - Must be unique for each VPC and can be the same for different VPCs. | | + | | - Can contain a maximum of 36 characters. | | + | | - Can contain only the following character types: | | + | | | | + | | - Uppercase letters | | + | | - Lowercase letters | | + | | - Digits | | + | | - Special characters, including hyphens (-) and underscores (_) | | + +-----------------------+------------------------------------------------------------------------+-----------------------+ + | Value | - Can contain a maximum of 43 characters. | vpc-01 | + | | - Can contain only the following character types: | | + | | | | + | | - Uppercase letters | | + | | - Lowercase letters | | + | | - Digits | | + | | - Special characters, including hyphens (-) and underscores (_) | | + +-----------------------+------------------------------------------------------------------------+-----------------------+ .. _en-us_topic_0017816228__en-us_topic_0013935842_table6536185812515: diff --git a/umn/source/getting_started/configuring_a_vpc_for_ecss_that_access_the_internet_using_eips/step_1_create_a_vpc.rst b/umn/source/getting_started/configuring_a_vpc_for_ecss_that_access_the_internet_using_eips/step_1_create_a_vpc.rst index cd828ea..e2cda31 100644 --- a/umn/source/getting_started/configuring_a_vpc_for_ecss_that_access_the_internet_using_eips/step_1_create_a_vpc.rst +++ b/umn/source/getting_started/configuring_a_vpc_for_ecss_that_access_the_internet_using_eips/step_1_create_a_vpc.rst @@ -21,6 +21,8 @@ Procedure #. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + #. Click **Create VPC**. #. On the **Create VPC** page, set parameters as prompted. @@ -29,91 +31,89 @@ Procedure .. table:: **Table 1** VPC parameter descriptions - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Category | Parameter | Description | Example Value | - +=====================================+========================+=========================================================================================================================================================================================================================================================================================================+=====================+ - | Basic Information | Region | Regions are geographic areas that are physically isolated from each other. The networks inside different regions are not connected to each other, so resources cannot be shared across different regions. For lower network latency and faster access to your resources, select the region nearest you. | eu-de | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Basic Information | Name | The VPC name. | VPC-001 | - | | | | | - | | | The name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces. | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Basic Information | CIDR Block | The CIDR block of the VPC. The CIDR block of a subnet can be the same as the CIDR block for the VPC (for a single subnet in the VPC) or a subset of the CIDR block for the VPC (for multiple subnets in the VPC). | 192.168.0.0/16 | - | | | | | - | | | The following CIDR blocks are supported: | | - | | | | | - | | | 10.0.0.0/8-24 | | - | | | | | - | | | 172.16.0.0/12-24 | | - | | | | | - | | | 192.168.0.0/16-24 | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Basic Information | Enterprise Project | The enterprise project to which the VPC belongs. | default | - | | | | | - | | | An enterprise project facilitates project-level management and grouping of cloud resources and users. The name of the default project is **default**. | | - | | | | | - | | | For details about creating and managing enterprise projects, see the *Enterprise Management User Guide*. | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Basic Information/Advanced Settings | Tag | The VPC tag, which consists of a key and value pair. You can add a maximum of 20 tags to each VPC. | - Key: vpc_key1 | - | | | | - Value: vpc-01 | - | | | The tag key and value must meet the requirements listed in :ref:`Table 2 `. | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Basic Information/Advanced Settings | Description | Supplementary information about the VPC. This parameter is optional. | N/A | - | | | | | - | | | The VPC description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Default Subnet | Name | The subnet name. | Subnet | - | | | | | - | | | The name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces. | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Default Subnet | CIDR Block | The CIDR block for the subnet. This value must be within the VPC CIDR block. | 192.168.0.0/24 | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Default Subnet | Associated Route Table | The default route table to which the subnet will be associated. You can change the route table to a custom route table on the **Subnets** page. | Default | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Default Subnet/Advanced Settings | Gateway | The gateway address of the subnet. | 192.168.0.1 | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Default Subnet/Advanced Settings | DNS Server Address | By default, two DNS server addresses are configured. You can change them as required. A maximum of five DNS server addresses can be configured. Multiple IP addresses must be separated using commas (,). | 100.125.x.x | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Default Subnet/Advanced Settings | NTP Server Address | The IP address of the NTP server. This parameter is optional. | 192.168.2.1 | - | | | | | - | | | You can configure the NTP server IP addresses to be added to the subnet as required. The IP addresses are added in addition to the default NTP server addresses. If this parameter is left empty, no IP address of the NTP server is added. | | - | | | | | - | | | A maximum of four IP addresses can be configured. Multiple IP addresses must be separated using commas (,). | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Default Subnet/Advanced Settings | Tag | The subnet tag, which consists of a key and value pair. You can add a maximum of 20 tags to each subnet. | - Key: subnet_key1 | - | | | | - Value: subnet-01 | - | | | The tag key and value must meet the requirements listed in :ref:`Table 3 `. | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Default Subnet/Advanced Settings | Description | Supplementary information about the subnet. This parameter is optional. | N/A | - | | | | | - | | | The subnet description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Category | Parameter | Description | Example Value | + +=====================================+========================+=============================================================================================================================================================================================================================================================+=====================+ + | Basic Information | Region | Select the region nearest to you to ensure the lowest latency possible. | eu-de | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Basic Information | Name | The VPC name. | VPC-001 | + | | | | | + | | | The name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces. | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Basic Information | IPv4 CIDR Block | The CIDR block of the VPC. The CIDR block of a subnet can be the same as the CIDR block for the VPC (for a single subnet in the VPC) or a subset of the CIDR block for the VPC (for multiple subnets in the VPC). | 192.168.0.0/16 | + | | | | | + | | | The following CIDR blocks are supported: | | + | | | | | + | | | 10.0.0.0/8-24 | | + | | | | | + | | | 172.16.0.0/12-24 | | + | | | | | + | | | 192.168.0.0/16-24 | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Basic Information | Enterprise Project | The enterprise project to which the VPC belongs. | default | + | | | | | + | | | An enterprise project facilitates project-level management and grouping of cloud resources and users. The name of the default project is **default**. | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Basic Information/Advanced Settings | Tag | The VPC tag, which consists of a key and value pair. You can add a maximum of 20 tags to each VPC. | - Key: vpc_key1 | + | | | | - Value: vpc-01 | + | | | The tag key and value must meet the requirements listed in :ref:`Table 2 `. | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Basic Information/Advanced Settings | Description | Supplementary information about the VPC. This parameter is optional. | N/A | + | | | | | + | | | The VPC description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Default Subnet | Name | The subnet name. | Subnet | + | | | | | + | | | The name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces. | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Default Subnet | CIDR Block | The CIDR block for the subnet. This value must be within the VPC CIDR block. | 192.168.0.0/24 | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Default Subnet | Associated Route Table | The default route table to which the subnet will be associated. You can change the route table to a custom route table on the **Subnets** page. | Default | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Default Subnet/Advanced Settings | Gateway | The gateway address of the subnet. | 192.168.0.1 | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Default Subnet/Advanced Settings | DNS Server Address | By default, two DNS server addresses are configured. You can change them as required. A maximum of five DNS server addresses can be configured. Multiple IP addresses must be separated using commas (,). | 100.125.x.x | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Default Subnet/Advanced Settings | NTP Server Address | The IP address of the NTP server. This parameter is optional. | 192.168.2.1 | + | | | | | + | | | You can configure the NTP server IP addresses to be added to the subnet as required. The IP addresses are added in addition to the default NTP server addresses. If you do not specify this parameter, no additional NTP server IP addresses will be added. | | + | | | | | + | | | A maximum of four IP addresses can be configured. Multiple IP addresses must be separated using commas (,). | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Default Subnet/Advanced Settings | Tag | The subnet tag, which consists of a key and value pair. You can add a maximum of 20 tags to each subnet. | - Key: subnet_key1 | + | | | | - Value: subnet-01 | + | | | The tag key and value must meet the requirements listed in :ref:`Table 3 `. | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Default Subnet/Advanced Settings | Description | Supplementary information about the subnet. This parameter is optional. | N/A | + | | | | | + | | | The subnet description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ .. _vpc_qs_0009__en-us_topic_0013935842_table248245914136: .. table:: **Table 2** VPC tag key and value requirements - +-----------------------+----------------------------------------------------------------------------+-----------------------+ - | Parameter | Requirements | Example Value | - +=======================+============================================================================+=======================+ - | Key | - Cannot be left blank. | vpc_key1 | - | | - Must be unique for the same VPC and can be the same for different VPCs. | | - | | - Can contain a maximum of 36 characters. | | - | | - Can contain only the following character types: | | - | | | | - | | - Uppercase letters | | - | | - Lowercase letters | | - | | - Digits | | - | | - Special characters, including hyphens (-) and underscores (_) | | - +-----------------------+----------------------------------------------------------------------------+-----------------------+ - | Value | - Can contain a maximum of 43 characters. | vpc-01 | - | | - Can contain only the following character types: | | - | | | | - | | - Uppercase letters | | - | | - Lowercase letters | | - | | - Digits | | - | | - Special characters, including hyphens (-) and underscores (_) | | - +-----------------------+----------------------------------------------------------------------------+-----------------------+ + +-----------------------+------------------------------------------------------------------------+-----------------------+ + | Parameter | Requirements | Example Value | + +=======================+========================================================================+=======================+ + | Key | - Cannot be left blank. | vpc_key1 | + | | - Must be unique for each VPC and can be the same for different VPCs. | | + | | - Can contain a maximum of 36 characters. | | + | | - Can contain only the following character types: | | + | | | | + | | - Uppercase letters | | + | | - Lowercase letters | | + | | - Digits | | + | | - Special characters, including hyphens (-) and underscores (_) | | + +-----------------------+------------------------------------------------------------------------+-----------------------+ + | Value | - Can contain a maximum of 43 characters. | vpc-01 | + | | - Can contain only the following character types: | | + | | | | + | | - Uppercase letters | | + | | - Lowercase letters | | + | | - Digits | | + | | - Special characters, including hyphens (-) and underscores (_) | | + +-----------------------+------------------------------------------------------------------------+-----------------------+ .. _vpc_qs_0009__en-us_topic_0013935842_table6536185812515: diff --git a/umn/source/getting_started/configuring_a_vpc_for_ecss_that_access_the_internet_using_eips/step_2_create_a_subnet_for_the_vpc.rst b/umn/source/getting_started/configuring_a_vpc_for_ecss_that_access_the_internet_using_eips/step_2_create_a_subnet_for_the_vpc.rst index f636c1b..da22c06 100644 --- a/umn/source/getting_started/configuring_a_vpc_for_ecss_that_access_the_internet_using_eips/step_2_create_a_subnet_for_the_vpc.rst +++ b/umn/source/getting_started/configuring_a_vpc_for_ecss_that_access_the_internet_using_eips/step_2_create_a_subnet_for_the_vpc.rst @@ -21,6 +21,8 @@ Procedure 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + 4. In the navigation pane on the left, choose **Virtual Private Cloud** > **Subnets**. 5. Click **Create Subnet**. @@ -37,33 +39,37 @@ Procedure .. table:: **Table 1** Parameter descriptions - +------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Parameter | Description | Example Value | - +========================+=============================================================================================================================================================================================================================================+=======================+ - | VPC | The VPC for which you want to create a subnet. | ``-`` | - +------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Name | The subnet name. | Subnet | - | | | | - | | The name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces. | | - +------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | CIDR Block | The CIDR block for the subnet. This value must be within the VPC CIDR block. | 192.168.0.0/24 | - +------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Associated Route Table | The default route table to which the subnet will be associated. You can change the route table to a custom route table on the **Subnets** page. | Default | - +------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Gateway | The gateway address of the subnet. | 192.168.0.1 | - +------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | DNS Server Address | By default, two DNS server addresses are configured. You can change them if necessary. A maximum of five DNS server addresses can be configured. Multiple IP addresses must be separated using commas (,). | 100.125.x.x | - +------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | NTP Server Address | The IP address of the NTP server. This parameter is optional. | 192.168.2.1 | - | | | | - | | You can configure the NTP server IP addresses to be added to the subnet as required. The IP addresses are added in addition to the default NTP server addresses. If this parameter is left empty, no IP address of the NTP server is added. | | - | | | | - | | A maximum of four IP addresses can be configured. Multiple IP addresses must be separated using commas (,). | | - +------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Tag | The subnet tag, which consists of a key and value pair. You can add a maximum of 20 tags to each subnet. | - Key: subnet_key1 | - | | | - Value: subnet-01 | - | | The tag key and value must meet the requirements listed in :ref:`Table 2 `. | | - +------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + +--------------------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Parameter | Description | Example Value | + +======================================+=============================================================================================================================================================================================================================================================+=======================+ + | VPC | The VPC for which you want to create a subnet. | ``-`` | + +--------------------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Name | The subnet name. | Subnet | + | | | | + | | The name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces. | | + +--------------------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | CIDR Block | The CIDR block for the subnet. This value must be within the VPC CIDR block. | 192.168.0.0/24 | + +--------------------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Associated Route Table | The default route table to which the subnet will be associated. You can change the route table to a custom route table on the **Subnets** page. | Default | + +--------------------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Advanced Settings/Gateway | The gateway address of the subnet. | 192.168.0.1 | + +--------------------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Advanced Settings/DNS Server Address | By default, two DNS server addresses are configured. You can change them if necessary. A maximum of five DNS server addresses can be configured. Multiple IP addresses must be separated using commas (,). | 100.125.x.x | + +--------------------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Advanced Settings/NTP Server Address | The IP address of the NTP server. This parameter is optional. | 192.168.2.1 | + | | | | + | | You can configure the NTP server IP addresses to be added to the subnet as required. The IP addresses are added in addition to the default NTP server addresses. If you do not specify this parameter, no additional NTP server IP addresses will be added. | | + | | | | + | | A maximum of four IP addresses can be configured. Multiple IP addresses must be separated using commas (,). | | + +--------------------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Advanced Settings/Tag | The subnet tag, which consists of a key and value pair. You can add a maximum of 20 tags to each subnet. | - Key: subnet_key1 | + | | | - Value: subnet-01 | + | | The tag key and value must meet the requirements listed in :ref:`Table 2 `. | | + +--------------------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Advanced Settings/Description | Supplementary information about the subnet. This parameter is optional. | ``-`` | + | | | | + | | The subnet description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | + +--------------------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ .. _vpc_qs_0010__en-us_topic_0013748726_table42131827173915: @@ -107,4 +113,4 @@ When a subnet is created, there are five reserved IP addresses, which cannot be If you configured the default settings under **Advanced Settings** during subnet creation, the reserved IP addresses may be different from the default ones, but there will still be five of them. The specific addresses depend on your subnet settings. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001675254021.png diff --git a/umn/source/getting_started/configuring_a_vpc_for_ecss_that_access_the_internet_using_eips/step_3_assign_an_eip_and_bind_it_to_an_ecs.rst b/umn/source/getting_started/configuring_a_vpc_for_ecss_that_access_the_internet_using_eips/step_3_assign_an_eip_and_bind_it_to_an_ecs.rst index 25113bd..b78cd70 100644 --- a/umn/source/getting_started/configuring_a_vpc_for_ecss_that_access_the_internet_using_eips/step_3_assign_an_eip_and_bind_it_to_an_ecs.rst +++ b/umn/source/getting_started/configuring_a_vpc_for_ecss_that_access_the_internet_using_eips/step_3_assign_an_eip_and_bind_it_to_an_ecs.rst @@ -67,8 +67,6 @@ Assigning an EIP | Enterprise Project | The enterprise project that the EIP belongs to. | default | | | | | | | An enterprise project facilitates project-level management and grouping of cloud resources and users. The name of the default project is **default**. | | - | | | | - | | For details about creating and managing enterprise projects, see the *Enterprise Management User Guide*. | | +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ | Bandwidth Name | The name of the bandwidth. | bandwidth | +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ diff --git a/umn/source/getting_started/configuring_a_vpc_for_ecss_that_access_the_internet_using_eips/step_4_create_a_security_group.rst b/umn/source/getting_started/configuring_a_vpc_for_ecss_that_access_the_internet_using_eips/step_4_create_a_security_group.rst index c9d6c67..f7cd93e 100644 --- a/umn/source/getting_started/configuring_a_vpc_for_ecss_that_access_the_internet_using_eips/step_4_create_a_security_group.rst +++ b/umn/source/getting_started/configuring_a_vpc_for_ecss_that_access_the_internet_using_eips/step_4_create_a_security_group.rst @@ -8,11 +8,11 @@ Step 4: Create a Security Group Scenarios --------- -You can create security groups and add ECSs in a VPC to different security groups to improve ECS access security. We recommend that you allocate ECSs that have different Internet access requirements to different security groups. +A security group is a collection of access control rules to control the traffic that is allowed to reach and leave the cloud resources that it is associated with. The cloud resources can be cloud servers, containers, databases, and more. Cloud resources associated with the same security group have the same security requirements and are mutually trusted within a VPC. A security group consists of inbound and outbound rules. -Each ECS must be associated with at least one security group. If you have no security group when creating an ECS, the system provides a default security group. +If your instances have different Internet access requirements, you can allocate them to different security groups when creating them. -You have an option to create a new security group for the ECS. This section describes how to create a security group on the management console. +Each ECS must be associated with at least one security group. If you do not have a security group when creating an ECS, the system provides a default security group. Procedure --------- @@ -23,11 +23,17 @@ Procedure #. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + #. In the navigation pane on the left, choose **Access Control** > **Security Groups**. -#. On the **Security Groups** page, click **Create Security Group**. + The security group list is displayed. -#. In the **Create Security Group** area, set the parameters as prompted. :ref:`Table 1 ` lists the parameters to be configured. +#. In the upper right corner, click **Create Security Group**. + + The **Create Security Group** page is displayed. + +#. Configure the parameters as prompted. .. figure:: /_static/images/en-us_image_0000001197426329.png @@ -35,39 +41,43 @@ Procedure **Figure 1** Create Security Group - .. _vpc_qs_0012__en-us_topic_0013748715_table65377617111335: - .. table:: **Table 1** Parameter description - +-----------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------+ - | Parameter | Description | Example Value | - +=======================+=======================================================================================================================================================================================================================================================+============================+ - | Name | The security group name. This parameter is mandatory. | sg-318b | - | | | | - | | The security group name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces. | | - | | | | - | | .. note:: | | - | | | | - | | You can change the security group name after a security group is created. It is recommended that you give each security group a different name. | | - +-----------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------+ - | Enterprise Project | When creating a security group, you can add the security group to an enabled enterprise project. | default | - | | | | - | | An enterprise project facilitates project-level management and grouping of cloud resources and users. The name of the default project is **default**. | | - | | | | - | | For details about creating and managing enterprise projects, see the *Enterprise Management User Guide*. | | - +-----------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------+ - | Template | A template comes with default security group rules, helping you quickly create security groups. The following templates are provided: | General-purpose web server | - | | | | - | | - **Custom**: This template allows you to create security groups with custom security group rules. | | - | | - **General-purpose web server**: The security group that you create using this template is for general-purpose web servers and includes default rules that allow all inbound ICMP traffic and allow inbound traffic on ports 22, 80, 443, and 3389. | | - | | - **All ports open**: The security group that you create using this template includes default rules that allow inbound traffic on any port. Note that allowing inbound traffic on any port poses security risks. | | - +-----------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------+ - | Description | Supplementary information about the security group. This parameter is optional. | N/A | - | | | | - | | The security group description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | - +-----------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------+ + +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------+ + | Parameter | Description | Example Value | + +=======================+=======================================================================================================================================================================================================================================================================+============================+ + | Name | Mandatory | sg-AB | + | | | | + | | Enter the security group name. | | + | | | | + | | The security group name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces. | | + | | | | + | | .. note:: | | + | | | | + | | You can change the security group name after a security group is created. It is recommended that you give each security group a different name. | | + +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------+ + | Enterprise Project | Mandatory | default | + | | | | + | | When creating a security group, you can add the security group to an enabled enterprise project. | | + | | | | + | | An enterprise project facilitates project-level management and grouping of cloud resources and users. The name of the default project is **default**. | | + +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------+ + | Template | Mandatory | General-purpose web server | + | | | | + | | A template comes with default security group rules, helping you quickly create security groups. The following templates are provided: | | + | | | | + | | - **Custom**: This template allows you to create security groups with custom security group rules. | | + | | - **General-purpose web server** (default value): The security group that you create using this template is for general-purpose web servers and includes default rules that allow all inbound ICMP traffic and allow inbound traffic on ports 22, 80, 443, and 3389. | | + | | - **All ports open**: The security group that you create using this template includes default rules that allow inbound traffic on any port. Note that allowing inbound traffic on any port poses security risks. | | + +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------+ + | Description | Optional | N/A | + | | | | + | | Supplementary information about the security group. This parameter is optional. | | + | | | | + | | The security group description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | + +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------+ -#. Click **OK**. +#. Confirm the inbound and outbound rules of the template and click **OK**. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001627054062.png diff --git a/umn/source/getting_started/configuring_a_vpc_for_ecss_that_access_the_internet_using_eips/step_5_add_a_security_group_rule.rst b/umn/source/getting_started/configuring_a_vpc_for_ecss_that_access_the_internet_using_eips/step_5_add_a_security_group_rule.rst index a27fa52..b984ecf 100644 --- a/umn/source/getting_started/configuring_a_vpc_for_ecss_that_access_the_internet_using_eips/step_5_add_a_security_group_rule.rst +++ b/umn/source/getting_started/configuring_a_vpc_for_ecss_that_access_the_internet_using_eips/step_5_add_a_security_group_rule.rst @@ -8,14 +8,27 @@ Step 5: Add a Security Group Rule Scenarios --------- -A security group is a collection of access control rules for cloud resources, such as cloud servers, containers, and databases, to control inbound and outbound traffic. Cloud resources associated with the same security group have the same security requirements and are mutually trusted within a VPC. +A security group is a collection of access control rules to control the traffic that is allowed to reach and leave the cloud resources that it is associated with. The cloud resources can be cloud servers, containers, databases, and more. Cloud resources associated with the same security group have the same security requirements and are mutually trusted within a VPC. A security group consists of inbound and outbound rules. -If the rules of the security group associated with your instance cannot meet your requirements, for example, you need to allow inbound traffic on a specified TCP port, you can add an inbound rule. +Each ECS must be associated with at least one security group. If you do not have a security group when creating an ECS, the system provides a default security group. -- Inbound rules control incoming traffic to cloud resources in the security group. -- Outbound rules control outgoing traffic from cloud resources in the security group. +Like whitelists, security group rules work as follows: -For details about the default security group rules, see :ref:`Default Security Groups and Security Group Rules `. For details about security group rule configuration examples, see :ref:`Security Group Configuration Examples `. +- Inbound rules control incoming traffic to instances in the security group. + + If an inbound request matches the source in an inbound security group rule, the request is allowed and other requests are denied. + + By default, you do not need to configure deny rules in the inbound direction because requests that do not match allow rules will be denied. + +- Outbound rules control outgoing traffic from instances in the security group. + + If the destination of an outbound security group rule is 0.0.0.0/0, all outbound requests are allowed. + + 0.0.0.0/0 represents all IPv4 addresses. + + ::/0 represents all IPv6 addresses. + +If the rules of the security group associated with your instance cannot meet your requirements, for example, you need to allow inbound traffic on a specific TCP port, you can add an inbound rule to allow traffic on the TCP port. Procedure --------- @@ -26,11 +39,21 @@ Procedure #. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + #. In the navigation pane on the left, choose **Access Control** > **Security Groups**. -#. On the **Security Groups** page, locate the target security group and click **Manage Rule** in the **Operation** column to switch to the page for managing inbound and outbound rules. + The security group list is displayed. -#. On the **Inbound Rules** tab, click **Add Rule**. In the displayed dialog box, set required parameters to add an inbound rule. +#. Locate the row that contains the target security group, and click **Manage Rule** in the **Operation** column. + + The page for configuring security group rules is displayed. + +#. On the **Inbound Rules** tab, click **Add Rule**. + + The **Add Inbound Rule** dialog box is displayed. + +#. Configure required parameters. You can click **+** to add more inbound rules. @@ -45,11 +68,16 @@ Procedure +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ | Parameter | Description | Example Value | +=======================+==========================================================================================================================================================================+=======================+ - | Protocol & Port | **Protocol**: The network protocol. Currently, the value can be **All**, **TCP**, **UDP**, **ICMP**, **GRE**, or others. | TCP | + | Protocol & Port | The network protocol used to match traffic in a security group rule. | TCP | + | | | | + | | Currently, the value can be **All**, **TCP**, **UDP**, **GRE**, **ICMP**, or more. | | +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | | **Port**: The port or port range over which the traffic can reach your ECS. The value ranges from 1 to 65535. | 22, or 22-30 | + | | **Port**: The port or port range over which traffic can reach your ECS. The value can be from 1 to 65535. | 22, or 22-30 | +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Type | IPv4 | IPv4 | + | Type | Source IP address version. You can select: | IPv4 | + | | | | + | | - IPv4 | | + | | - IPv6 | | +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ | Source | Source of the security group rule. The value can be an IP address or a security group to allow access from IP addresses or instances in the security group. For example: | 0.0.0.0/0 | | | | | @@ -68,7 +96,15 @@ Procedure | | The security group rule description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ -#. On the **Outbound Rules** tab, click **Add Rule**. In the displayed dialog box, set required parameters to add an outbound rule. +#. Click **OK**. + + The inbound rule list is displayed. + +#. On the **Outbound Rules** tab, click **Add Rule**. + + The **Add Outbound Rule** dialog box is displayed. + +#. Configure required parameters. You can click **+** to add more outbound rules. @@ -83,11 +119,16 @@ Procedure +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ | Parameter | Description | Example Value | +=======================+=============================================================================================================================================================================+=======================+ - | Protocol & Port | **Protocol**: The network protocol. Currently, the value can be **All**, **TCP**, **UDP**, **ICMP**, **GRE**, or others. | TCP | + | Protocol & Port | The network protocol used to match traffic in a security group rule. | TCP | + | | | | + | | Currently, the value can be **All**, **TCP**, **UDP**, **GRE**, **ICMP**, or more. | | +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | | **Port**: The port or port range over which the traffic can leave your ECS. The value ranges from 1 to 65535. | 22, or 22-30 | + | | **Port**: The port or port range over which traffic can leave your ECS. The value can be from 1 to 65535. | 22, or 22-30 | +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Type | IPv4 | IPv4 | + | Type | Source IP address version. You can select: | IPv4 | + | | | | + | | - IPv4 | | + | | - IPv6 | | +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ | Destination | Destination of the security group rule. The value can be an IP address or a security group to allow access to IP addresses or instances in the security group. For example: | 0.0.0.0/0 | | | | | @@ -106,5 +147,7 @@ Procedure #. Click **OK**. + The outbound rule list is displayed. + .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001626734166.png diff --git a/umn/source/getting_started/configuring_a_vpc_for_ecss_that_do_not_require_internet_access/overview.rst b/umn/source/getting_started/configuring_a_vpc_for_ecss_that_do_not_require_internet_access/overview.rst index 1a336aa..8bd2e53 100644 --- a/umn/source/getting_started/configuring_a_vpc_for_ecss_that_do_not_require_internet_access/overview.rst +++ b/umn/source/getting_started/configuring_a_vpc_for_ecss_that_do_not_require_internet_access/overview.rst @@ -20,26 +20,26 @@ If your ECSs do not require Internet access or need to access the Internet using .. table:: **Table 1** Configuration process description - +------------------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ - | Task | Description | - +====================================+=================================================================================================================================================================================+ - | Create a VPC. | This task is mandatory. | - | | | - | | After the VPC is created, you can create other required network resources in the VPC based on your service requirements. | - +------------------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ - | Create another subnet for the VPC. | This task is optional. | - | | | - | | If the default subnet cannot meet your requirements, you can create one. | - | | | - | | The new subnet is used to assign IP addresses to NICs added to the ECS. | - +------------------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ - | Create a security group. | This task is mandatory. | - | | | - | | You can create a security group and add ECSs in the VPC to the security group to improve ECS access security. | - | | | - | | After a security group is created, it has a default rule, which allows all outgoing data packets. ECSs in a security group can access each other without the need to add rules. | - +------------------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ - | Add a security group rule. | This task is optional. | - | | | - | | If the default rule meets your service requirements, you do not need to add rules to the security group. | - +------------------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ + +------------------------------------+--------------------------------------------------------------------------------------------------------------------------+ + | Task | Description | + +====================================+==========================================================================================================================+ + | Create a VPC. | This task is mandatory. | + | | | + | | After the VPC is created, you can create other required network resources in the VPC based on your service requirements. | + +------------------------------------+--------------------------------------------------------------------------------------------------------------------------+ + | Create another subnet for the VPC. | This task is optional. | + | | | + | | If the default subnet cannot meet your requirements, you can create one. | + | | | + | | The new subnet is used to assign IP addresses to NICs added to the ECS. | + +------------------------------------+--------------------------------------------------------------------------------------------------------------------------+ + | Create a security group. | This task is mandatory. | + | | | + | | You can create a security group and add ECSs in the VPC to the security group to improve ECS access security. | + | | | + | | After a security group is created, it has default rules. | + +------------------------------------+--------------------------------------------------------------------------------------------------------------------------+ + | Add a security group rule. | This task is optional. | + | | | + | | If the default rule meets your service requirements, you do not need to add rules to the security group. | + +------------------------------------+--------------------------------------------------------------------------------------------------------------------------+ diff --git a/umn/source/getting_started/configuring_a_vpc_for_ecss_that_do_not_require_internet_access/step_1_create_a_vpc.rst b/umn/source/getting_started/configuring_a_vpc_for_ecss_that_do_not_require_internet_access/step_1_create_a_vpc.rst index 159554b..c0f7f98 100644 --- a/umn/source/getting_started/configuring_a_vpc_for_ecss_that_do_not_require_internet_access/step_1_create_a_vpc.rst +++ b/umn/source/getting_started/configuring_a_vpc_for_ecss_that_do_not_require_internet_access/step_1_create_a_vpc.rst @@ -21,6 +21,8 @@ Procedure #. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + #. Click **Create VPC**. #. On the **Create VPC** page, set parameters as prompted. @@ -29,91 +31,89 @@ Procedure .. table:: **Table 1** VPC parameter descriptions - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Category | Parameter | Description | Example Value | - +=====================================+========================+=========================================================================================================================================================================================================================================================================================================+=====================+ - | Basic Information | Region | Regions are geographic areas that are physically isolated from each other. The networks inside different regions are not connected to each other, so resources cannot be shared across different regions. For lower network latency and faster access to your resources, select the region nearest you. | eu-de | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Basic Information | Name | The VPC name. | VPC-001 | - | | | | | - | | | The name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces. | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Basic Information | CIDR Block | The CIDR block of the VPC. The CIDR block of a subnet can be the same as the CIDR block for the VPC (for a single subnet in the VPC) or a subset of the CIDR block for the VPC (for multiple subnets in the VPC). | 192.168.0.0/16 | - | | | | | - | | | The following CIDR blocks are supported: | | - | | | | | - | | | 10.0.0.0/8-24 | | - | | | | | - | | | 172.16.0.0/12-24 | | - | | | | | - | | | 192.168.0.0/16-24 | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Basic Information | Enterprise Project | The enterprise project to which the VPC belongs. | default | - | | | | | - | | | An enterprise project facilitates project-level management and grouping of cloud resources and users. The name of the default project is **default**. | | - | | | | | - | | | For details about creating and managing enterprise projects, see the *Enterprise Management User Guide*. | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Basic Information/Advanced Settings | Tag | The VPC tag, which consists of a key and value pair. You can add a maximum of 20 tags to each VPC. | - Key: vpc_key1 | - | | | | - Value: vpc-01 | - | | | The tag key and value must meet the requirements listed in :ref:`Table 2 `. | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Basic Information/Advanced Settings | Description | Supplementary information about the VPC. This parameter is optional. | N/A | - | | | | | - | | | The VPC description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Default Subnet | Name | The subnet name. | Subnet | - | | | | | - | | | The name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces. | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Default Subnet | CIDR Block | The CIDR block for the subnet. This value must be within the VPC CIDR block. | 192.168.0.0/24 | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Default Subnet | Associated Route Table | The default route table to which the subnet will be associated. You can change the route table to a custom route table on the **Subnets** page. | Default | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Default Subnet/Advanced Settings | Gateway | The gateway address of the subnet. | 192.168.0.1 | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Default Subnet/Advanced Settings | DNS Server Address | By default, two DNS server addresses are configured. You can change them as required. A maximum of five DNS server addresses can be configured. Multiple IP addresses must be separated using commas (,). | 100.125.x.x | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Default Subnet/Advanced Settings | NTP Server Address | The IP address of the NTP server. This parameter is optional. | 192.168.2.1 | - | | | | | - | | | You can configure the NTP server IP addresses to be added to the subnet as required. The IP addresses are added in addition to the default NTP server addresses. If this parameter is left empty, no IP address of the NTP server is added. | | - | | | | | - | | | A maximum of four IP addresses can be configured. Multiple IP addresses must be separated using commas (,). | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Default Subnet/Advanced Settings | Tag | The subnet tag, which consists of a key and value pair. You can add a maximum of 20 tags to each subnet. | - Key: subnet_key1 | - | | | | - Value: subnet-01 | - | | | The tag key and value must meet the requirements listed in :ref:`Table 3 `. | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Default Subnet/Advanced Settings | Description | Supplementary information about the subnet. This parameter is optional. | N/A | - | | | | | - | | | The subnet description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Category | Parameter | Description | Example Value | + +=====================================+========================+=============================================================================================================================================================================================================================================================+=====================+ + | Basic Information | Region | Select the region nearest to you to ensure the lowest latency possible. | eu-de | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Basic Information | Name | The VPC name. | VPC-001 | + | | | | | + | | | The name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces. | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Basic Information | IPv4 CIDR Block | The CIDR block of the VPC. The CIDR block of a subnet can be the same as the CIDR block for the VPC (for a single subnet in the VPC) or a subset of the CIDR block for the VPC (for multiple subnets in the VPC). | 192.168.0.0/16 | + | | | | | + | | | The following CIDR blocks are supported: | | + | | | | | + | | | 10.0.0.0/8-24 | | + | | | | | + | | | 172.16.0.0/12-24 | | + | | | | | + | | | 192.168.0.0/16-24 | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Basic Information | Enterprise Project | The enterprise project to which the VPC belongs. | default | + | | | | | + | | | An enterprise project facilitates project-level management and grouping of cloud resources and users. The name of the default project is **default**. | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Basic Information/Advanced Settings | Tag | The VPC tag, which consists of a key and value pair. You can add a maximum of 20 tags to each VPC. | - Key: vpc_key1 | + | | | | - Value: vpc-01 | + | | | The tag key and value must meet the requirements listed in :ref:`Table 2 `. | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Basic Information/Advanced Settings | Description | Supplementary information about the VPC. This parameter is optional. | N/A | + | | | | | + | | | The VPC description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Default Subnet | Name | The subnet name. | Subnet | + | | | | | + | | | The name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces. | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Default Subnet | CIDR Block | The CIDR block for the subnet. This value must be within the VPC CIDR block. | 192.168.0.0/24 | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Default Subnet | Associated Route Table | The default route table to which the subnet will be associated. You can change the route table to a custom route table on the **Subnets** page. | Default | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Default Subnet/Advanced Settings | Gateway | The gateway address of the subnet. | 192.168.0.1 | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Default Subnet/Advanced Settings | DNS Server Address | By default, two DNS server addresses are configured. You can change them as required. A maximum of five DNS server addresses can be configured. Multiple IP addresses must be separated using commas (,). | 100.125.x.x | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Default Subnet/Advanced Settings | NTP Server Address | The IP address of the NTP server. This parameter is optional. | 192.168.2.1 | + | | | | | + | | | You can configure the NTP server IP addresses to be added to the subnet as required. The IP addresses are added in addition to the default NTP server addresses. If you do not specify this parameter, no additional NTP server IP addresses will be added. | | + | | | | | + | | | A maximum of four IP addresses can be configured. Multiple IP addresses must be separated using commas (,). | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Default Subnet/Advanced Settings | Tag | The subnet tag, which consists of a key and value pair. You can add a maximum of 20 tags to each subnet. | - Key: subnet_key1 | + | | | | - Value: subnet-01 | + | | | The tag key and value must meet the requirements listed in :ref:`Table 3 `. | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Default Subnet/Advanced Settings | Description | Supplementary information about the subnet. This parameter is optional. | N/A | + | | | | | + | | | The subnet description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ .. _vpc_qs_0005__en-us_topic_0013935842_table248245914136: .. table:: **Table 2** VPC tag key and value requirements - +-----------------------+----------------------------------------------------------------------------+-----------------------+ - | Parameter | Requirements | Example Value | - +=======================+============================================================================+=======================+ - | Key | - Cannot be left blank. | vpc_key1 | - | | - Must be unique for the same VPC and can be the same for different VPCs. | | - | | - Can contain a maximum of 36 characters. | | - | | - Can contain only the following character types: | | - | | | | - | | - Uppercase letters | | - | | - Lowercase letters | | - | | - Digits | | - | | - Special characters, including hyphens (-) and underscores (_) | | - +-----------------------+----------------------------------------------------------------------------+-----------------------+ - | Value | - Can contain a maximum of 43 characters. | vpc-01 | - | | - Can contain only the following character types: | | - | | | | - | | - Uppercase letters | | - | | - Lowercase letters | | - | | - Digits | | - | | - Special characters, including hyphens (-) and underscores (_) | | - +-----------------------+----------------------------------------------------------------------------+-----------------------+ + +-----------------------+------------------------------------------------------------------------+-----------------------+ + | Parameter | Requirements | Example Value | + +=======================+========================================================================+=======================+ + | Key | - Cannot be left blank. | vpc_key1 | + | | - Must be unique for each VPC and can be the same for different VPCs. | | + | | - Can contain a maximum of 36 characters. | | + | | - Can contain only the following character types: | | + | | | | + | | - Uppercase letters | | + | | - Lowercase letters | | + | | - Digits | | + | | - Special characters, including hyphens (-) and underscores (_) | | + +-----------------------+------------------------------------------------------------------------+-----------------------+ + | Value | - Can contain a maximum of 43 characters. | vpc-01 | + | | - Can contain only the following character types: | | + | | | | + | | - Uppercase letters | | + | | - Lowercase letters | | + | | - Digits | | + | | - Special characters, including hyphens (-) and underscores (_) | | + +-----------------------+------------------------------------------------------------------------+-----------------------+ .. _vpc_qs_0005__en-us_topic_0013935842_table6536185812515: diff --git a/umn/source/getting_started/configuring_a_vpc_for_ecss_that_do_not_require_internet_access/step_2_create_a_subnet_for_the_vpc.rst b/umn/source/getting_started/configuring_a_vpc_for_ecss_that_do_not_require_internet_access/step_2_create_a_subnet_for_the_vpc.rst index 3350c1b..686be34 100644 --- a/umn/source/getting_started/configuring_a_vpc_for_ecss_that_do_not_require_internet_access/step_2_create_a_subnet_for_the_vpc.rst +++ b/umn/source/getting_started/configuring_a_vpc_for_ecss_that_do_not_require_internet_access/step_2_create_a_subnet_for_the_vpc.rst @@ -21,6 +21,8 @@ Procedure 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + 4. In the navigation pane on the left, choose **Virtual Private Cloud** > **Subnets**. 5. Click **Create Subnet**. @@ -37,33 +39,37 @@ Procedure .. table:: **Table 1** Parameter descriptions - +------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Parameter | Description | Example Value | - +========================+=============================================================================================================================================================================================================================================+=======================+ - | VPC | The VPC for which you want to create a subnet. | ``-`` | - +------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Name | The subnet name. | Subnet | - | | | | - | | The name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces. | | - +------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | CIDR Block | The CIDR block for the subnet. This value must be within the VPC CIDR block. | 192.168.0.0/24 | - +------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Associated Route Table | The default route table to which the subnet will be associated. You can change the route table to a custom route table on the **Subnets** page. | Default | - +------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Gateway | The gateway address of the subnet. | 192.168.0.1 | - +------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | DNS Server Address | By default, two DNS server addresses are configured. You can change them if necessary. A maximum of five DNS server addresses can be configured. Multiple IP addresses must be separated using commas (,). | 100.125.x.x | - +------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | NTP Server Address | The IP address of the NTP server. This parameter is optional. | 192.168.2.1 | - | | | | - | | You can configure the NTP server IP addresses to be added to the subnet as required. The IP addresses are added in addition to the default NTP server addresses. If this parameter is left empty, no IP address of the NTP server is added. | | - | | | | - | | A maximum of four IP addresses can be configured. Multiple IP addresses must be separated using commas (,). | | - +------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Tag | The subnet tag, which consists of a key and value pair. You can add a maximum of 20 tags to each subnet. | - Key: subnet_key1 | - | | | - Value: subnet-01 | - | | The tag key and value must meet the requirements listed in :ref:`Table 2 `. | | - +------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + +--------------------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Parameter | Description | Example Value | + +======================================+=============================================================================================================================================================================================================================================================+=======================+ + | VPC | The VPC for which you want to create a subnet. | ``-`` | + +--------------------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Name | The subnet name. | Subnet | + | | | | + | | The name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces. | | + +--------------------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | CIDR Block | The CIDR block for the subnet. This value must be within the VPC CIDR block. | 192.168.0.0/24 | + +--------------------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Associated Route Table | The default route table to which the subnet will be associated. You can change the route table to a custom route table on the **Subnets** page. | Default | + +--------------------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Advanced Settings/Gateway | The gateway address of the subnet. | 192.168.0.1 | + +--------------------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Advanced Settings/DNS Server Address | By default, two DNS server addresses are configured. You can change them if necessary. A maximum of five DNS server addresses can be configured. Multiple IP addresses must be separated using commas (,). | 100.125.x.x | + +--------------------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Advanced Settings/NTP Server Address | The IP address of the NTP server. This parameter is optional. | 192.168.2.1 | + | | | | + | | You can configure the NTP server IP addresses to be added to the subnet as required. The IP addresses are added in addition to the default NTP server addresses. If you do not specify this parameter, no additional NTP server IP addresses will be added. | | + | | | | + | | A maximum of four IP addresses can be configured. Multiple IP addresses must be separated using commas (,). | | + +--------------------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Advanced Settings/Tag | The subnet tag, which consists of a key and value pair. You can add a maximum of 20 tags to each subnet. | - Key: subnet_key1 | + | | | - Value: subnet-01 | + | | The tag key and value must meet the requirements listed in :ref:`Table 2 `. | | + +--------------------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Advanced Settings/Description | Supplementary information about the subnet. This parameter is optional. | ``-`` | + | | | | + | | The subnet description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | + +--------------------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ .. _vpc_qs_0006__en-us_topic_0013748726_table42131827173915: @@ -107,4 +113,4 @@ When a subnet is created, there are five reserved IP addresses, which cannot be If you configured the default settings under **Advanced Settings** during subnet creation, the reserved IP addresses may be different from the default ones, but there will still be five of them. The specific addresses depend on your subnet settings. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001675254021.png diff --git a/umn/source/getting_started/configuring_a_vpc_for_ecss_that_do_not_require_internet_access/step_3_create_a_security_group.rst b/umn/source/getting_started/configuring_a_vpc_for_ecss_that_do_not_require_internet_access/step_3_create_a_security_group.rst index 06740e7..325e7c6 100644 --- a/umn/source/getting_started/configuring_a_vpc_for_ecss_that_do_not_require_internet_access/step_3_create_a_security_group.rst +++ b/umn/source/getting_started/configuring_a_vpc_for_ecss_that_do_not_require_internet_access/step_3_create_a_security_group.rst @@ -8,11 +8,11 @@ Step 3: Create a Security Group Scenarios --------- -You can create security groups and add ECSs in a VPC to different security groups to improve ECS access security. We recommend that you allocate ECSs that have different Internet access requirements to different security groups. +A security group is a collection of access control rules to control the traffic that is allowed to reach and leave the cloud resources that it is associated with. The cloud resources can be cloud servers, containers, databases, and more. Cloud resources associated with the same security group have the same security requirements and are mutually trusted within a VPC. A security group consists of inbound and outbound rules. -Each ECS must be associated with at least one security group. If you have no security group when creating an ECS, the system provides a default security group. +If your instances have different Internet access requirements, you can allocate them to different security groups when creating them. -You have an option to create a new security group for the ECS. This section describes how to create a security group on the management console. +Each ECS must be associated with at least one security group. If you do not have a security group when creating an ECS, the system provides a default security group. Procedure --------- @@ -23,11 +23,17 @@ Procedure #. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + #. In the navigation pane on the left, choose **Access Control** > **Security Groups**. -#. On the **Security Groups** page, click **Create Security Group**. + The security group list is displayed. -#. In the **Create Security Group** area, set the parameters as prompted. :ref:`Table 1 ` lists the parameters to be configured. +#. In the upper right corner, click **Create Security Group**. + + The **Create Security Group** page is displayed. + +#. Configure the parameters as prompted. .. figure:: /_static/images/en-us_image_0000001197426329.png @@ -35,39 +41,43 @@ Procedure **Figure 1** Create Security Group - .. _vpc_qs_0007__en-us_topic_0013748715_table65377617111335: - .. table:: **Table 1** Parameter description - +-----------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------+ - | Parameter | Description | Example Value | - +=======================+=======================================================================================================================================================================================================================================================+============================+ - | Name | The security group name. This parameter is mandatory. | sg-318b | - | | | | - | | The security group name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces. | | - | | | | - | | .. note:: | | - | | | | - | | You can change the security group name after a security group is created. It is recommended that you give each security group a different name. | | - +-----------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------+ - | Enterprise Project | When creating a security group, you can add the security group to an enabled enterprise project. | default | - | | | | - | | An enterprise project facilitates project-level management and grouping of cloud resources and users. The name of the default project is **default**. | | - | | | | - | | For details about creating and managing enterprise projects, see the *Enterprise Management User Guide*. | | - +-----------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------+ - | Template | A template comes with default security group rules, helping you quickly create security groups. The following templates are provided: | General-purpose web server | - | | | | - | | - **Custom**: This template allows you to create security groups with custom security group rules. | | - | | - **General-purpose web server**: The security group that you create using this template is for general-purpose web servers and includes default rules that allow all inbound ICMP traffic and allow inbound traffic on ports 22, 80, 443, and 3389. | | - | | - **All ports open**: The security group that you create using this template includes default rules that allow inbound traffic on any port. Note that allowing inbound traffic on any port poses security risks. | | - +-----------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------+ - | Description | Supplementary information about the security group. This parameter is optional. | N/A | - | | | | - | | The security group description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | - +-----------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------+ + +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------+ + | Parameter | Description | Example Value | + +=======================+=======================================================================================================================================================================================================================================================================+============================+ + | Name | Mandatory | sg-AB | + | | | | + | | Enter the security group name. | | + | | | | + | | The security group name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces. | | + | | | | + | | .. note:: | | + | | | | + | | You can change the security group name after a security group is created. It is recommended that you give each security group a different name. | | + +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------+ + | Enterprise Project | Mandatory | default | + | | | | + | | When creating a security group, you can add the security group to an enabled enterprise project. | | + | | | | + | | An enterprise project facilitates project-level management and grouping of cloud resources and users. The name of the default project is **default**. | | + +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------+ + | Template | Mandatory | General-purpose web server | + | | | | + | | A template comes with default security group rules, helping you quickly create security groups. The following templates are provided: | | + | | | | + | | - **Custom**: This template allows you to create security groups with custom security group rules. | | + | | - **General-purpose web server** (default value): The security group that you create using this template is for general-purpose web servers and includes default rules that allow all inbound ICMP traffic and allow inbound traffic on ports 22, 80, 443, and 3389. | | + | | - **All ports open**: The security group that you create using this template includes default rules that allow inbound traffic on any port. Note that allowing inbound traffic on any port poses security risks. | | + +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------+ + | Description | Optional | N/A | + | | | | + | | Supplementary information about the security group. This parameter is optional. | | + | | | | + | | The security group description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | + +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------+ -#. Click **OK**. +#. Confirm the inbound and outbound rules of the template and click **OK**. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001627054062.png diff --git a/umn/source/getting_started/configuring_a_vpc_for_ecss_that_do_not_require_internet_access/step_4_add_a_security_group_rule.rst b/umn/source/getting_started/configuring_a_vpc_for_ecss_that_do_not_require_internet_access/step_4_add_a_security_group_rule.rst index 63f0ed4..2b023a7 100644 --- a/umn/source/getting_started/configuring_a_vpc_for_ecss_that_do_not_require_internet_access/step_4_add_a_security_group_rule.rst +++ b/umn/source/getting_started/configuring_a_vpc_for_ecss_that_do_not_require_internet_access/step_4_add_a_security_group_rule.rst @@ -8,14 +8,27 @@ Step 4: Add a Security Group Rule Scenarios --------- -A security group is a collection of access control rules for cloud resources, such as cloud servers, containers, and databases, to control inbound and outbound traffic. Cloud resources associated with the same security group have the same security requirements and are mutually trusted within a VPC. +A security group is a collection of access control rules to control the traffic that is allowed to reach and leave the cloud resources that it is associated with. The cloud resources can be cloud servers, containers, databases, and more. Cloud resources associated with the same security group have the same security requirements and are mutually trusted within a VPC. A security group consists of inbound and outbound rules. -If the rules of the security group associated with your instance cannot meet your requirements, for example, you need to allow inbound traffic on a specified TCP port, you can add an inbound rule. +Each ECS must be associated with at least one security group. If you do not have a security group when creating an ECS, the system provides a default security group. -- Inbound rules control incoming traffic to cloud resources in the security group. -- Outbound rules control outgoing traffic from cloud resources in the security group. +Like whitelists, security group rules work as follows: -For details about the default security group rules, see :ref:`Default Security Groups and Security Group Rules `. For details about security group rule configuration examples, see :ref:`Security Group Configuration Examples `. +- Inbound rules control incoming traffic to instances in the security group. + + If an inbound request matches the source in an inbound security group rule, the request is allowed and other requests are denied. + + By default, you do not need to configure deny rules in the inbound direction because requests that do not match allow rules will be denied. + +- Outbound rules control outgoing traffic from instances in the security group. + + If the destination of an outbound security group rule is 0.0.0.0/0, all outbound requests are allowed. + + 0.0.0.0/0 represents all IPv4 addresses. + + ::/0 represents all IPv6 addresses. + +If the rules of the security group associated with your instance cannot meet your requirements, for example, you need to allow inbound traffic on a specific TCP port, you can add an inbound rule to allow traffic on the TCP port. Procedure --------- @@ -26,11 +39,21 @@ Procedure #. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + #. In the navigation pane on the left, choose **Access Control** > **Security Groups**. -#. On the **Security Groups** page, locate the target security group and click **Manage Rule** in the **Operation** column to switch to the page for managing inbound and outbound rules. + The security group list is displayed. -#. On the **Inbound Rules** tab, click **Add Rule**. In the displayed dialog box, set required parameters to add an inbound rule. +#. Locate the row that contains the target security group, and click **Manage Rule** in the **Operation** column. + + The page for configuring security group rules is displayed. + +#. On the **Inbound Rules** tab, click **Add Rule**. + + The **Add Inbound Rule** dialog box is displayed. + +#. Configure required parameters. You can click **+** to add more inbound rules. @@ -45,11 +68,16 @@ Procedure +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ | Parameter | Description | Example Value | +=======================+==========================================================================================================================================================================+=======================+ - | Protocol & Port | **Protocol**: The network protocol. Currently, the value can be **All**, **TCP**, **UDP**, **ICMP**, **GRE**, or others. | TCP | + | Protocol & Port | The network protocol used to match traffic in a security group rule. | TCP | + | | | | + | | Currently, the value can be **All**, **TCP**, **UDP**, **GRE**, **ICMP**, or more. | | +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | | **Port**: The port or port range over which the traffic can reach your ECS. The value ranges from 1 to 65535. | 22, or 22-30 | + | | **Port**: The port or port range over which traffic can reach your ECS. The value can be from 1 to 65535. | 22, or 22-30 | +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Type | IPv4 | IPv4 | + | Type | Source IP address version. You can select: | IPv4 | + | | | | + | | - IPv4 | | + | | - IPv6 | | +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ | Source | Source of the security group rule. The value can be an IP address or a security group to allow access from IP addresses or instances in the security group. For example: | 0.0.0.0/0 | | | | | @@ -68,7 +96,15 @@ Procedure | | The security group rule description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ -#. On the **Outbound Rules** tab, click **Add Rule**. In the displayed dialog box, set required parameters to add an outbound rule. +#. Click **OK**. + + The inbound rule list is displayed. + +#. On the **Outbound Rules** tab, click **Add Rule**. + + The **Add Outbound Rule** dialog box is displayed. + +#. Configure required parameters. You can click **+** to add more outbound rules. @@ -83,11 +119,16 @@ Procedure +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ | Parameter | Description | Example Value | +=======================+=============================================================================================================================================================================+=======================+ - | Protocol & Port | **Protocol**: The network protocol. Currently, the value can be **All**, **TCP**, **UDP**, **ICMP**, **GRE**, or others. | TCP | + | Protocol & Port | The network protocol used to match traffic in a security group rule. | TCP | + | | | | + | | Currently, the value can be **All**, **TCP**, **UDP**, **GRE**, **ICMP**, or more. | | +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | | **Port**: The port or port range over which the traffic can leave your ECS. The value ranges from 1 to 65535. | 22, or 22-30 | + | | **Port**: The port or port range over which traffic can leave your ECS. The value can be from 1 to 65535. | 22, or 22-30 | +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Type | IPv4 | IPv4 | + | Type | Source IP address version. You can select: | IPv4 | + | | | | + | | - IPv4 | | + | | - IPv6 | | +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ | Destination | Destination of the security group rule. The value can be an IP address or a security group to allow access to IP addresses or instances in the security group. For example: | 0.0.0.0/0 | | | | | @@ -106,5 +147,7 @@ Procedure #. Click **OK**. + The outbound rule list is displayed. + .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001626734166.png diff --git a/umn/source/getting_started/typical_application_scenarios.rst b/umn/source/getting_started/typical_application_scenarios.rst index c56e2e0..ffa4f8a 100644 --- a/umn/source/getting_started/typical_application_scenarios.rst +++ b/umn/source/getting_started/typical_application_scenarios.rst @@ -9,5 +9,4 @@ A VPC provides an isolated virtual network for ECSs. You can configure and manag - If any of your ECSs, for example, ECSs that function as the database of server nodes for website deployment, do not need to access the Internet or need to access the Internet specific IP addresses on the default network with limited bandwidth, you can configure a VPC for the ECSs by following the instructions described in :ref:`Configuring a VPC for ECSs That Do Not Require Internet Access `. - If your ECSs need to access the Internet, you can configure EIPs for them. For example, the ECSs functioning as the service nodes for deploying a website need to be accessed by users over the Internet. Then, you can configure a VPC for these ECSs by following the instructions provided in :ref:`Configuring a VPC for ECSs That Access the Internet Using EIPs `. -- If your ECSs need to access the Internet, you can configure EIPs for them. For example, the ECSs functioning as the service nodes for deploying a website need to be accessed by users over the Internet. For details, see :ref:`Configuring a VPC for ECSs That Access the Internet Using EIPs `. - When you need to access the IPv6 services on the Internet or provide services accessible from users using an IPv6 client, you need to enable the IPv6 function. After the IPv6 function is enabled, you can provide services for users using an IPv4 or IPv6 client. diff --git a/umn/source/index.rst b/umn/source/index.rst index 25cf7f3..0d67998 100644 --- a/umn/source/index.rst +++ b/umn/source/index.rst @@ -8,7 +8,7 @@ Virtual Private Cloud - User Guide service_overview/index getting_started/index vpc_and_subnet/index - security/index + access_control/index elastic_ip/index shared_bandwidth/index route_tables/index diff --git a/umn/source/monitoring/creating_an_alarm_rule.rst b/umn/source/monitoring/creating_an_alarm_rule.rst index 73c022e..5c86995 100644 --- a/umn/source/monitoring/creating_an_alarm_rule.rst +++ b/umn/source/monitoring/creating_an_alarm_rule.rst @@ -17,7 +17,7 @@ Procedure 2. Click |image1| in the upper left corner and select the desired region and project. -3. Hover on the upper left corner to display **Service List** and choose **Management & Deployment** > **Cloud Eye**. +3. In the upper left corner of the page, click |image2| to open the service list and choose **Management & Deployment** > **Cloud Eye**. 4. In the left navigation pane on the left, choose **Alarm Management** > **Alarm Rules**. @@ -32,3 +32,4 @@ Procedure For more information about alarm rules, see the *Cloud Eye User Guide*. .. |image1| image:: /_static/images/en-us_image_0141273034.png +.. |image2| image:: /_static/images/en-us_image_0000001675258889.png diff --git a/umn/source/monitoring/viewing_metrics.rst b/umn/source/monitoring/viewing_metrics.rst index 2e014aa..e99b41c 100644 --- a/umn/source/monitoring/viewing_metrics.rst +++ b/umn/source/monitoring/viewing_metrics.rst @@ -8,19 +8,31 @@ Viewing Metrics Scenarios --------- -View related metrics to see bandwidth and EIP usage information. +You can view the bandwidth and EIP usage on the **Elastic IP and Bandwidth** or **Cloud Eye** console. You can view the inbound bandwidth, outbound bandwidth, inbound bandwidth usage, outbound bandwidth usage, inbound traffic, and outbound traffic in a specified period. -Procedure ---------- +Procedure (**Elastic IP and Bandwidth** Console) +------------------------------------------------ + +#. Log in to the management console. +#. Click |image1| in the upper left corner and select the desired region and project. +#. Click |image2| in the upper left corner and choose **Network** > **Elastic IP**. +#. On the **EIPs** page, search for the EIP, click **More** in the **Operation** column, and click **View Metric** to view the monitoring metric details. +#. In the navigation pane on the left, choose **Elastic IP and Bandwidth** > **Shared Bandwidths**. +#. On the **Shared Bandwidths** page, locate the shared bandwidth, click **More** in the **Operation** column, and click **View Metric** to view the monitoring metric details. + +Procedure (**Cloud Eye** Console) +--------------------------------- #. Log in to the management console. -2. Click |image1| in the upper left corner and select the desired region and project. -3. Hover on the upper left corner to display **Service List** and choose **Management & Deployment** > **Cloud Eye**. +2. Click |image3| in the upper left corner and select the desired region and project. +3. In the upper left corner of the page, click |image4| to open the service list and choose **Management & Deployment** > **Cloud Eye**. 4. Click **Cloud Service Monitoring** on the left of the page, and choose **Elastic IP and Bandwidth**. -5. Select the EIP, click **More** in the **Operation** column, and click **View Metric** to view monitoring metric details. -6. Select the shared bandwidth, click **More** in the **Operation** column, and click **View Metric** to view monitoring metric details. +5. Locate the row that contains the target bandwidth or EIP and click **View Metric** in the **Operation** column to check the bandwidth or EIP monitoring information. .. |image1| image:: /_static/images/en-us_image_0141273034.png +.. |image2| image:: /_static/images/en-us_image_0000001572300492.png +.. |image3| image:: /_static/images/en-us_image_0141273034.png +.. |image4| image:: /_static/images/en-us_image_0000001675418673.png diff --git a/umn/source/permissions_management/creating_a_user_and_granting_vpc_permissions.rst b/umn/source/permissions_management/creating_a_user_and_granting_vpc_permissions.rst index 7b16bb6..25e9972 100644 --- a/umn/source/permissions_management/creating_a_user_and_granting_vpc_permissions.rst +++ b/umn/source/permissions_management/creating_a_user_and_granting_vpc_permissions.rst @@ -8,19 +8,19 @@ Creating a User and Granting VPC Permissions This section describes how to use IAM to implement fine-grained permissions control for your VPC resources. With IAM, you can: - Create IAM users for employees based on your enterprise's organizational structure. Each IAM user will have their own security credentials for accessing VPC resources. -- Grant only the permissions required for users to perform a specific task. +- Grant users only the permissions required to perform a given task based on their job responsibilities. - Entrust a cloud account or cloud service to perform efficient O&M on your VPC resources. -If your cloud account does not require individual IAM users, skip this section. +If your cloud account meets your permissions requirements, you can skip this section. -This section describes the procedure for granting permissions (see :ref:`Figure 1 `). +:ref:`Figure 1 ` shows the process flow for granting permissions. Prerequisites ------------- -Learn about the permissions (:ref:`Permissions `) supported by VPC and choose policies or roles according to your requirements. +Learn about the permissions (see :ref:`Permissions `) supported by VPC and choose policies or roles according to your requirements. -For permissions of other services, see . +To grant permissions for other services, learn about all `permissions `__ supported by IAM. Process Flow ------------ @@ -32,19 +32,13 @@ Process Flow **Figure 1** Process for granting VPC permissions -#. .. _permission_0003__li8447183891715: +#. On the IAM console, `create a user group and assign permissions to it `__ (**VPC ReadOnlyAccess** as an example). - `Create a user group and assign permissions to it `__. +#. `Create an IAM user and add it to the created user group `__. - Create a user group on the IAM console, and assign the **VPC ReadOnlyAccess** policy to the group. +#. `Log in as the IAM user `__ and verify permissions. -#. `Create an IAM user and add it to the user group `__. + In the authorized region, perform the following operations: - Create a user on the IAM console and add the user to the group created in :ref:`1 `. - -#. `Log in `__ and verify permissions. - - Log in to the VPC console by using the user created in 2, and verify that the user only has read permissions for VPC. - - - Choose **Service List** > **Virtual Private Cloud**. Then click **Create VPC** on the VPC console. If a message appears indicating that you have insufficient permissions to perform the operation, the **VPC ReadOnlyAccess** policy has already taken effect. - - Choose any other service in **Service List**. If a message appears indicating that you have insufficient permissions to access the service, the **VPC ReadOnlyAccess** policy has already taken effect. + - Choose **Service List** > **Virtual Private Cloud**. Then click **Create VPC** on the VPC console. If a message appears indicating that you have insufficient permissions to perform the operation, the **VPCReadOnlyAccess** policy is in effect. + - Choose another service from **Service List**. If a message appears indicating that you have insufficient permissions to access the service, the **VPCReadOnlyAccess** policy is in effect. diff --git a/umn/source/permissions_management/vpc_custom_policies.rst b/umn/source/permissions_management/vpc_custom_policies.rst index 5d0a6a8..242655d 100644 --- a/umn/source/permissions_management/vpc_custom_policies.rst +++ b/umn/source/permissions_management/vpc_custom_policies.rst @@ -29,7 +29,7 @@ Example Custom Policies "Action": [ " vpc:vpcs:create - vpc:svpcs:list + vpc:vpcs:list " ] } diff --git a/umn/source/route_tables/adding_a_custom_route.rst b/umn/source/route_tables/adding_a_custom_route.rst index 291bf51..394b31a 100644 --- a/umn/source/route_tables/adding_a_custom_route.rst +++ b/umn/source/route_tables/adding_a_custom_route.rst @@ -24,6 +24,8 @@ Procedure 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + 4. In the navigation pane on the left, choose **Virtual Private Cloud** > **Route Tables**. 5. In the route table list, click the name of the route table to which you want to add a route. @@ -51,7 +53,7 @@ Procedure +-----------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------+------------------------+ | Next Hop Type | Mandatory | VPC peering connection | | | | | - | | Set the type of the next hop. For details about the supported resource types, see :ref:`Table 1 `. | | + | | Set the type of the next hop. | | | | | | | | .. note:: | | | | | | @@ -69,4 +71,4 @@ Procedure 7. Click **OK**. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001675255405.png diff --git a/umn/source/route_tables/associating_a_route_table_with_a_subnet.rst b/umn/source/route_tables/associating_a_route_table_with_a_subnet.rst index c661936..7731dc7 100644 --- a/umn/source/route_tables/associating_a_route_table_with_a_subnet.rst +++ b/umn/source/route_tables/associating_a_route_table_with_a_subnet.rst @@ -8,12 +8,19 @@ Associating a Route Table with a Subnet Scenarios --------- -After a route table is associated with a subnet, its routes control the routing for the subnet and apply to all cloud resources in the subnet. +After a subnet is created, the system associates the subnet with the default route table of its VPC. If you want to use specific routes for a subnet, you can associate the subnet with a custom route table. + +The custom route table associated with a subnet affects only the outbound traffic. The default route table determines the inbound traffic. + +.. important:: + + After a route table is associated with a subnet, the routes in the route table control the routing for the subnet and apply to all cloud resources in the subnet. Notes and Constraints --------------------- -A subnet can only be associated with one route table. +- A subnet must have a route table associated and can only be associated with one route table. +- A route table can be associated with multiple subnets. Procedure --------- @@ -24,6 +31,8 @@ Procedure 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + 4. In the navigation pane on the left, choose **Virtual Private Cloud** > **Route Tables**. 5. In the route table list, locate the row that contains the target route table and click **Associate Subnet** in the **Operation** column. @@ -39,4 +48,4 @@ Procedure 7. Click **OK**. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001626735570.png diff --git a/umn/source/route_tables/changing_the_route_table_associated_with_a_subnet.rst b/umn/source/route_tables/changing_the_route_table_associated_with_a_subnet.rst index f45845b..dbe8d59 100644 --- a/umn/source/route_tables/changing_the_route_table_associated_with_a_subnet.rst +++ b/umn/source/route_tables/changing_the_route_table_associated_with_a_subnet.rst @@ -19,6 +19,8 @@ Procedure 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + 4. In the navigation pane on the left, choose **Virtual Private Cloud** > **Route Tables**. 5. Click the name of the target route table. @@ -30,4 +32,4 @@ Procedure After the route table for a subnet is changed, routes in the new route table will apply to all cloud resources in the subnet. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001626575750.png diff --git a/umn/source/route_tables/configuring_an_snat_server.rst b/umn/source/route_tables/configuring_an_snat_server.rst index 0426160..2b7c6f5 100644 --- a/umn/source/route_tables/configuring_an_snat_server.rst +++ b/umn/source/route_tables/configuring_an_snat_server.rst @@ -69,7 +69,7 @@ Procedure **cat /proc/sys/net/ipv4/ip_forward** - In the command output, **1** indicates it is enabled, and **0** indicates it is disabled. The default value is **0**. + In the command output, **1** indicates that IP forwarding is enabled, and **0** indicates that IP forwarding is disabled. The default value is **0**. - If IP forwarding in Linux is enabled, go to step :ref:`14 `. - If IP forwarding in Linux is disabled, go to :ref:`12 ` to enable IP forwarding in Linux. diff --git a/umn/source/route_tables/creating_a_custom_route_table.rst b/umn/source/route_tables/creating_a_custom_route_table.rst index 2c6970b..ff8a46f 100644 --- a/umn/source/route_tables/creating_a_custom_route_table.rst +++ b/umn/source/route_tables/creating_a_custom_route_table.rst @@ -8,12 +8,12 @@ Creating a Custom Route Table Scenarios --------- -If your default route table cannot meet your service requirements, you can create a custom route table by following the instructions provided in this section. +A VPC automatically comes with a default route table. If your default route table cannot meet your service requirements, you can create a custom route table. Notes and Constraints --------------------- -- Each VPC can have a maximum of 10 route tables, including the default route table. +By default, each VPC can have up to 10 route tables, including the default route table. Procedure --------- @@ -24,6 +24,8 @@ Procedure 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + 4. In the navigation pane on the left, choose **Virtual Private Cloud** > **Route Tables**. 5. In the upper right corner, click **Create Route Table**. On the displayed page, configure parameters as prompted. @@ -65,4 +67,4 @@ Procedure c. Click **OK**. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001627055454.png diff --git a/umn/source/route_tables/deleting_a_route.rst b/umn/source/route_tables/deleting_a_route.rst index 8bc625f..95d2d57 100644 --- a/umn/source/route_tables/deleting_a_route.rst +++ b/umn/source/route_tables/deleting_a_route.rst @@ -31,6 +31,8 @@ Procedure 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + 4. In the navigation pane on the left, choose **Virtual Private Cloud** > **Route Tables**. 5. Locate the target route table and click its name. @@ -44,4 +46,4 @@ Procedure 7. Confirm the information and click **Yes**. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001675375405.png diff --git a/umn/source/route_tables/deleting_a_route_table.rst b/umn/source/route_tables/deleting_a_route_table.rst index 54060dc..fde7885 100644 --- a/umn/source/route_tables/deleting_a_route_table.rst +++ b/umn/source/route_tables/deleting_a_route_table.rst @@ -24,17 +24,17 @@ Procedure #. Log in to the management console. -#. Click |image1| in the upper left corner and select the desired region and project. +2. Click |image1| in the upper left corner and select the desired region and project. -#. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. +3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. The **Virtual Private Cloud** page is displayed. -#. In the navigation pane on the left, choose **Virtual Private Cloud** > **Route Tables**. +4. In the navigation pane on the left, choose **Virtual Private Cloud** > **Route Tables**. -#. Locate the row that contains the route table you want to delete and click **Delete** in the **Operation** column. +5. Locate the row that contains the route table you want to delete and click **Delete** in the **Operation** column. A confirmation dialog box is displayed. -#. Click **Yes**. +6. Click **Yes**. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001675615337.png diff --git a/umn/source/route_tables/exporting_route_table_information.rst b/umn/source/route_tables/exporting_route_table_information.rst index e24001f..bb686e4 100644 --- a/umn/source/route_tables/exporting_route_table_information.rst +++ b/umn/source/route_tables/exporting_route_table_information.rst @@ -19,6 +19,8 @@ Procedure 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + 4. In the navigation pane on the left, choose **Virtual Private Cloud** > **Route Tables**. 5. On the displayed page, click |image3| in the upper right of the route table list. @@ -26,5 +28,5 @@ Procedure The system will automatically export information about all route tables under your account in the current region as an Excel file to a local directory. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001626895486.png .. |image3| image:: /_static/images/en-us_image_0214585307.png diff --git a/umn/source/route_tables/index.rst b/umn/source/route_tables/index.rst index 9fdae4f..68c4a94 100644 --- a/umn/source/route_tables/index.rst +++ b/umn/source/route_tables/index.rst @@ -5,7 +5,7 @@ Route Tables ============ -- :ref:`Route Table Overview ` +- :ref:`Route Tables and Routes ` - :ref:`Creating a Custom Route Table ` - :ref:`Associating a Route Table with a Subnet ` - :ref:`Changing the Route Table Associated with a Subnet ` @@ -23,7 +23,7 @@ Route Tables :maxdepth: 1 :hidden: - route_table_overview + route_tables_and_routes creating_a_custom_route_table associating_a_route_table_with_a_subnet changing_the_route_table_associated_with_a_subnet diff --git a/umn/source/route_tables/modifying_a_route.rst b/umn/source/route_tables/modifying_a_route.rst index 2162ac2..6d3aa4a 100644 --- a/umn/source/route_tables/modifying_a_route.rst +++ b/umn/source/route_tables/modifying_a_route.rst @@ -22,10 +22,17 @@ Procedure #. Log in to the management console. 2. Click |image1| in the upper left corner and select the desired region and project. + 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + + The **Virtual Private Cloud** page is displayed. + 4. In the navigation pane on the left, choose **Virtual Private Cloud** > **Route Tables**. + 5. In the route table list, click the name of the target route table. + 6. Locate the row that contains the route to be modified and click **Modify** in the **Operation** column. + 7. Modify the route information in the displayed dialog box. .. table:: **Table 1** Parameter descriptions @@ -41,7 +48,7 @@ Procedure +-----------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------+------------------------+ | Next Hop Type | Mandatory | VPC peering connection | | | | | - | | Set the type of the next hop. For details about the supported resource types, see :ref:`Table 1 `. | | + | | Set the type of the next hop. | | | | | | | | .. note:: | | | | | | @@ -59,4 +66,4 @@ Procedure 8. Click **OK**. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001627055450.png diff --git a/umn/source/route_tables/replicating_a_route.rst b/umn/source/route_tables/replicating_a_route.rst index ac3643c..9537378 100644 --- a/umn/source/route_tables/replicating_a_route.rst +++ b/umn/source/route_tables/replicating_a_route.rst @@ -52,19 +52,21 @@ Procedure #. Log in to the management console. -#. Click |image1| in the upper left corner and select the desired region and project. +2. Click |image1| in the upper left corner and select the desired region and project. -#. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. +3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. -#. In the navigation pane on the left, choose **Virtual Private Cloud** > **Route Tables**. + The **Virtual Private Cloud** page is displayed. -#. In the route table list, locate the row that contains the route table you want to replicate routes from and click **Replicate Route** in the **Operation** column. +4. In the navigation pane on the left, choose **Virtual Private Cloud** > **Route Tables**. -#. Select the target route table that you want to replicate route to and the routes to be replicated as prompted. +5. In the route table list, locate the row that contains the route table you want to replicate routes from and click **Replicate Route** in the **Operation** column. + +6. Select the target route table that you want to replicate route to and the routes to be replicated as prompted. The listed routes are those that do not exist in the target route table. You can select one or more routes to replicate to the target route table. -#. Click **OK**. +7. Click **OK**. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001626735566.png diff --git a/umn/source/route_tables/route_table_overview.rst b/umn/source/route_tables/route_tables_and_routes.rst similarity index 80% rename from umn/source/route_tables/route_table_overview.rst rename to umn/source/route_tables/route_tables_and_routes.rst index 6bcad36..66519e9 100644 --- a/umn/source/route_tables/route_table_overview.rst +++ b/umn/source/route_tables/route_tables_and_routes.rst @@ -2,32 +2,33 @@ .. _vpc_route01_0001: -Route Table Overview -==================== +Route Tables and Routes +======================= -Route Table ------------ +Route Tables +------------ -A route table contains a set of routes that are used to determine where network traffic from your subnets in a VPC is directed. Each subnet must be associated with a route table. A subnet can only be associated with one route table at a time, but you can associate multiple subnets with the same route table. +A route table contains a set of routes that are used to determine where network traffic from your subnets in a VPC is directed. Each subnet must be associated with a route table. A subnet can only be associated with one route table, but you can associate multiple subnets with the same route table. -Default Route Table and Custom Route Table ------------------------------------------- -When you create a VPC, the system automatically generates a default route table for the VPC. If you create a subnet in the VPC, the subnet automatically associates with the default route table. +.. figure:: /_static/images/en-us_image_0000001650535960.png + :alt: **Figure 1** Route tables -- You can add routes to, delete routes from, and modify routes in the default route table, but cannot delete the table. -- When you create a VPC endpoint, VPN or Direct Connect connection, the default route table automatically delivers a route that cannot be deleted or modified. + **Figure 1** Route tables -If you do not want to use the default route table, you can now create a custom route table and associate it with the subnet. You can delete the custom route table if it is no longer required. +- Default route table: When you create a VPC, the system automatically generates a default route table for the VPC. If you create a subnet in the VPC, the subnet automatically associates with the default route table. The default route table ensures that subnets in a VPC can communicate with each other. -.. note:: + - You can add routes to, delete routes from, and modify routes in the default route table, but cannot delete the table. + - When you create a VPC endpoint, VPN or Direct Connect connection, the default route table automatically delivers a route that cannot be deleted or modified. - The custom route table associated with a subnet affects only the outbound traffic. The default route table determines the inbound traffic. +- Custom route table: If you do not want to use the default route table, you can create a custom route table and associate it with the subnet. Custom route tables can be deleted if they are no longer required. + + The custom route table associated with a subnet affects only the outbound traffic. The default route table controls the inbound traffic. Route ----- -A route is configured with the destination, next hop type, and next hop to determine where network traffic is directed. Routes are classified into system routes and custom routes. +You can add routes to default and custom route tables and configure the destination, next hop type, and next hop in the routes to determine where network traffic is directed. Routes are classified into system routes and custom routes. - System routes: These routes are automatically added by the system and cannot be modified or deleted. @@ -42,11 +43,11 @@ A route is configured with the destination, next hop type, and next hop to deter - Custom routes: These are routes that you can add, modify, and delete. The destination of a custom route cannot overlap with that of a system route. - You can add a custom route and configure the destination, next hop type, and next hop in the route to determine where network traffic is directed. :ref:`Table 1 ` lists the supported types of next hops. + You can add a custom route and configure the destination, next hop type, and next hop in the route to determine where network traffic is directed. :ref:`Table 1 ` lists the supported types of next hops. - You cannot add two routes with the same destination to a VPC route table even if their next hop types are different, because the destination determines the route priority. According to the longest match routing rule, the destination with a higher matching degree is preferentially selected for packet forwarding. + You cannot add two routes with the same destination to a VPC route table even if their next hop types are different. The route priority depends on the destination. According to the longest match routing rule, the destination with a higher matching degree is preferentially selected for packet forwarding. - .. _vpc_route01_0001__table1727714140542: + .. _vpc_route01_0001__en-us_topic_0038263963_route_0001_table1727714140542: .. table:: **Table 1** Next hop type @@ -85,14 +86,14 @@ A route is configured with the destination, next hop type, and next hop to deter Custom Route Table Configuration Process ---------------------------------------- -:ref:`Figure 1 ` shows the process of creating and configuring a custom route table. +:ref:`Figure 2 ` shows the process of creating and configuring a custom route table. .. _vpc_route01_0001__en-us_topic_0212076956_fig16862186152219: .. figure:: /_static/images/en-us_image_0214585341.png - :alt: **Figure 1** Route table configuration process + :alt: **Figure 2** Route table configuration process - **Figure 1** Route table configuration process + **Figure 2** Route table configuration process #. For details about how to create a custom route table, see :ref:`Creating a Custom Route Table `. #. For details about how to add a custom route, see :ref:`Adding a Custom Route `. diff --git a/umn/source/route_tables/viewing_route_table_information.rst b/umn/source/route_tables/viewing_route_table_information.rst index a44e820..5642fed 100644 --- a/umn/source/route_tables/viewing_route_table_information.rst +++ b/umn/source/route_tables/viewing_route_table_information.rst @@ -23,6 +23,8 @@ Procedure 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + 4. In the navigation pane on the left, choose **Virtual Private Cloud** > **Route Tables**. 5. Click the name of the target route table. @@ -33,4 +35,4 @@ Procedure b. On the **Associated Subnets** tab page, view the subnets associated with the route table. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001675415213.png diff --git a/umn/source/route_tables/viewing_the_route_table_associated_with_a_subnet.rst b/umn/source/route_tables/viewing_the_route_table_associated_with_a_subnet.rst index b8ceb6a..d10d0bf 100644 --- a/umn/source/route_tables/viewing_the_route_table_associated_with_a_subnet.rst +++ b/umn/source/route_tables/viewing_the_route_table_associated_with_a_subnet.rst @@ -19,6 +19,8 @@ Procedure 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + 4. In the navigation pane on the left, choose **Virtual Private Cloud** > **Subnets**. The **Subnets** page is displayed. @@ -34,4 +36,4 @@ Procedure The route table details page is displayed. You can further view the route information. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001675375297.png diff --git a/umn/source/security/security_group/adding_instances_to_and_removing_them_from_a_security_group.rst b/umn/source/security/security_group/adding_instances_to_and_removing_them_from_a_security_group.rst deleted file mode 100644 index 5516826..0000000 --- a/umn/source/security/security_group/adding_instances_to_and_removing_them_from_a_security_group.rst +++ /dev/null @@ -1,52 +0,0 @@ -:original_name: SecurityGroup_0017.html - -.. _SecurityGroup_0017: - -Adding Instances to and Removing Them from a Security Group -=========================================================== - -Scenarios ---------- - -After a security group is created, you can add instances to the security group to protect the instances. You can also remove them from the security group as required. - -You can add multiple instances to or remove them from a security group. - -Adding Instances to a Security Group ------------------------------------- - -#. Log in to the management console. -#. Click |image1| in the upper left corner and select the desired region and project. -#. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. -#. In the navigation pane on the left, choose **Access Control** > **Security Groups**. -#. On the **Security Groups** page, click **Manage Instance** in the **Operation** column. -#. On the **Servers** tab, click **Add** and add one or more servers to the current security group. -#. On the **Extension NICs** tab, click **Add** and add one or more extension NICs to the current security group. -#. Click **OK**. - -Removing Instances from a Security Group ----------------------------------------- - -#. Log in to the management console. -#. Click |image3| in the upper left corner and select the desired region and project. -#. Click |image4| in the upper left corner and choose **Network** > **Virtual Private Cloud**. -#. In the navigation pane on the left, choose **Access Control** > **Security Groups**. -#. On the **Security Groups** page, click **Manage Instance** in the **Operation** column. -#. On the **Servers** tab, locate the target server and click **Remove** in the **Operation** column to remove the server from current security group. -#. On the **Extension NICs** tab, locate the target extension NIC and click **Remove** in the **Operation** column to remove the NIC from the current security group. -#. Click **Yes**. - -**Removing multiple instances from a security group** - -- Select multiple servers and click **Remove** above the server list to remove the selected servers from the current security group all at once. -- Select multiple extension NICs and click **Remove** above the extension NIC list to remove the selected extension NICs from the current security group all at once. - -Follow-Up Operations --------------------- - -You can delete the security groups that you no longer need. Deleting a security group will also delete all security group rules in the security group. For details, see :ref:`Deleting a Security Group `. - -.. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png -.. |image3| image:: /_static/images/en-us_image_0141273034.png -.. |image4| image:: /_static/images/en-us_image_0000001500905066.png diff --git a/umn/source/security/security_group/deleting_a_security_group_rule.rst b/umn/source/security/security_group/deleting_a_security_group_rule.rst deleted file mode 100644 index c943cb5..0000000 --- a/umn/source/security/security_group/deleting_a_security_group_rule.rst +++ /dev/null @@ -1,38 +0,0 @@ -:original_name: vpc_SecurityGroup_0006.html - -.. _vpc_SecurityGroup_0006: - -Deleting a Security Group Rule -============================== - -Scenarios ---------- - -If the source of an inbound security group rule or destination of an outbound security group rule needs to be changed, you need to first delete the security group rule and add a new one. - -Notes and Constraints ---------------------- - -Security group rules use whitelists. Deleting a security group rule may result in ECS access failures. Security group rules work as follows: - -- If an inbound request matches the source in an inbound security group rule with **Action** set to **Allow**, the request is allowed. -- If the destination of an outbound security group rule with **Action** set to **Allow** is 0.0.0.0/0, all outbound requests are allowed. - -Procedure ---------- - -#. Log in to the management console. - -2. Click |image1| in the upper left corner and select the desired region and project. -3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. -4. In the navigation pane on the left, choose **Access Control** > **Security Groups**. -5. On the **Security Groups** page, click the security group name. -6. If you do not need a security group rule, locate the row that contains the target rule, and click **Delete**. -7. Click **Yes** in the displayed dialog box. - -**Deleting multiple security group rules at once** - -You can also select multiple security group rules and click **Delete** above the security group rule list to delete multiple rules at a time. - -.. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png diff --git a/umn/source/security/security_group/fast-adding_security_group_rules.rst b/umn/source/security/security_group/fast-adding_security_group_rules.rst deleted file mode 100644 index a137e4e..0000000 --- a/umn/source/security/security_group/fast-adding_security_group_rules.rst +++ /dev/null @@ -1,93 +0,0 @@ -:original_name: SecurityGroup_0004.html - -.. _SecurityGroup_0004: - -Fast-Adding Security Group Rules -================================ - -Scenarios ---------- - -You can add multiple security group rules with different protocols and ports at the same time. - -Procedure ---------- - -#. Log in to the management console. - -2. Click |image1| in the upper left corner and select the desired region and project. - -3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. - -4. In the navigation pane on the left, choose **Access Control** > **Security Groups**. - -5. On the **Security Groups** page, locate the target security group and click **Manage Rule** in the **Operation** column to switch to the page for managing inbound and outbound rules. - -6. On the **Inbound Rules** tab, click **Fast-Add Rule**. In the displayed dialog box, select the protocols and ports you wish to add all at once. - - - .. figure:: /_static/images/en-us_image_0211552164.png - :alt: **Figure 1** Fast-Add Inbound Rule - - **Figure 1** Fast-Add Inbound Rule - - .. table:: **Table 1** Inbound rule parameter description - - +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Parameter | Description | Example Value | - +=======================+==========================================================================================================================================================================+=======================+ - | Protocols and Ports | Common protocols and ports are provided for: | SSH (22) | - | | | | - | | - Remote login and ping | | - | | - Web services | | - | | - Databases | | - +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Source | Source of the security group rule. The value can be an IP address or a security group to allow access from IP addresses or instances in the security group. For example: | 0.0.0.0/0 | - | | | | - | | - xxx.xxx.xxx.xxx/32 (IPv4 address) | | - | | - xxx.xxx.xxx.0/24 (IPv4 address range) | | - | | - 0.0.0.0/0 (all IPv4 addresses) | | - | | - sg-abc (security group) | | - | | | | - | | If the source is a security group, this rule will apply to all instances associated with the selected security group. | | - +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Description | (Optional) Supplementary information about the security group rule. | ``-`` | - | | | | - | | The description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | - +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - -7. On the **Outbound Rules** tab, click **Fast-Add Rule**. In the displayed dialog box, select required protocols and ports to add multiple rules at a time. - - - .. figure:: /_static/images/en-us_image_0211560998.png - :alt: **Figure 2** Fast-Add Outbound Rule - - **Figure 2** Fast-Add Outbound Rule - - .. table:: **Table 2** Outbound rule parameter description - - +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Parameter | Description | Example Value | - +=======================+=============================================================================================================================================================================+=======================+ - | Protocols and Ports | Common protocols and ports are provided for: | SSH (22) | - | | | | - | | - Remote login and ping | | - | | - Web services | | - | | - Databases | | - +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Destination | Destination of the security group rule. The value can be an IP address or a security group to allow access to IP addresses or instances in the security group. For example: | 0.0.0.0/0 | - | | | | - | | - xxx.xxx.xxx.xxx/32 (IPv4 address) | | - | | - xxx.xxx.xxx.0/24 (IPv4 address range) | | - | | - 0.0.0.0/0 (all IPv4 addresses) | | - | | - sg-abc (security group) | | - +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Description | (Optional) Supplementary information about the security group rule. | ``-`` | - | | | | - | | The description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | - +-----------------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - -8. Click **OK**. - -.. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png diff --git a/umn/source/security/security_group/modifying_a_security_group.rst b/umn/source/security/security_group/modifying_a_security_group.rst deleted file mode 100644 index 143b226..0000000 --- a/umn/source/security/security_group/modifying_a_security_group.rst +++ /dev/null @@ -1,43 +0,0 @@ -:original_name: vpc_SecurityGroup_0010.html - -.. _vpc_SecurityGroup_0010: - -Modifying a Security Group -========================== - -**Scenarios** -------------- - -Modify the name and description of a created security group. - -Procedure ---------- - -**Method 1** - -#. Log in to the management console. -#. Click |image1| in the upper left corner and select the desired region and project. -#. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. -#. In the navigation pane on the left, choose **Access Control** > **Security Groups**. -#. On the **Security Groups** page, locate the target security group and choose **More** > **Modify** in the **Operation** column. -#. Modify the name and description of the security group as required. -#. Click **OK**. - -**Method 2** - -#. Log in to the management console. -#. Click |image3| in the upper left corner and select the desired region and project. -#. Click |image4| in the upper left corner and choose **Network** > **Virtual Private Cloud**. -#. In the navigation pane on the left, choose **Access Control** > **Security Groups**. -#. On the **Security Groups** page, click the security group name. -#. On the displayed page, click |image5| on the right of **Name** and edit the security group name. -#. Click **Y** to save the security group name. -#. Click |image6| on the right of **Description** and edit the security group description. -#. Click **Y** to save the security group description. - -.. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png -.. |image3| image:: /_static/images/en-us_image_0141273034.png -.. |image4| image:: /_static/images/en-us_image_0000001500905066.png -.. |image5| image:: /_static/images/en-us_image_0239476777.png -.. |image6| image:: /_static/images/en-us_image_0239476777.png diff --git a/umn/source/security/security_group/replicating_a_security_group_rule.rst b/umn/source/security/security_group/replicating_a_security_group_rule.rst deleted file mode 100644 index 7dcc70d..0000000 --- a/umn/source/security/security_group/replicating_a_security_group_rule.rst +++ /dev/null @@ -1,33 +0,0 @@ -:original_name: vpc_SecurityGroup_0004.html - -.. _vpc_SecurityGroup_0004: - -Replicating a Security Group Rule -================================= - -**Scenarios** -------------- - -Replicate an existing security group rule to generate a new rule. When replicating a security group rule, you can make changes so that it is not a perfect copy. - -Procedure ---------- - -#. Log in to the management console. - -#. Click |image1| in the upper left corner and select the desired region and project. - -#. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. - -#. In the navigation pane on the left, choose **Access Control** > **Security Groups**. - -#. On the **Security Groups** page, click the security group name. - -#. On the displayed page, locate the row that contains the security group rule to be replicated, and click **Replicate** in the **Operation** column. - - You can also modify the security group rule as required to quickly generate a new rule. - -#. Click **OK**. - -.. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png diff --git a/umn/source/security/security_group/security_group_configuration_examples.rst b/umn/source/security/security_group/security_group_configuration_examples.rst deleted file mode 100644 index 628c72b..0000000 --- a/umn/source/security/security_group/security_group_configuration_examples.rst +++ /dev/null @@ -1,199 +0,0 @@ -:original_name: en-us_topic_0081124350.html - -.. _en-us_topic_0081124350: - -Security Group Configuration Examples -===================================== - -Common security group configurations are presented here. The examples in this section allow all outgoing data packets by default. This section will only describe how to configure inbound rules. - -- .. _en-us_topic_0081124350__li2921164192410: - - :ref:`Allowing External Access to a Specified Port ` - -- :ref:`Enabling ECSs in Different Security Groups to Communicate with Each Other Through an Internal Network ` - -- :ref:`Enabling Specified IP Addresses to Remotely Access ECSs in a Security Group ` - -- :ref:`Remotely Connecting to Linux ECSs Using SSH ` - -- :ref:`Remotely Connecting to Windows ECSs Using RDP ` - -- :ref:`Enabling Communication Between ECSs ` - -- :ref:`Hosting a Website on ECSs ` - -- :ref:`Enabling an ECS to Function as a DNS Server ` - -- :ref:`Uploading or Downloading Files Using FTP ` - -You can use the default security group or create a security group in advance. For details, see sections :ref:`Creating a Security Group ` and :ref:`Adding a Security Group Rule `. - -Allowing External Access to a Specified Port --------------------------------------------- - -- Example scenario: - - After services are deployed, you can add security group rules to allow external access to a specified port (for example, 1100). - -- Security group rule: - - ========= ======== ==== ========= - Direction Protocol Port Source - ========= ======== ==== ========= - Inbound TCP 1100 0.0.0.0/0 - ========= ======== ==== ========= - -.. _en-us_topic_0081124350__section14197522283: - -Enabling ECSs in Different Security Groups to Communicate with Each Other Through an Internal Network ------------------------------------------------------------------------------------------------------ - -- Example scenario: - - Resources on an ECS in a security group need to be copied to an ECS associated with another security group. The two ECSs are in the same VPC. We recommend that you enable private network communication between the ECSs and then copy the resources. - -- Security group configuration: - - Within a given VPC, ECSs in the same security group can communicate with one another by default. However, ECSs in different security groups cannot communicate with each other by default. To enable these ECSs to communicate with each other, you need to add certain security group rules. - - You can add an inbound rule to the security groups containing the ECSs to allow access from ECSs in the other security group. The required rule is as follows. - - +-----------------+--------------------------------------------------------------------------+-----------------+------------------------------------+ - | Direction | Protocol | Port | Source | - +=================+==========================================================================+=================+====================================+ - | Inbound | TCP | All | ID of another security group | - | | | | | - | | .. note:: | | Example: 014d7278-XXX-530c95350d43 | - | | | | | - | | Select a protocol used for communication through an internal network. | | | - +-----------------+--------------------------------------------------------------------------+-----------------+------------------------------------+ - -.. _en-us_topic_0081124350__section17693183118306: - -Enabling Specified IP Addresses to Remotely Access ECSs in a Security Group ---------------------------------------------------------------------------- - -- Example scenario: - - To prevent ECSs from being attacked, you can change the port for remote login and configure security group rules that allow only specified IP addresses to remotely access the ECSs. - -- Security group configuration: - - To allow IP address **192.168.20.2** to remotely access Linux ECSs in a security group over the SSH protocol (port 22), you can configure the following security group rule. - - +-----------------+-----------------+-----------------+-------------------------------------------------+ - | Direction | Protocol | Port | Source | - +=================+=================+=================+=================================================+ - | Inbound | SSH | 22 | IPv4 CIDR block or ID of another security group | - | | | | | - | | | | For example, 192.168.20.2/32 | - +-----------------+-----------------+-----------------+-------------------------------------------------+ - -.. _en-us_topic_0081124350__section115069253338: - -Remotely Connecting to Linux ECSs Using SSH -------------------------------------------- - -- Example scenario: - - After creating Linux ECSs, you can add a security group rule to enable remote SSH access to the ECSs. - -- Security group rule: - - ========= ======== ==== ========= - Direction Protocol Port Source - ========= ======== ==== ========= - Inbound SSH 22 0.0.0.0/0 - ========= ======== ==== ========= - -.. _en-us_topic_0081124350__section168046312349: - -Remotely Connecting to Windows ECSs Using RDP ---------------------------------------------- - -- Example scenario: - - After creating Windows ECSs, you can add a security group rule to enable remote RDP access to the ECSs. - -- Security group rule: - - ========= ======== ==== ========= - Direction Protocol Port Source - ========= ======== ==== ========= - Inbound RDP 3389 0.0.0.0/0 - ========= ======== ==== ========= - -.. _en-us_topic_0081124350__section34721049193411: - -Enabling Communication Between ECSs ------------------------------------ - -- Example scenario: - - After creating ECSs, you need to add a security group rule so that you can run the **ping** command to test communication between the ECSs. - -- Security group rule: - - ========= ======== ==== ========= - Direction Protocol Port Source - ========= ======== ==== ========= - Inbound ICMP All 0.0.0.0/0 - ========= ======== ==== ========= - -.. _en-us_topic_0081124350__section1517991516357: - -Hosting a Website on ECSs -------------------------- - -- Example scenario: - - If you deploy a website on your ECSs and require that your website be accessed over HTTP or HTTPS, you can add rules to the security group used by the ECSs that function as the web servers. - -- Security group rule: - - ========= ======== ==== ========= - Direction Protocol Port Source - ========= ======== ==== ========= - Inbound HTTP 80 0.0.0.0/0 - Inbound HTTPS 443 0.0.0.0/0 - ========= ======== ==== ========= - -.. _en-us_topic_0081124350__section2910346123520: - -Enabling an ECS to Function as a DNS Server -------------------------------------------- - -- Example scenario: - - If you need to use an ECS as a DNS server, you must allow TCP and UDP access from port 53 to the DNS server. You can add the following rules to the security group associated with the ECS. - -- Security group rules: - - ========= ======== ==== ========= - Direction Protocol Port Source - ========= ======== ==== ========= - Inbound TCP 53 0.0.0.0/0 - Inbound UDP 53 0.0.0.0/0 - ========= ======== ==== ========= - -.. _en-us_topic_0081124350__section5964121693610: - -Uploading or Downloading Files Using FTP ----------------------------------------- - -- Example scenario: - - If you want to use File Transfer Protocol (FTP) to upload files to or download files from ECSs, you need to add a security group rule. - - .. note:: - - You must first install the FTP server program on the ECSs and check whether ports 20 and 21 are working properly. - -- Security group rule: - - ========= ======== ===== ========= - Direction Protocol Port Source - ========= ======== ===== ========= - Inbound TCP 20-21 0.0.0.0/0 - ========= ======== ===== ========= diff --git a/umn/source/security/security_group/security_group_overview.rst b/umn/source/security/security_group/security_group_overview.rst deleted file mode 100644 index f470b83..0000000 --- a/umn/source/security/security_group/security_group_overview.rst +++ /dev/null @@ -1,75 +0,0 @@ -:original_name: en-us_topic_0073379079.html - -.. _en-us_topic_0073379079: - -Security Group Overview -======================= - -Security Group --------------- - -A security group is a collection of access control rules for cloud resources, such as cloud servers, containers, and databases, that have the same security protection requirements and that are mutually trusted. After a security group is created, you can create various access rules for the security group, these rules will apply to all cloud resources added to this security group. - -Like whitelists, security group rules work as follows: - -- Inbound rule: If an inbound request matches the source in an inbound security group rule with **Action** set to **Allow**, the request is allowed. - - Unless otherwise specified, you do not need to configure deny rules in the inbound direction because requests that do not match allow rules will be denied. - -- Outbound rule: If the destination of an outbound security group rule with **Action** set to **Allow** is 0.0.0.0/0, all outbound requests are allowed. - - IPv4 default route: 0.0.0.0/0 - - IPv6 default route: ::/0 - -:ref:`Table 1 ` shows the inbound and outbound rules in security group sg-AB. - -.. _en-us_topic_0073379079__table102261597217: - -.. table:: **Table 1** Rules in security group sg-AB - - +-----------+--------+-----------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------+ - | Direction | Action | Protocol & Port | Source or Destination | Description | - +===========+========+=================+========================+===========================================================================================================================================+ - | Inbound | Allow | All | Source: sg-AB | Allows access requests from security group sg-AB. This rule ensures that instances in the security group can communicate with each other. | - +-----------+--------+-----------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------+ - | Outbound | Allow | All | Destination: 0.0.0.0/0 | Allows all requests in the security group to be sent out. | - +-----------+--------+-----------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------+ - -The system automatically creates a default security group for each account. If the default security group does not meet your requirements, you can :ref:`modify security group rules ` or :ref:`create a custom security group `. - -Security Group Basics ---------------------- - -- You can associate instances, such as servers and extension NICs, with one or more security groups. - - You can change the security groups that are associated with instances, such as servers or extension NICs. By default, when you create an instance, it is associated with the default security group of its VPC unless you specify another security group. - -- You need to add security group rules to allow instances in the same security group to communicate with each other. - -- Security groups are stateful. If you send a request from your instance and the outbound traffic is allowed, the response traffic for that request is allowed to flow in regardless of inbound security group rules. Similarly, if inbound traffic is allowed, responses to allowed inbound traffic are allowed to flow out, regardless of outbound rules. - - Security groups use connection tracking to track traffic to and from instances that they contain and security group rules are applied based on the connection status of the traffic to determine whether to allow or deny traffic. If you add, modify, or delete a security group rule, or create or delete an instance in the security group, the connection tracking of all instances in the security group will be automatically cleared. In this case, the inbound or outbound traffic of the instance will be considered as new connections, which need to match the inbound or outbound security group rules to ensure that the rules take effect immediately and the security of incoming traffic. - - In addition, if the inbound or outbound traffic of an instance has no packets for a long time, the traffic will be considered as new connections after the connection tracking times out, and the connections need to match the outbound and inbound rules. The timeout period of connection tracking varies according to the protocol. The timeout period of a TCP connection in the established state is 600s, and the timeout period of an ICMP connection is 30s. For other protocols, if packets are received in both directions, the connection tracking timeout period is 180s. If one or more packets are received in one direction but no packet is received in the other direction, the connection tracking timeout period is 30s. For protocols other than TCP, UDP, and ICMP, only the IP address and protocol number are tracked. - -.. note:: - - If two ECSs are in the same security group but in different VPCs, the ECSs cannot communicate with each other. To enable communications between the ECSs, use a VPC peering connection to connect the two VPCs. - -Security Group Rules --------------------- - -After you create a security group, you can add rules to the security group. A rule applies either to inbound traffic or outbound traffic. After you add cloud resources to the security group, they are protected by the rules of the group. - -Each security group has its default rules. For details, see :ref:`Table 1 `. You can also customize security group rules. For details, see :ref:`Adding a Security Group Rule `. - -Security Group Constraints --------------------------- - -- By default, you can create a maximum of 100 security groups in your cloud account. -- By default, you can add up to 50 security group rules to a security group. -- When creating a private network load balancer, you need to select a desired security group. Do not delete the default security group rules or ensure that the following requirements are met: - - - Outbound rules: only allow data packets to the selected security group or only data packets from the peer load balancer. - - Inbound rules: only allow data packets from the selected security group or only data packets from the peer load balancer. diff --git a/umn/source/service_overview/basic_concepts/route_table.rst b/umn/source/service_overview/basic_concepts/route_table.rst index e4d01a3..02588c9 100644 --- a/umn/source/service_overview/basic_concepts/route_table.rst +++ b/umn/source/service_overview/basic_concepts/route_table.rst @@ -8,32 +8,27 @@ Route Table Route Tables ------------ -A route table contains a set of routes that are used to determine where network traffic from your subnets in a VPC is directed. Each subnet must be associated with a route table. You can associate a subnet with only one route table at a time, but you can associate multiple subnets with the same route table. +A route table contains a set of routes that are used to determine where network traffic from your subnets in a VPC is directed. Each subnet must be associated with a route table. A subnet can only be associated with one route table, but you can associate multiple subnets with the same route table. -.. figure:: /_static/images/en-us_image_0000001229959315.png - :alt: **Figure 1** Route Table +.. figure:: /_static/images/en-us_image_0000001650535960.png + :alt: **Figure 1** Route tables - **Figure 1** Route Table + **Figure 1** Route tables -Default Route Table and Custom Route Table ------------------------------------------- +- Default route table: When you create a VPC, the system automatically generates a default route table for the VPC. If you create a subnet in the VPC, the subnet automatically associates with the default route table. The default route table ensures that subnets in a VPC can communicate with each other. -When you create a VPC, the system automatically generates a default route table for the VPC. If you create a subnet in the VPC, the subnet automatically associates with the default route table. + - You can add routes to, delete routes from, and modify routes in the default route table, but cannot delete the table. + - When you create a VPC endpoint, VPN or Direct Connect connection, the default route table automatically delivers a route that cannot be deleted or modified. -- You can add routes to, delete routes from, and modify routes in the default route table, but cannot delete the table. -- When you create a VPC endpoint, VPN or Direct Connect connection, the default route table automatically delivers a route that cannot be deleted or modified. +- Custom route table: If you do not want to use the default route table, you can create a custom route table and associate it with the subnet. Custom route tables can be deleted if they are no longer required. -If you do not want to use the default route table, you can now create a custom route table and associate it with the subnet. You can delete the custom route table if it is no longer required. - -.. note:: - - The custom route table associated with a subnet affects only the outbound traffic. The default route table determines the inbound traffic. + The custom route table associated with a subnet affects only the outbound traffic. The default route table controls the inbound traffic. Route ----- -A route is configured with the destination, next hop type, and next hop to determine where network traffic is directed. Routes are classified into system routes and custom routes. +You can add routes to default and custom route tables and configure the destination, next hop type, and next hop in the routes to determine where network traffic is directed. Routes are classified into system routes and custom routes. - System routes: These routes are automatically added by the system and cannot be modified or deleted. diff --git a/umn/source/service_overview/basic_concepts/security_group.rst b/umn/source/service_overview/basic_concepts/security_group.rst index 657250c..aa59a7c 100644 --- a/umn/source/service_overview/basic_concepts/security_group.rst +++ b/umn/source/service_overview/basic_concepts/security_group.rst @@ -9,26 +9,38 @@ A security group is a collection of access control rules for cloud resources, su Like whitelists, security group rules work as follows: -- Inbound rule: If an inbound request matches the source in an inbound security group rule with **Action** set to **Allow**, the request is allowed. +- Inbound rules control incoming traffic to instances in the security group. - Unless otherwise specified, you do not need to configure deny rules in the inbound direction because requests that do not match allow rules will be denied. + If an inbound request matches the source in an inbound security group rule, the request is allowed and other requests are denied. -- Outbound rule: If the destination of an outbound security group rule with **Action** set to **Allow** is 0.0.0.0/0, all outbound requests are allowed. + By default, you do not need to configure deny rules in the inbound direction because requests that do not match allow rules will be denied. - IPv4 default route: 0.0.0.0/0 +- Outbound rules control outgoing traffic from instances in the security group. - IPv6 default route: ::/0 + If the destination of an outbound security group rule is 0.0.0.0/0, all outbound requests are allowed. -:ref:`Table 1 ` shows the inbound and outbound rules in security group sg-AB. + 0.0.0.0/0 represents all IPv4 addresses. + + ::/0 represents all IPv6 addresses. + +:ref:`Table 1 ` uses custom security group sg-AB as an example to describe its inbound and outbound rules in detail. .. _vpc_concepts_0005__en-us_topic_0073379079_table102261597217: .. table:: **Table 1** Rules in security group sg-AB - +-----------+--------+-----------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------+ - | Direction | Action | Protocol & Port | Source or Destination | Description | - +===========+========+=================+========================+===========================================================================================================================================+ - | Inbound | Allow | All | Source: sg-AB | Allows access requests from security group sg-AB. This rule ensures that instances in the security group can communicate with each other. | - +-----------+--------+-----------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------+ - | Outbound | Allow | All | Destination: 0.0.0.0/0 | Allows all requests in the security group to be sent out. | - +-----------+--------+-----------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------+ + +-----------+------+-----------------+------------------------+------------------------------------------------------------------------------------------------------------------------------+ + | Direction | Type | Protocol & Port | Source/Destination | Description | + +===========+======+=================+========================+==============================================================================================================================+ + | Inbound | IPv4 | All | Source: sg-AB | Allows ECSs in the security group to communicate with each other. | + +-----------+------+-----------------+------------------------+------------------------------------------------------------------------------------------------------------------------------+ + | Inbound | IPv4 | TCP: 22 | Source: 0.0.0.0/0 | Allows all IPv4 addresses to access ECSs in the security group over port 22 (SSH) for remotely logging in to Linux ECSs. | + +-----------+------+-----------------+------------------------+------------------------------------------------------------------------------------------------------------------------------+ + | Inbound | IPv4 | TCP: 3389 | Source: 0.0.0.0/0 | Allows all IPv4 addresses to access ECSs in the security group over port 3389 (RDP) for remotely logging in to Windows ECSs. | + +-----------+------+-----------------+------------------------+------------------------------------------------------------------------------------------------------------------------------+ + | Inbound | IPv4 | TCP: 80 | Source: 10.5.6.30/32 | Allows IP address 10.5.6.30 to access ECSs in the security group over port 80. | + +-----------+------+-----------------+------------------------+------------------------------------------------------------------------------------------------------------------------------+ + | Outbound | IPv4 | All | Destination: 0.0.0.0/0 | Allows access from ECSs in the security group to any IPv4 address over any port. | + +-----------+------+-----------------+------------------------+------------------------------------------------------------------------------------------------------------------------------+ + | Outbound | IPv6 | All | Destination: ::/0 | Allows access from ECSs in the security group to any IPv6 address over any port. | + +-----------+------+-----------------+------------------------+------------------------------------------------------------------------------------------------------------------------------+ diff --git a/umn/source/service_overview/basic_concepts/shared_snat.rst b/umn/source/service_overview/basic_concepts/shared_snat.rst index 3821599..483ed29 100644 --- a/umn/source/service_overview/basic_concepts/shared_snat.rst +++ b/umn/source/service_overview/basic_concepts/shared_snat.rst @@ -16,13 +16,19 @@ The VPC service provides free SNAT function, which allows ECSs to use a limited **Figure 1** SNAT function -- To enable shared SNAT using the API, set **enable_snat** to **true** by following the instructions provided in **Neutron** > **Routers** > **Update router** in the *Native OpenStack API Reference*. +- To enable shared SNAT using the API, refer to `Updating a Router `__ and set **enable_snat** to **true**. - To enable shared SNAT on the management console: #. Log in to the management console. - #. On the console homepage, under **Network**, click **Virtual Private Cloud**. + + #. Click |image1| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + + The **Virtual Private Cloud** page is displayed. + #. On the **Virtual Private Cloud** page, locate the VPC for which shared SNAT is to be enabled, and click **Modify**. + #. In the displayed dialog box, enable **Shared SNAT**. + #. Click **OK**. After being configured for a VPC, shared SNAT takes effect for the whole VPC. If EIPs are bound to ECSs in a VPC for which shared SNAT is configured, Internet traffic is preferentially forwarded using the EIPs. If you want to prevent an ECS from connecting to the Internet, you can configure an outbound rule for the security group associated with the ECS. @@ -57,3 +63,5 @@ To prevent an ECS from connecting to the Internet but allow the ECS to access 19 - A custom route enables ECSs to access the Internet through an SNAT server that has an EIP bound. The ECSs' access requests are routed to the SNAT server based on the route table. - Shared SNAT takes effect for the whole VPC by default, while a custom route takes effect for the VPC or subnet for which routes have been configured. - A custom route has a higher priority than a shared SNAT. + +.. |image1| image:: /_static/images/en-us_image_0000001675619157.png diff --git a/umn/source/service_overview/basic_concepts/subnet.rst b/umn/source/service_overview/basic_concepts/subnet.rst index 60cb03f..d34d26a 100644 --- a/umn/source/service_overview/basic_concepts/subnet.rst +++ b/umn/source/service_overview/basic_concepts/subnet.rst @@ -7,14 +7,14 @@ Subnet A subnet is a unique CIDR block with a range of IP addresses in a VPC. All resources in a VPC must be deployed on subnets. -- By default, ECSs in all subnets of the same VPC can communicate with one another, but ECSs in different VPCs cannot. +- By default, all instances in different subnets of the same VPC can communicate with each other and the subnets can be located in different AZs. For example, VPC-A has subnet A01 in AZ A and subnet A02 in AZ B. Subnet A01 and subnet B01 can communicate with each other by default. - You can create VPC peering connections to enable ECSs in different VPCs but in the same region to communicate with one another. For details, see :ref:`VPC Peering Connection Overview `. +- After a subnet is created, its CIDR block cannot be modified. Subnets in the same VPC cannot overlap. -- After a subnet is created, its CIDR block cannot be modified. + A subnet mask can be between the netmask of its VPC CIDR block and /29 netmask. If a VPC CIDR block is 10.0.0.0/16, its subnet mask can between 16 to 29. - The subnets used to deploy your resources must reside within your VPC, and the subnet masks used to define them can be between the netmask of its VPC CIDR block and /29 netmask. + For example, if the CIDR block of VPC-A is 10.0.0.0/16, you can specify 10.0.0.0/24 for subnet A01, 10.0.1.0/24 for subnet A02, and 10.0.3.0/24 for subnet A03. - - 10.0.0.0 - 10.255.255.255 - - 172.16.0.0 - 172.31.255.255 - - 192.168.0.0 - 192.168.255.255 + .. note:: + + By default, you can create a maximum of 100 subnets in each region. If this cannot meet your service requirements, request a quota increase by referring to :ref:`What Is a Quota? ` diff --git a/umn/source/service_overview/index.rst b/umn/source/service_overview/index.rst index a09d654..13643f5 100644 --- a/umn/source/service_overview/index.rst +++ b/umn/source/service_overview/index.rst @@ -9,7 +9,6 @@ Service Overview - :ref:`Product Advantages ` - :ref:`Application Scenarios ` - :ref:`VPC Connectivity ` -- :ref:`Notes and Constraints ` - :ref:`VPC and Other Services ` - :ref:`Permissions ` - :ref:`Basic Concepts ` @@ -23,7 +22,6 @@ Service Overview product_advantages application_scenarios vpc_connectivity - notes_and_constraints vpc_and_other_services permissions basic_concepts/index diff --git a/umn/source/service_overview/notes_and_constraints.rst b/umn/source/service_overview/notes_and_constraints.rst deleted file mode 100644 index 2209681..0000000 --- a/umn/source/service_overview/notes_and_constraints.rst +++ /dev/null @@ -1,69 +0,0 @@ -:original_name: overview_0003.html - -.. _overview_0003: - -Notes and Constraints -===================== - -Security Group --------------- - -- By default, you can create a maximum of 100 security groups in your cloud account. -- By default, you can add up to 50 security group rules to a security group. -- When creating a private network load balancer, you need to select a desired security group. Do not delete the default security group rules or ensure that the following requirements are met: - - - Outbound rules: only allow data packets to the selected security group or only data packets from the peer load balancer. - - Inbound rules: only allow data packets from the selected security group or only data packets from the peer load balancer. - -Firewall --------- - -- By default, you can create a maximum of 200 firewalls in your cloud account. -- You can associate a firewall with multiple subnets. However, a subnet can only be associated with one firewall at a time. -- A firewall can contain no more than 20 rules in one direction, or performance will deteriorate. -- For optimal performance, import no more than 40 firewall rules at a time. Existing rules will still be available after new rules are imported. Each rule can be imported only once. - -Route Table ------------ - -- You can add routes to, delete routes from, and modify routes in the default route table, but cannot delete the table. -- When you create a VPC endpoint, VPN or Direct Connect connection, the default route table automatically delivers a route that cannot be deleted or modified. - -VPC Peering Connection ----------------------- - -- A VPC peering connection can only connect VPCs in the same region. -- If the local and peer VPCs have overlapping CIDR blocks, the VPC peering connection may not take effect. -- A VPC cannot use EIPs of its peered VPC for Internet access. For example, if VPC A is peered with VPC B that has EIPs, VPC A cannot use EIPs in VPC B to access the Internet. - -VPC Flow Log ------------- - -- Currently, only C3, M3, and S2 ECSs support VPC flow logs. -- By default, you can create a maximum of 10 VPC flow logs. -- By default, a maximum of 400,000 flow log records are supported. - -Virtual IP Address ------------------- - -- Virtual IP addresses are not recommended when multiple NICs in the same subnet are configured on an ECS. It is too easy for there to be route conflicts on the ECS, which would cause communication failure using the virtual IP address. - -EIP ---- - -- Each EIP can only be bound to one cloud resource. -- An EIP that has already been bound to a cloud resource cannot be bound to another resource without first being unbound from the current resource. -- You can only release EIPs that are not bound to any resources. -- The system preferentially assigns EIPs to you from the ones you released, if any. However, if any of these EIPs is already assigned to another user, it cannot be re-assigned to you. -- EIPs cannot be transferred across accounts. - -Bandwidth ---------- - -- A dedicated bandwidth can control how much data can be transferred using a single EIP. -- A shared bandwidth cannot control how much data can be transferred using a single EIP. Data transfer rate on EIPs cannot be customized. -- A shared bandwidth or dedicated bandwidth can only be used by resources owned by the same account. - -.. note:: - - - Inbound bandwidth is the bandwidth consumed when data is transferred from the Internet to the cloud. Outbound bandwidth is the bandwidth consumed when data is transferred from the cloud to the Internet. diff --git a/umn/source/service_overview/permissions.rst b/umn/source/service_overview/permissions.rst index 0a478cf..905be36 100644 --- a/umn/source/service_overview/permissions.rst +++ b/umn/source/service_overview/permissions.rst @@ -23,7 +23,7 @@ VPC is a project-level service deployed for specific regions. When you set **Sco You can grant permissions by using roles and policies. - Roles: A coarse-grained authorization strategy provided by IAM to assign permissions based on users' job responsibilities. Only a limited number of service-level roles are available for authorization. When you grant permissions using roles, you also need to attach dependent roles. Roles are not ideal for fine-grained authorization and least privilege access. -- Policies: A fine-grained authorization strategy that defines permissions required to perform operations on specific cloud resources under certain conditions. This type of authorization is more flexible and is ideal for least privilege access. For example, you can grant users only permission to manage VPCs of a certain type. A majority of fine-grained policies contain permissions for specific APIs, and permissions are defined using API actions. For the API actions supported by VPC, see `Permissions Policies and Supported Actions `__. +- Policies: A fine-grained authorization strategy that defines permissions required to perform operations on specific cloud resources under certain conditions. This type of authorization is more flexible and is ideal for least privilege access. For example, you can grant VPC users only the permissions for managing a certain type of resources. A majority of fine-grained policies contain permissions for specific APIs, and permissions are defined using API actions. For the API actions supported by VPC, see `Permissions Policies and Supported Actions `__. :ref:`Table 1 ` lists all the system-defined permissions for VPC. @@ -34,7 +34,7 @@ You can grant permissions by using roles and policies. +--------------------+-------------------------------------------------------------------------------------------------------------------------+-----------------------+------------------------------------------------------------------------------------------------------------------------------+ | Policy Name | Description | Policy Type | Dependencies | +====================+=========================================================================================================================+=======================+==============================================================================================================================+ - | VPC FullAccess | Full permissions for VPC | System-defined policy | None | + | VPC FullAccess | Full permissions for VPC | System-defined policy | To use the VPC flow log function, users must also have the **LTS ReadOnlyAccess** permission. | +--------------------+-------------------------------------------------------------------------------------------------------------------------+-----------------------+------------------------------------------------------------------------------------------------------------------------------+ | VPC ReadOnlyAccess | Read-only permissions on VPC. | System-defined policy | None | +--------------------+-------------------------------------------------------------------------------------------------------------------------+-----------------------+------------------------------------------------------------------------------------------------------------------------------+ @@ -49,79 +49,89 @@ You can grant permissions by using roles and policies. .. table:: **Table 2** Common operations supported by system-defined permissions - +--------------------------------------+--------------------+-------------------+----------------+ - | Operation | VPC ReadOnlyAccess | VPC Administrator | VPC FullAccess | - +======================================+====================+===================+================+ - | Creating a VPC | x | Y | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Modifying a VPC | x | Y | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Deleting a VPC | x | Y | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Viewing VPC information | Y | Y | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Creating a subnet | x | Y | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Viewing subnet information | Y | Y | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Modifying a subnet | x | Y | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Deleting a subnet | x | Y | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Creating a security group | x | x | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Viewing security group information | Y | x | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Modifying a security group | x | x | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Deleting a security group | x | x | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Adding a security group rule | x | x | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Viewing a security group rule | Y | x | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Modifying a security group rule | x | x | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Deleting a security group rule | x | x | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Creating a firewall | x | Y | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Viewing a firewall | Y | Y | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Modifying a firewall | x | Y | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Deleting a firewall | x | Y | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Adding a firewall rule | x | Y | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Modifying a firewall rule | x | Y | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Deleting a firewall rule | x | Y | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Creating a VPC peering connection | x | Y | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Modifying a VPC peering connection | x | Y | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Deleting a VPC peering connection | x | Y | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Creating a route table | x | Y | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Deleting a route table | x | Y | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Adding a route | x | Y | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Modifying a route | x | Y | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Deleting a route | x | Y | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Creating a VPC flow log | x | Y | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Viewing a VPC flow log | Y | Y | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Enabling or disabling a VPC flow log | x | Y | Y | - +--------------------------------------+--------------------+-------------------+----------------+ - | Deleting a VPC flow log | x | Y | Y | - +--------------------------------------+--------------------+-------------------+----------------+ + +--------------------------------------------+--------------------+-------------------+----------------+ + | Operation | VPC ReadOnlyAccess | VPC Administrator | VPC FullAccess | + +============================================+====================+===================+================+ + | Creating a VPC | x | Y | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Modifying a VPC | x | Y | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Deleting a VPC | x | Y | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Viewing VPC information | Y | Y | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Creating a subnet | x | Y | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Viewing subnet information | Y | Y | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Modifying a subnet | x | Y | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Deleting a subnet | x | Y | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Creating a security group | x | x | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Viewing security group information | Y | x | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Modifying a security group | x | x | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Deleting a security group | x | x | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Adding a security group rule | x | x | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Viewing a security group rule | Y | x | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Modifying a security group rule | x | x | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Deleting a security group rule | x | x | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Creating a firewall | x | Y | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Viewing a firewall | Y | Y | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Modifying a firewall | x | Y | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Deleting a firewall | x | Y | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Adding a firewall rule | x | Y | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Modifying a firewall rule | x | Y | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Deleting a firewall rule | x | Y | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Creating a VPC peering connection | x | Y | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Modifying a VPC peering connection | x | Y | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Deleting a VPC peering connection | x | Y | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Querying a VPC peering connection | Y | Y | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Accepting a VPC peering connection request | x | Y | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Rejecting a VPC peering connection request | x | Y | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Creating a route table | x | Y | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Deleting a route table | x | Y | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Modifying a route table | x | Y | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Associating a route table with a subnet | x | Y | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Adding a route | x | Y | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Modifying a route | x | Y | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Deleting a route | x | Y | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Creating a VPC flow log | x | Y | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Viewing a VPC flow log | Y | Y | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Enabling or disabling a VPC flow log | x | Y | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ + | Deleting a VPC flow log | x | Y | Y | + +--------------------------------------------+--------------------+-------------------+----------------+ Helpful Links ------------- diff --git a/umn/source/shared_bandwidth/adding_eips_to_a_shared_bandwidth.rst b/umn/source/shared_bandwidth/adding_eips_to_a_shared_bandwidth.rst index ab03f9d..e42c400 100644 --- a/umn/source/shared_bandwidth/adding_eips_to_a_shared_bandwidth.rst +++ b/umn/source/shared_bandwidth/adding_eips_to_a_shared_bandwidth.rst @@ -13,8 +13,7 @@ Add EIPs to a shared bandwidth and the EIPs can then share that bandwidth. You c Notes and Constraints --------------------- -- After an EIP is added to a shared bandwidth, the original bandwidth used by the EIP will become invalid and the EIP will start to use the shared bandwidth. -- The EIP's original dedicated bandwidth will be deleted. +- The type of EIPs must be the same as that of the shared bandwidth the EIPs to be added to. - Do not add EIPs of the dedicated load balancer type (**5_gray**) and other types to the same shared bandwidth. Otherwise, the bandwidth limit policy will not take effect. Procedure @@ -30,6 +29,10 @@ Procedure 5. In the shared bandwidth list, locate the row that contains the shared bandwidth that you want to add EIPs to. In the **Operation** column, choose **Add EIP**, and select the EIPs to be added. + .. note:: + + - After an EIP is added to a shared bandwidth, the dedicated bandwidth used by the EIP will become invalid and the EIP will start to use the shared bandwidth. The EIP's dedicated bandwidth will be deleted and will no longer be billed. + .. figure:: /_static/images/en-us_image_0000001211006359.png :alt: **Figure 1** Add EIP diff --git a/umn/source/shared_bandwidth/assigning_a_shared_bandwidth.rst b/umn/source/shared_bandwidth/assigning_a_shared_bandwidth.rst index 1faaa88..444ee65 100644 --- a/umn/source/shared_bandwidth/assigning_a_shared_bandwidth.rst +++ b/umn/source/shared_bandwidth/assigning_a_shared_bandwidth.rst @@ -43,11 +43,9 @@ Procedure | Enterprise Project | The enterprise project that the EIP belongs to. | default | | | | | | | An enterprise project facilitates project-level management and grouping of cloud resources and users. The name of the default project is **default**. | | - | | | | - | | For details about creating and managing enterprise projects, see the *Enterprise Management User Guide*. | | +-----------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ -#. Click **Create Now**. +#. Click **Assign Now**. .. |image1| image:: /_static/images/en-us_image_0141273034.png .. |image2| image:: /_static/images/en-us_image_0000001454059512.png diff --git a/umn/source/shared_bandwidth/deleting_a_shared_bandwidth.rst b/umn/source/shared_bandwidth/deleting_a_shared_bandwidth.rst index d2eae01..0ddff4a 100644 --- a/umn/source/shared_bandwidth/deleting_a_shared_bandwidth.rst +++ b/umn/source/shared_bandwidth/deleting_a_shared_bandwidth.rst @@ -23,9 +23,10 @@ Procedure 2. Click |image1| in the upper left corner and select the desired region and project. 3. Click |image2| in the upper left corner and choose **Network** > **Elastic IP**. + 4. In the navigation pane on the left, choose **Elastic IP and Bandwidth** > **Shared Bandwidths**. 5. In the shared bandwidth list, locate the row that contains the shared bandwidth you want to delete, click **More** in the **Operation** column, and then click **Delete**. -6. In the displayed dialog box, click **Yes**. +6. In the displayed dialog box, click **OK**. .. |image1| image:: /_static/images/en-us_image_0141273034.png .. |image2| image:: /_static/images/en-us_image_0000001454059512.png diff --git a/umn/source/shared_bandwidth/shared_bandwidth_overview.rst b/umn/source/shared_bandwidth/shared_bandwidth_overview.rst index 8be79a2..50704cc 100644 --- a/umn/source/shared_bandwidth/shared_bandwidth_overview.rst +++ b/umn/source/shared_bandwidth/shared_bandwidth_overview.rst @@ -7,6 +7,10 @@ Shared Bandwidth Overview A shared bandwidth can be shared by multiple EIPs and controls the data transfer rate on these EIPs in a centralized manner. All ECSs, BMSs, and load balancers that have EIPs bound in the same region can share a bandwidth. +.. note:: + + - A shared bandwidth cannot control how much data can be transferred using a single EIP. Data transfer rate on EIPs cannot be customized. + When you host a large number of applications on the cloud, if each EIP uses a bandwidth, a lot of bandwidths are required, increasing O&M workload. If all EIPs share the same bandwidth, VPCs and the region-level bandwidth can be managed in a unified manner, simplifying O&M statistics and network operations cost settlement. - Easy to Manage diff --git a/umn/source/virtual_ip_address/assigning_a_virtual_ip_address.rst b/umn/source/virtual_ip_address/assigning_a_virtual_ip_address.rst index b2dde32..7ee8266 100644 --- a/umn/source/virtual_ip_address/assigning_a_virtual_ip_address.rst +++ b/umn/source/virtual_ip_address/assigning_a_virtual_ip_address.rst @@ -14,20 +14,29 @@ Procedure --------- #. Log in to the management console. + #. Click |image1| in the upper left corner and select the desired region and project. + #. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + + The **Virtual Private Cloud** page is displayed. + #. In the navigation pane on the left, choose **Virtual Private Cloud** > **Subnets**. + #. In the subnet list, click the name of the subnet where a virtual IP address is to be assigned. + #. Click the **IP Addresses** tab and click **Assign Virtual IP Address**. + #. Select a virtual IP address assignment mode. - **Automatic**: The system assigns an IP address automatically. - **Manual**: You can specify an IP address. #. Select **Manual** and enter a virtual IP address. + #. Click **OK**. You can then query the assigned virtual IP address in the IP address list. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001554010645.png +.. |image2| image:: /_static/images/en-us_image_0000001626897562.png diff --git a/umn/source/virtual_ip_address/binding_a_virtual_ip_address_to_an_eip.rst b/umn/source/virtual_ip_address/binding_a_virtual_ip_address_to_an_eip.rst index 2cf1b8c..a10a09a 100644 --- a/umn/source/virtual_ip_address/binding_a_virtual_ip_address_to_an_eip.rst +++ b/umn/source/virtual_ip_address/binding_a_virtual_ip_address_to_an_eip.rst @@ -19,10 +19,18 @@ Procedure --------- #. Log in to the management console. + #. Click |image1| in the upper left corner and select the desired region and project. -#. On the console homepage, under **Network**, click **Elastic IP**. + +#. Click |image2| in the upper left corner and choose **Network** > **Elastic IP**. + + The EIP list page is displayed. + #. Locate the row that contains the EIP to be bound to the virtual IP address, and click **Bind** in the **Operation** column. + #. In the **Bind EIP** dialog box, set **Instance Type** to **Virtual IP address**. + #. In the virtual IP address list, select the virtual IP address to be bound and click **OK**. .. |image1| image:: /_static/images/en-us_image_0141273034.png +.. |image2| image:: /_static/images/en-us_image_0000001626578706.png diff --git a/umn/source/virtual_ip_address/binding_a_virtual_ip_address_to_an_eip_or_ecs.rst b/umn/source/virtual_ip_address/binding_a_virtual_ip_address_to_an_eip_or_ecs.rst index 2edbaf5..e67f597 100644 --- a/umn/source/virtual_ip_address/binding_a_virtual_ip_address_to_an_eip_or_ecs.rst +++ b/umn/source/virtual_ip_address/binding_a_virtual_ip_address_to_an_eip_or_ecs.rst @@ -10,20 +10,32 @@ Scenarios You can bind a virtual IP address to an EIP so that you can access the ECSs bound with the same virtual IP address from the Internet. These ECSs can work in the active/standby mode to improve fault tolerance. +Notes and Constraints +--------------------- + +- Each virtual IP address can be bound to only one EIP. + Procedure --------- #. Log in to the management console. + #. Click |image1| in the upper left corner and select the desired region and project. + #. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + + The **Virtual Private Cloud** page is displayed. + #. In the navigation pane on the left, choose **Virtual Private Cloud** > **Subnets**. + #. In the subnet list, click the name of the subnet that the virtual IP address belongs to. + #. Click the **IP Addresses** tab. - To bind a virtual IP address to an EIP, locate the row that contains the virtual IP address and click **Bind to EIP** in the **Operation** column. - To bind a virtual IP address to an ECS, locate the row that contains the virtual IP address and click **Bind to Server** in the **Operation** column. -#. Select the desired EIP, or ECS and its NIC. +#. Select the EIP or ECS to be bound. .. note:: @@ -129,7 +141,7 @@ Procedure In the command output, **IPv4 Address** is the virtual IP address 10.0.0.154, indicating that the virtual IP address of the ECS NIC has been correctly configured. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001553930581.png +.. |image2| image:: /_static/images/en-us_image_0000001626738526.png .. |image3| image:: /_static/images/en-us_image_0000001281210233.png .. |image4| image:: /_static/images/en-us_image_0000001237328110.png .. |image5| image:: /_static/images/en-us_image_0000001237013856.png diff --git a/umn/source/virtual_ip_address/disabling_ip_forwarding_on_the_standby_ecs.rst b/umn/source/virtual_ip_address/disabling_ip_forwarding_on_the_standby_ecs.rst new file mode 100644 index 0000000..02c7785 --- /dev/null +++ b/umn/source/virtual_ip_address/disabling_ip_forwarding_on_the_standby_ecs.rst @@ -0,0 +1,61 @@ +:original_name: vpc_vip_0007.html + +.. _vpc_vip_0007: + +Disabling IP Forwarding on the Standby ECS +========================================== + +Scenarios +--------- + +If a virtual IP address is used in an active/standby scenario, disable IP forwarding on the standby ECS. + +Linux +----- + +#. Log in to the ECS. + +#. Run the following command to switch to user **root**: + + **su root** + +#. Check whether IP forwarding is enabled: + + **cat /proc/sys/net/ipv4/ip_forward** + + In the command output, **1** indicates it is enabled, and **0** indicates it is disabled. The default value is **0**. + + - If **1** is displayed, go to :ref:`4 `. + - If **0** is displayed, no further action is required. + +#. .. _vpc_vip_0007__en-us_topic_0206027322_li97125518364: + + Use either of the following methods to modify the configuration file: + + - Method 1: Use the vi editor to open the **/etc/sysctl.conf** file, change the value of **net.ipv4.ip_forward** to **0**, and enter **:wq** to save the change and exit. + + - Method 2: Use the **sed** command. An example command is as follows: + + **sed -i '/net.ipv4.ip_forward/s/1/0/g' /etc/sysctl.conf** + +#. Make the modification take effect: + + **sysctl -p /etc/sysctl.conf** + +Windows +------- + +#. Log in to the ECS. + +#. Open **Command Prompt** and run the following command: + + **ipconfig/all** + + In the command output, if the value of **IP Routing Enabled** is **No**, the IP forwarding function is disabled. + +#. Press **Windows** and **R** keys together to open the **Run** box, and enter **regedit** to open the **Registry Editor**. + +#. Set the value of **IPEnableRouter** under **HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters** to **0**. + + - If the value is set to **0**, IP forwarding will be disabled. + - If the value is set to **1**, IP forwarding will be enabled. diff --git a/umn/source/virtual_ip_address/disabling_source_and_destination_check_ha_load_balancing_cluster_scenario.rst b/umn/source/virtual_ip_address/disabling_source_and_destination_check_ha_load_balancing_cluster_scenario.rst index d8c4e5a..6b1756c 100644 --- a/umn/source/virtual_ip_address/disabling_source_and_destination_check_ha_load_balancing_cluster_scenario.rst +++ b/umn/source/virtual_ip_address/disabling_source_and_destination_check_ha_load_balancing_cluster_scenario.rst @@ -5,12 +5,21 @@ Disabling Source and Destination Check (HA Load Balancing Cluster Scenario) =========================================================================== +Scenarios +--------- + +If a virtual IP address is used in an HA load balancing cluster, you need to disable source/destination check for ECS NICs. + +Procedure +--------- + #. Log in to the management console. #. Click |image1| in the upper left corner and select the desired region and project. -#. Under **Computing**, click **Elastic Cloud Server**. +#. In the upper left corner of the page, click |image2|. In the service list, choose **Computing** > **Elastic Cloud Server**. #. In the ECS list, click the ECS name. #. On the displayed ECS details page, click the **NICs** tab. #. Click the IP address to view the NIC details. #. Check that **Source/Destination Check** is disabled. .. |image1| image:: /_static/images/en-us_image_0141273034.png +.. |image2| image:: /_static/images/en-us_image_0000001681512581.png diff --git a/umn/source/virtual_ip_address/index.rst b/umn/source/virtual_ip_address/index.rst index fb460b4..92b626f 100644 --- a/umn/source/virtual_ip_address/index.rst +++ b/umn/source/virtual_ip_address/index.rst @@ -12,6 +12,7 @@ Virtual IP Address - :ref:`Using a VPN to Access a Virtual IP Address ` - :ref:`Using a Direct Connect Connection to Access the Virtual IP Address ` - :ref:`Using a VPC Peering Connection to Access the Virtual IP Address ` +- :ref:`Disabling IP Forwarding on the Standby ECS ` - :ref:`Disabling Source and Destination Check (HA Load Balancing Cluster Scenario) ` - :ref:`Unbinding a Virtual IP Address from an Instance ` - :ref:`Unbinding a Virtual IP Address from an EIP ` @@ -28,6 +29,7 @@ Virtual IP Address using_a_vpn_to_access_a_virtual_ip_address using_a_direct_connect_connection_to_access_the_virtual_ip_address using_a_vpc_peering_connection_to_access_the_virtual_ip_address + disabling_ip_forwarding_on_the_standby_ecs disabling_source_and_destination_check_ha_load_balancing_cluster_scenario unbinding_a_virtual_ip_address_from_an_instance unbinding_a_virtual_ip_address_from_an_eip diff --git a/umn/source/virtual_ip_address/releasing_a_virtual_ip_address.rst b/umn/source/virtual_ip_address/releasing_a_virtual_ip_address.rst index 3a6b52b..3f65990 100644 --- a/umn/source/virtual_ip_address/releasing_a_virtual_ip_address.rst +++ b/umn/source/virtual_ip_address/releasing_a_virtual_ip_address.rst @@ -22,7 +22,9 @@ If you want to release a virtual IP address that is being used by a resource, re +-----------------------------------------------------------------------------------------------------------------------------------+-------------------------------------------------------------------------------------------------------------------------------------+ | Prompts | Cause Analysis and Solution | +===================================================================================================================================+=====================================================================================================================================+ - | This operation cannot be performed because the IP address is bound to an instance or an EIP. Unbind the IP address and try again. | This virtual IP address is being by an EIP or an ECS. Unbind the virtual IP address first. | + | This operation cannot be performed because the IP address is bound to an instance or an EIP. Unbind the IP address and try again. | This virtual IP address is being by an EIP or an ECS. | + | | | + | | Unbind the virtual IP address first. | | | | | | - EIP: :ref:`Unbinding a Virtual IP Address from an EIP ` | | | - ECS: :ref:`Unbinding a Virtual IP Address from an Instance ` | @@ -41,6 +43,8 @@ Procedure #. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + #. In the navigation pane on the left, choose **Virtual Private Cloud** > **Subnets**. #. Click the name of the subnet that the virtual IP address belongs to. @@ -52,4 +56,4 @@ Procedure #. Confirm the information and click **Yes**. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001553650753.png +.. |image2| image:: /_static/images/en-us_image_0000001675378241.png diff --git a/umn/source/virtual_ip_address/unbinding_a_virtual_ip_address_from_an_eip.rst b/umn/source/virtual_ip_address/unbinding_a_virtual_ip_address_from_an_eip.rst index 5478db5..7b0881d 100644 --- a/umn/source/virtual_ip_address/unbinding_a_virtual_ip_address_from_an_eip.rst +++ b/umn/source/virtual_ip_address/unbinding_a_virtual_ip_address_from_an_eip.rst @@ -19,6 +19,8 @@ Procedure #. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + #. In the navigation pane on the left, choose **Virtual Private Cloud** > **Subnets**. The **Subnets** page is displayed. @@ -38,4 +40,4 @@ Procedure #. Confirm the information and click **Yes**. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001503170970.png +.. |image2| image:: /_static/images/en-us_image_0000001675258381.png diff --git a/umn/source/virtual_ip_address/unbinding_a_virtual_ip_address_from_an_instance.rst b/umn/source/virtual_ip_address/unbinding_a_virtual_ip_address_from_an_instance.rst index dd550d6..44b9790 100644 --- a/umn/source/virtual_ip_address/unbinding_a_virtual_ip_address_from_an_instance.rst +++ b/umn/source/virtual_ip_address/unbinding_a_virtual_ip_address_from_an_instance.rst @@ -19,6 +19,8 @@ Procedure #. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + #. In the navigation pane on the left, choose **Virtual Private Cloud** > **Subnets**. The **Subnets** page is displayed. @@ -52,4 +54,4 @@ Procedure c. Confirm the information and click **Yes**. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001503170974.png +.. |image2| image:: /_static/images/en-us_image_0000001675618277.png diff --git a/umn/source/virtual_ip_address/virtual_ip_address_overview.rst b/umn/source/virtual_ip_address/virtual_ip_address_overview.rst index 79fff81..ea261d6 100644 --- a/umn/source/virtual_ip_address/virtual_ip_address_overview.rst +++ b/umn/source/virtual_ip_address/virtual_ip_address_overview.rst @@ -64,27 +64,4 @@ Notes and Constraints --------------------- - Virtual IP addresses are not recommended when multiple NICs in the same subnet are configured on an ECS. It is too easy for there to be route conflicts on the ECS, which would cause communication failure using the virtual IP address. -- IP forwarding must be disabled on the standby ECS. Perform the following operations to confirm whether the IP forwarding is disabled on the standby ECS: - - #. Log in to standby ECS and run the following command to check whether the IP forwarding is enabled: - - cat /proc/sys/net/ipv4/ip_forward - - In the command output, **1** indicates it is enabled, and **0** indicates it is disabled. The default value is **0**. - - - If the command output is **1**, perform :ref:`2 ` and :ref:`3 ` to disable the IP forwarding. - - If the command output is **0**, no further action is required. - - #. .. _vpc_vip_0001__en-us_topic_0206027322_en-us_topic_0095139658_li1473585332417: - - Use the vi editor to open the **/etc/sysctl.conf** file, change the value of **net.ipv4.ip_forward** to **0**, and enter **:wq** to save the change and exit. You can also use the **sed** command to modify the configuration. A command example is as follows: - - sed -i '/net.ipv4.ip_forward/s/1/0/g' /etc/sysctl.conf - - #. .. _vpc_vip_0001__en-us_topic_0206027322_en-us_topic_0095139658_li88984711254: - - Run the following command to make the change take effect: - - sysctl -p /etc/sysctl.conf - -- Each virtual IP address can be bound to only one EIP. +- If a virtual IP address is used in an active/standby scenario, disable IP forwarding on the standby ECS. For details, see :ref:`Disabling IP Forwarding on the Standby ECS `. diff --git a/umn/source/vpc_and_subnet/subnet/creating_a_subnet_for_the_vpc.rst b/umn/source/vpc_and_subnet/subnet/creating_a_subnet_for_the_vpc.rst index bef9943..0f6214d 100644 --- a/umn/source/vpc_and_subnet/subnet/creating_a_subnet_for_the_vpc.rst +++ b/umn/source/vpc_and_subnet/subnet/creating_a_subnet_for_the_vpc.rst @@ -21,6 +21,8 @@ Procedure 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + 4. In the navigation pane on the left, choose **Virtual Private Cloud** > **Subnets**. 5. Click **Create Subnet**. @@ -37,33 +39,37 @@ Procedure .. table:: **Table 1** Parameter descriptions - +------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Parameter | Description | Example Value | - +========================+=============================================================================================================================================================================================================================================+=======================+ - | VPC | The VPC for which you want to create a subnet. | ``-`` | - +------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Name | The subnet name. | Subnet | - | | | | - | | The name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces. | | - +------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | CIDR Block | The CIDR block for the subnet. This value must be within the VPC CIDR block. | 192.168.0.0/24 | - +------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Associated Route Table | The default route table to which the subnet will be associated. You can change the route table to a custom route table on the **Subnets** page. | Default | - +------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Gateway | The gateway address of the subnet. | 192.168.0.1 | - +------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | DNS Server Address | By default, two DNS server addresses are configured. You can change them if necessary. A maximum of five DNS server addresses can be configured. Multiple IP addresses must be separated using commas (,). | 100.125.x.x | - +------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | NTP Server Address | The IP address of the NTP server. This parameter is optional. | 192.168.2.1 | - | | | | - | | You can configure the NTP server IP addresses to be added to the subnet as required. The IP addresses are added in addition to the default NTP server addresses. If this parameter is left empty, no IP address of the NTP server is added. | | - | | | | - | | A maximum of four IP addresses can be configured. Multiple IP addresses must be separated using commas (,). | | - +------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Tag | The subnet tag, which consists of a key and value pair. You can add a maximum of 20 tags to each subnet. | - Key: subnet_key1 | - | | | - Value: subnet-01 | - | | The tag key and value must meet the requirements listed in :ref:`Table 2 `. | | - +------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + +--------------------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Parameter | Description | Example Value | + +======================================+=============================================================================================================================================================================================================================================================+=======================+ + | VPC | The VPC for which you want to create a subnet. | ``-`` | + +--------------------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Name | The subnet name. | Subnet | + | | | | + | | The name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces. | | + +--------------------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | CIDR Block | The CIDR block for the subnet. This value must be within the VPC CIDR block. | 192.168.0.0/24 | + +--------------------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Associated Route Table | The default route table to which the subnet will be associated. You can change the route table to a custom route table on the **Subnets** page. | Default | + +--------------------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Advanced Settings/Gateway | The gateway address of the subnet. | 192.168.0.1 | + +--------------------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Advanced Settings/DNS Server Address | By default, two DNS server addresses are configured. You can change them if necessary. A maximum of five DNS server addresses can be configured. Multiple IP addresses must be separated using commas (,). | 100.125.x.x | + +--------------------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Advanced Settings/NTP Server Address | The IP address of the NTP server. This parameter is optional. | 192.168.2.1 | + | | | | + | | You can configure the NTP server IP addresses to be added to the subnet as required. The IP addresses are added in addition to the default NTP server addresses. If you do not specify this parameter, no additional NTP server IP addresses will be added. | | + | | | | + | | A maximum of four IP addresses can be configured. Multiple IP addresses must be separated using commas (,). | | + +--------------------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Advanced Settings/Tag | The subnet tag, which consists of a key and value pair. You can add a maximum of 20 tags to each subnet. | - Key: subnet_key1 | + | | | - Value: subnet-01 | + | | The tag key and value must meet the requirements listed in :ref:`Table 2 `. | | + +--------------------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + | Advanced Settings/Description | Supplementary information about the subnet. This parameter is optional. | ``-`` | + | | | | + | | The subnet description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | + +--------------------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ .. _en-us_topic_0013748726__table42131827173915: @@ -107,4 +113,4 @@ When a subnet is created, there are five reserved IP addresses, which cannot be If you configured the default settings under **Advanced Settings** during subnet creation, the reserved IP addresses may be different from the default ones, but there will still be five of them. The specific addresses depend on your subnet settings. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001675254021.png diff --git a/umn/source/vpc_and_subnet/subnet/deleting_a_subnet.rst b/umn/source/vpc_and_subnet/subnet/deleting_a_subnet.rst index 4e7e0c7..56af1cd 100644 --- a/umn/source/vpc_and_subnet/subnet/deleting_a_subnet.rst +++ b/umn/source/vpc_and_subnet/subnet/deleting_a_subnet.rst @@ -26,6 +26,8 @@ Procedure #. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + #. In the navigation pane on the left, choose **Virtual Private Cloud** > **Subnets**. The **Subnets** page is displayed. @@ -41,4 +43,4 @@ Procedure If a VPC cannot be deleted, a message will be displayed on the console. Delete the resources that are in the VPC by referring to :ref:`Why Can't I Delete My VPCs and Subnets? ` .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001626574366.png diff --git a/umn/source/vpc_and_subnet/subnet/exporting_subnet_list.rst b/umn/source/vpc_and_subnet/subnet/exporting_subnet_list.rst index 4b99717..edab6d6 100644 --- a/umn/source/vpc_and_subnet/subnet/exporting_subnet_list.rst +++ b/umn/source/vpc_and_subnet/subnet/exporting_subnet_list.rst @@ -19,6 +19,8 @@ Procedure #. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + #. In the navigation pane on the left, choose **Virtual Private Cloud** > **Subnets**. The **Subnets** page is displayed. @@ -28,5 +30,5 @@ Procedure The system will automatically export information about all subnets under your account in the current region as an Excel file to a local directory. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001675613941.png .. |image3| image:: /_static/images/en-us_image_0000001221842468.png diff --git a/umn/source/vpc_and_subnet/subnet/managing_subnet_tags.rst b/umn/source/vpc_and_subnet/subnet/managing_subnet_tags.rst index 519f58f..81a6a3e 100644 --- a/umn/source/vpc_and_subnet/subnet/managing_subnet_tags.rst +++ b/umn/source/vpc_and_subnet/subnet/managing_subnet_tags.rst @@ -8,7 +8,9 @@ Managing Subnet Tags Scenarios --------- -A subnet tag identifies a subnet. Tags can be added to subnets to facilitate subnet identification and administration. You can add a tag to a subnet when creating the subnet, or you can add a tag to a created subnet on the subnet details page. A maximum of 20 tags can be added to each subnet. +You can add tags to subnets to help you identify and organize them. + +You can add a tag to a subnet when creating the subnet, or you can add a tag to a created subnet on the subnet details page. A maximum of 20 tags can be added to each subnet. A tag consists of a key and value pair. :ref:`Table 1 ` lists the tag key and value requirements. @@ -49,23 +51,19 @@ Procedure #. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + #. In the navigation pane on the left, choose **Virtual Private Cloud** > **Subnets**. The **Subnets** page is displayed. -#. In the upper right corner of the subnet list, click **Search by Tag**. - -#. Enter the tag key of the subnet to be queried. - - Both the tag key and value must be specified. The system automatically displays the subnets you are looking for if both the tag key and value are matched. - #. Click **+** to add another tag key and value. You can add multiple tag keys and values to refine your search results. If you add more than one tag to search for subnets, the subnets containing all specified tags will be displayed. -#. Click **Search**. +#. In the search box above the subnet list, click the search box. - The system displays the subnets you are looking for based on the entered tag keys and values. + Click the tag key and then the value as required. The system filters resources based on the tag you select. **Add, delete, edit, and view tags on the Tags tab of a subnet.** @@ -75,6 +73,8 @@ Procedure #. Click |image4| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + #. In the navigation pane on the left, choose **Virtual Private Cloud** > **Subnets**. The **Subnets** page is displayed. @@ -100,6 +100,6 @@ Procedure Locate the row that contains the tag you want to delete, and click **Delete** in the **Operation** column. In the displayed dialog box, click **Yes**. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001675373909.png .. |image3| image:: /_static/images/en-us_image_0141273034.png -.. |image4| image:: /_static/images/en-us_image_0000001500905066.png +.. |image4| image:: /_static/images/en-us_image_0000001626894094.png diff --git a/umn/source/vpc_and_subnet/subnet/modifying_a_subnet.rst b/umn/source/vpc_and_subnet/subnet/modifying_a_subnet.rst index 5b64a38..923f7a4 100644 --- a/umn/source/vpc_and_subnet/subnet/modifying_a_subnet.rst +++ b/umn/source/vpc_and_subnet/subnet/modifying_a_subnet.rst @@ -19,7 +19,9 @@ Procedure 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. -4. Locate the row that contains the target VPC and click the number in the **Subnets** column. + The **Virtual Private Cloud** page is displayed. + +4. In the navigation pane on the left, choose **Virtual Private Cloud** > **Subnets**. The **Subnets** page is displayed. @@ -44,7 +46,7 @@ Procedure +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ | NTP Server Address | The IP address of the NTP server. This parameter is optional. | 192.168.2.1 | | | | | - | | You can configure the NTP server IP addresses to be added to the subnet as required. The IP addresses are added in addition to the default NTP server addresses. If this parameter is left empty, you do not add an NTP server IP address. | | + | | You can configure the NTP server IP addresses to be added to the subnet as required. The IP addresses are added in addition to the default NTP server addresses. If you do not specify this parameter, no additional NTP server IP addresses will be added. | | | | | | | | A maximum of four unique NTP server IP addresses can be configured. Multiple IP addresses must be separated by a comma (,). If you add or change the NTP server addresses of a subnet, you need to renew the DHCP lease for or restart all the ECSs in the subnet to make the change take effect immediately. If the NTP server addresses have been cleared out, restarting the ECSs will not help. You must renew the DHCP lease for all ECSs to make the change take effect immediately. | | +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ @@ -56,5 +58,5 @@ Procedure 7. Click **OK**. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001626574370.png .. |image3| image:: /_static/images/en-us_image_0000001337710801.png diff --git a/umn/source/vpc_and_subnet/subnet/viewing_and_deleting_resources_in_a_subnet.rst b/umn/source/vpc_and_subnet/subnet/viewing_and_deleting_resources_in_a_subnet.rst index 6aa0cce..059ca5a 100644 --- a/umn/source/vpc_and_subnet/subnet/viewing_and_deleting_resources_in_a_subnet.rst +++ b/umn/source/vpc_and_subnet/subnet/viewing_and_deleting_resources_in_a_subnet.rst @@ -25,6 +25,8 @@ Procedure #. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + #. In the navigation pane on the left, choose **Virtual Private Cloud** > **Subnets**. The **Subnets** page is displayed. @@ -35,8 +37,14 @@ Procedure #. On the **Summary** page, view the resources in the subnet. - a. In the **Resources** area, view the ECSs, BMSs, network interfaces, and load balancers in the subnet. - b. In the **Networking Components** area, view the NAT gateways in the subnet. + a. In the **VPC Resources** area, view the quantities of resources, such as ECSs, BMSs, network interfaces, and load balancers, in the subnet. Click the resource quantity with a hyperlink to view the resources in the subnet. + b. In the **Networking Components** area on the right of the page, view the NAT gateway, route table, and subnet. + + + .. figure:: /_static/images/en-us_image_0000001678437642.png + :alt: **Figure 1** Viewing resources in a subnet + + **Figure 1** Viewing resources in a subnet #. Delete resources from the subnet. @@ -63,7 +71,7 @@ Procedure +-----------------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------+ | Load balancer | You can directly switch to load balancers from the subnet details page. | | | | - | | a. Click the load balancer quantity in the **Resources** area. | + | | a. Click the load balancer quantity. | | | | | | The load balancer list is displayed. | | | | @@ -81,5 +89,5 @@ Procedure +-----------------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------+ .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001675413829.png .. |image3| image:: /_static/images/en-us_image_0000001461263993.png diff --git a/umn/source/vpc_and_subnet/subnet/viewing_ip_addresses_in_a_subnet.rst b/umn/source/vpc_and_subnet/subnet/viewing_ip_addresses_in_a_subnet.rst index 562b384..2707ded 100644 --- a/umn/source/vpc_and_subnet/subnet/viewing_ip_addresses_in_a_subnet.rst +++ b/umn/source/vpc_and_subnet/subnet/viewing_ip_addresses_in_a_subnet.rst @@ -31,6 +31,8 @@ Procedure #. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + #. In the navigation pane on the left, choose **Virtual Private Cloud** > **Subnets**. The **Subnets** page is displayed. @@ -50,4 +52,4 @@ Follow-up Operations If you want to view and delete the resources in a subnet, refer to :ref:`Why Can't I Delete My VPCs and Subnets? ` .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001675254017.png diff --git a/umn/source/vpc_and_subnet/vpc/creating_a_vpc.rst b/umn/source/vpc_and_subnet/vpc/creating_a_vpc.rst index e013768..fe8e312 100644 --- a/umn/source/vpc_and_subnet/vpc/creating_a_vpc.rst +++ b/umn/source/vpc_and_subnet/vpc/creating_a_vpc.rst @@ -21,6 +21,8 @@ Procedure #. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + #. Click **Create VPC**. #. On the **Create VPC** page, set parameters as prompted. @@ -29,91 +31,89 @@ Procedure .. table:: **Table 1** VPC parameter descriptions - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Category | Parameter | Description | Example Value | - +=====================================+========================+=========================================================================================================================================================================================================================================================================================================+=====================+ - | Basic Information | Region | Regions are geographic areas that are physically isolated from each other. The networks inside different regions are not connected to each other, so resources cannot be shared across different regions. For lower network latency and faster access to your resources, select the region nearest you. | eu-de | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Basic Information | Name | The VPC name. | VPC-001 | - | | | | | - | | | The name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces. | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Basic Information | CIDR Block | The CIDR block of the VPC. The CIDR block of a subnet can be the same as the CIDR block for the VPC (for a single subnet in the VPC) or a subset of the CIDR block for the VPC (for multiple subnets in the VPC). | 192.168.0.0/16 | - | | | | | - | | | The following CIDR blocks are supported: | | - | | | | | - | | | 10.0.0.0/8-24 | | - | | | | | - | | | 172.16.0.0/12-24 | | - | | | | | - | | | 192.168.0.0/16-24 | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Basic Information | Enterprise Project | The enterprise project to which the VPC belongs. | default | - | | | | | - | | | An enterprise project facilitates project-level management and grouping of cloud resources and users. The name of the default project is **default**. | | - | | | | | - | | | For details about creating and managing enterprise projects, see the *Enterprise Management User Guide*. | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Basic Information/Advanced Settings | Tag | The VPC tag, which consists of a key and value pair. You can add a maximum of 20 tags to each VPC. | - Key: vpc_key1 | - | | | | - Value: vpc-01 | - | | | The tag key and value must meet the requirements listed in :ref:`Table 2 `. | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Basic Information/Advanced Settings | Description | Supplementary information about the VPC. This parameter is optional. | N/A | - | | | | | - | | | The VPC description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Default Subnet | Name | The subnet name. | Subnet | - | | | | | - | | | The name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces. | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Default Subnet | CIDR Block | The CIDR block for the subnet. This value must be within the VPC CIDR block. | 192.168.0.0/24 | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Default Subnet | Associated Route Table | The default route table to which the subnet will be associated. You can change the route table to a custom route table on the **Subnets** page. | Default | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Default Subnet/Advanced Settings | Gateway | The gateway address of the subnet. | 192.168.0.1 | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Default Subnet/Advanced Settings | DNS Server Address | By default, two DNS server addresses are configured. You can change them as required. A maximum of five DNS server addresses can be configured. Multiple IP addresses must be separated using commas (,). | 100.125.x.x | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Default Subnet/Advanced Settings | NTP Server Address | The IP address of the NTP server. This parameter is optional. | 192.168.2.1 | - | | | | | - | | | You can configure the NTP server IP addresses to be added to the subnet as required. The IP addresses are added in addition to the default NTP server addresses. If this parameter is left empty, no IP address of the NTP server is added. | | - | | | | | - | | | A maximum of four IP addresses can be configured. Multiple IP addresses must be separated using commas (,). | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Default Subnet/Advanced Settings | Tag | The subnet tag, which consists of a key and value pair. You can add a maximum of 20 tags to each subnet. | - Key: subnet_key1 | - | | | | - Value: subnet-01 | - | | | The tag key and value must meet the requirements listed in :ref:`Table 3 `. | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ - | Default Subnet/Advanced Settings | Description | Supplementary information about the subnet. This parameter is optional. | N/A | - | | | | | - | | | The subnet description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | - +-------------------------------------+------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Category | Parameter | Description | Example Value | + +=====================================+========================+=============================================================================================================================================================================================================================================================+=====================+ + | Basic Information | Region | Select the region nearest to you to ensure the lowest latency possible. | eu-de | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Basic Information | Name | The VPC name. | VPC-001 | + | | | | | + | | | The name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces. | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Basic Information | IPv4 CIDR Block | The CIDR block of the VPC. The CIDR block of a subnet can be the same as the CIDR block for the VPC (for a single subnet in the VPC) or a subset of the CIDR block for the VPC (for multiple subnets in the VPC). | 192.168.0.0/16 | + | | | | | + | | | The following CIDR blocks are supported: | | + | | | | | + | | | 10.0.0.0/8-24 | | + | | | | | + | | | 172.16.0.0/12-24 | | + | | | | | + | | | 192.168.0.0/16-24 | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Basic Information | Enterprise Project | The enterprise project to which the VPC belongs. | default | + | | | | | + | | | An enterprise project facilitates project-level management and grouping of cloud resources and users. The name of the default project is **default**. | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Basic Information/Advanced Settings | Tag | The VPC tag, which consists of a key and value pair. You can add a maximum of 20 tags to each VPC. | - Key: vpc_key1 | + | | | | - Value: vpc-01 | + | | | The tag key and value must meet the requirements listed in :ref:`Table 2 `. | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Basic Information/Advanced Settings | Description | Supplementary information about the VPC. This parameter is optional. | N/A | + | | | | | + | | | The VPC description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Default Subnet | Name | The subnet name. | Subnet | + | | | | | + | | | The name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces. | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Default Subnet | CIDR Block | The CIDR block for the subnet. This value must be within the VPC CIDR block. | 192.168.0.0/24 | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Default Subnet | Associated Route Table | The default route table to which the subnet will be associated. You can change the route table to a custom route table on the **Subnets** page. | Default | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Default Subnet/Advanced Settings | Gateway | The gateway address of the subnet. | 192.168.0.1 | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Default Subnet/Advanced Settings | DNS Server Address | By default, two DNS server addresses are configured. You can change them as required. A maximum of five DNS server addresses can be configured. Multiple IP addresses must be separated using commas (,). | 100.125.x.x | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Default Subnet/Advanced Settings | NTP Server Address | The IP address of the NTP server. This parameter is optional. | 192.168.2.1 | + | | | | | + | | | You can configure the NTP server IP addresses to be added to the subnet as required. The IP addresses are added in addition to the default NTP server addresses. If you do not specify this parameter, no additional NTP server IP addresses will be added. | | + | | | | | + | | | A maximum of four IP addresses can be configured. Multiple IP addresses must be separated using commas (,). | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Default Subnet/Advanced Settings | Tag | The subnet tag, which consists of a key and value pair. You can add a maximum of 20 tags to each subnet. | - Key: subnet_key1 | + | | | | - Value: subnet-01 | + | | | The tag key and value must meet the requirements listed in :ref:`Table 3 `. | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ + | Default Subnet/Advanced Settings | Description | Supplementary information about the subnet. This parameter is optional. | N/A | + | | | | | + | | | The subnet description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | + +-------------------------------------+------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+---------------------+ .. _en-us_topic_0013935842__table248245914136: .. table:: **Table 2** VPC tag key and value requirements - +-----------------------+----------------------------------------------------------------------------+-----------------------+ - | Parameter | Requirements | Example Value | - +=======================+============================================================================+=======================+ - | Key | - Cannot be left blank. | vpc_key1 | - | | - Must be unique for the same VPC and can be the same for different VPCs. | | - | | - Can contain a maximum of 36 characters. | | - | | - Can contain only the following character types: | | - | | | | - | | - Uppercase letters | | - | | - Lowercase letters | | - | | - Digits | | - | | - Special characters, including hyphens (-) and underscores (_) | | - +-----------------------+----------------------------------------------------------------------------+-----------------------+ - | Value | - Can contain a maximum of 43 characters. | vpc-01 | - | | - Can contain only the following character types: | | - | | | | - | | - Uppercase letters | | - | | - Lowercase letters | | - | | - Digits | | - | | - Special characters, including hyphens (-) and underscores (_) | | - +-----------------------+----------------------------------------------------------------------------+-----------------------+ + +-----------------------+------------------------------------------------------------------------+-----------------------+ + | Parameter | Requirements | Example Value | + +=======================+========================================================================+=======================+ + | Key | - Cannot be left blank. | vpc_key1 | + | | - Must be unique for each VPC and can be the same for different VPCs. | | + | | - Can contain a maximum of 36 characters. | | + | | - Can contain only the following character types: | | + | | | | + | | - Uppercase letters | | + | | - Lowercase letters | | + | | - Digits | | + | | - Special characters, including hyphens (-) and underscores (_) | | + +-----------------------+------------------------------------------------------------------------+-----------------------+ + | Value | - Can contain a maximum of 43 characters. | vpc-01 | + | | - Can contain only the following character types: | | + | | | | + | | - Uppercase letters | | + | | - Lowercase letters | | + | | - Digits | | + | | - Special characters, including hyphens (-) and underscores (_) | | + +-----------------------+------------------------------------------------------------------------+-----------------------+ .. _en-us_topic_0013935842__table6536185812515: diff --git a/umn/source/vpc_and_subnet/vpc/deleting_a_vpc.rst b/umn/source/vpc_and_subnet/vpc/deleting_a_vpc.rst index bdc315a..821ac76 100644 --- a/umn/source/vpc_and_subnet/vpc/deleting_a_vpc.rst +++ b/umn/source/vpc_and_subnet/vpc/deleting_a_vpc.rst @@ -26,6 +26,8 @@ Procedure #. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + #. On the **Virtual Private Cloud** page, locate the row that contains the VPC to be deleted and click **Delete** in the **Operation** column. A confirmation dialog box is displayed. @@ -37,4 +39,4 @@ Procedure If a VPC cannot be deleted, a message will be displayed on the console. Delete the resources that are in the VPC by referring to :ref:`Why Can't I Delete My VPCs and Subnets? ` .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001626734174.png diff --git a/umn/source/vpc_and_subnet/vpc/exporting_vpc_list.rst b/umn/source/vpc_and_subnet/vpc/exporting_vpc_list.rst index 350fa18..5371b5a 100644 --- a/umn/source/vpc_and_subnet/vpc/exporting_vpc_list.rst +++ b/umn/source/vpc_and_subnet/vpc/exporting_vpc_list.rst @@ -8,7 +8,9 @@ Exporting VPC List Scenarios --------- -Information about all VPCs under your account can be exported as an Excel file to a local directory. This file records the names, ID, status, IP address ranges of VPCs, and the number of subnets. +Information about all VPCs under your account can be exported as an Excel file to a local directory. + +This file records the names, ID, status, CIDR blocks, and the number of subnets of your VPCs. Procedure --------- @@ -19,10 +21,12 @@ Procedure #. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + #. In the upper right corner of the VPC list, click |image3|. - The system will automatically export information about all VPCs under your account in the current region. They will be exported in Excel format. + The system will automatically export information about all VPCs under your account in the current region as an Excel file to a local directory. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001626894098.png .. |image3| image:: /_static/images/en-us_image_0233469654.png diff --git a/umn/source/vpc_and_subnet/vpc/managing_vpc_tags.rst b/umn/source/vpc_and_subnet/vpc/managing_vpc_tags.rst index 26ca67e..de98619 100644 --- a/umn/source/vpc_and_subnet/vpc/managing_vpc_tags.rst +++ b/umn/source/vpc_and_subnet/vpc/managing_vpc_tags.rst @@ -8,7 +8,9 @@ Managing VPC Tags Scenarios --------- -A VPC tag identifies a VPC. Tags can be added to VPCs to facilitate VPC identification and management. You can add a tag to a VPC when creating the VPC, or you can add a tag to a created VPC on the VPC details page. A maximum of 20 tags can be added to each VPC. +You can add tags to VPCs to help you identify and organize them. + +You can add a tag to a VPC when creating the VPC, or you can add a tag to a created VPC on the VPC details page. A maximum of 20 tags can be added to each VPC. A tag consists of a key and value pair. :ref:`Table 1 ` lists the tag key and value requirements. @@ -16,27 +18,27 @@ A tag consists of a key and value pair. :ref:`Table 1 **Virtual Private Cloud**. -#. In the upper right corner of the VPC list, click **Search by Tag**. + The **Virtual Private Cloud** page is displayed. -#. In the displayed area, enter the tag key and value of the VPC you are looking for. +#. In the search box above the subnet list, click the search box. - Both the tag key and value must be specified. The system automatically displays the VPCs you are looking for if both the tag key and value are matched. + Click the tag key and then the value as required. The system filters resources based on the tag you select. -#. Click + to add more tag keys and values. + Click anywhere in the search box to add the next tag key and value. You can add multiple tag keys and values to refine your search results. If you add more than one tag to search for VPCs, the VPCs containing all specified tags will be displayed. -#. Click **Search**. - - The system displays the VPCs you are looking for based on the entered tag keys and values. - **Add, delete, edit, and view tags on the Tags tab of a VPC.** #. Log in to the management console. @@ -71,6 +69,8 @@ Procedure #. Click |image4| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + #. On the **Virtual Private Cloud** page, locate the VPC whose tags are to be managed and click the VPC name. The page showing details about the particular VPC is displayed. @@ -94,6 +94,6 @@ Procedure Locate the row that contains the tag you want to delete, and click **Delete** in the **Operation** column. In the displayed dialog box, click **Yes**. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001627052380.png .. |image3| image:: /_static/images/en-us_image_0141273034.png -.. |image4| image:: /_static/images/en-us_image_0000001500905066.png +.. |image4| image:: /_static/images/en-us_image_0000001675373913.png diff --git a/umn/source/vpc_and_subnet/vpc/modifying_a_vpc.rst b/umn/source/vpc_and_subnet/vpc/modifying_a_vpc.rst index ac5b612..21a58f3 100644 --- a/umn/source/vpc_and_subnet/vpc/modifying_a_vpc.rst +++ b/umn/source/vpc_and_subnet/vpc/modifying_a_vpc.rst @@ -8,27 +8,15 @@ Modifying a VPC Scenarios --------- -Change the VPC name and CIDR block. +You can modify the following information about a VPC: -If the VPC CIDR block conflicts with the CIDR block of a VPN created in the VPC, you can modify its CIDR block. +- :ref:`Modifying the Name and Description of a VPC ` +- :ref:`Modifying the CIDR Block of a VPC ` -Notes and Constraints ---------------------- +.. _en-us_topic_0030969462__section495418425354: -- When modifying the VPC CIDR block: - - - The VPC CIDR block to be modified must be in the supported CIDR blocks: 10.0.0.0 - 10.255.255.255, 172.16.0.0 - 172.31.255.255, and 192.168.0.0 - 192.168.255.255 - - If the VPC has subnets, the VPC CIDR block to be modified must contain all subnet CIDR blocks. - -When modifying the VPC CIDR block: - -- The VPC CIDR block to be modified must be in the supported CIDR blocks: 10.0.0.0 - 10.255.255.255, 172.16.0.0 - 172.31.255.255, and 192.168.0.0 - 192.168.255.255 -- If the VPC has subnets, the VPC CIDR block to be modified must contain all subnet CIDR blocks. - -Procedure ---------- - -**Modifying the VPC CIDR Block** +Modifying the Name and Description of a VPC +------------------------------------------- #. Log in to the management console. @@ -36,34 +24,68 @@ Procedure #. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. -#. On the **Virtual Private Cloud** page, locate the row that contains the VPC to be modified and click **Edit CIDR Block** in the **Operation** column. + The **Virtual Private Cloud** page is displayed. -#. Set a new CIDR block. +#. Modify the name and description of a VPC using either of the following methods: + - Method 1: - .. figure:: /_static/images/en-us_image_0000001151300782.png - :alt: **Figure 1** Modify CIDR Block + a. In the VPC list, click |image3| on the right of the VPC name. + b. Enter the VPC name and click **OK**. - **Figure 1** Modify CIDR Block + - Method 2: -#. Click **OK**. + a. In the VPC list, click the VPC name with a hyperlink. -**Modifying a VPC** + The **Summary** page is displayed. + + b. Click |image4| on the right of the VPC name or description, enter the information, and click |image5|. + +.. _en-us_topic_0030969462__section696206193617: + +Modifying the CIDR Block of a VPC +--------------------------------- #. Log in to the management console. -#. Click |image3| in the upper left corner and select the desired region and project. -#. Click |image4| in the upper left corner and choose **Network** > **Virtual Private Cloud**. -#. Modify the basic information about a VPC using either of the following methods: - - In the VPC list, click |image5| on the right of the VPC name to change the VPC name. +#. Click |image6| in the upper left corner and select the desired region and project. - - In the VPC list, click the VPC name. +#. Click |image7| in the upper left corner and choose **Network** > **Virtual Private Cloud**. - On the VPC details page, click |image6| next to the VPC name or description to change the VPC name or description. + The **Virtual Private Cloud** page is displayed. + +4. In the VPC list, locate the row that contains the VPC and click **Edit CIDR Block** in the **Operation** column. + + The **Edit CIDR Block** dialog box is displayed. + +5. Modify the VPC CIDR block as prompted. + + .. important:: + + A VPC CIDR block must be from 10.0.0.0/8-24, 172.16.0.0/12-24, or 192.168.0.0/16-24. + + - If a VPC has no subnets, you can change both its network address and subnet mask. + + + .. figure:: /_static/images/en-us_image_0000001627653972.png + :alt: **Figure 1** Modifying network address and subnet mask + + **Figure 1** Modifying network address and subnet mask + + - If a VPC has subnets, you only can change its subnet mask. + + + .. figure:: /_static/images/en-us_image_0000001627493158.png + :alt: **Figure 2** Modifying subnet mask + + **Figure 2** Modifying subnet mask + +6. Click **OK**. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001520717193.png -.. |image3| image:: /_static/images/en-us_image_0141273034.png -.. |image4| image:: /_static/images/en-us_image_0000001520717193.png -.. |image5| image:: /_static/images/en-us_image_0000001267230305.png -.. |image6| image:: /_static/images/en-us_image_0000001267350317.png +.. |image2| image:: /_static/images/en-us_image_0000001676063997.png +.. |image3| image:: /_static/images/en-us_image_0000001627174280.png +.. |image4| image:: /_static/images/en-us_image_0000001675813933.png +.. |image5| image:: /_static/images/en-us_image_0000001627334080.png +.. |image6| image:: /_static/images/en-us_image_0141273034.png +.. |image7| image:: /_static/images/en-us_image_0000001627744152.png diff --git a/umn/source/vpc_and_subnet/vpc/obtaining_a_vpc_id.rst b/umn/source/vpc_and_subnet/vpc/obtaining_a_vpc_id.rst index c2f22e1..7e22276 100644 --- a/umn/source/vpc_and_subnet/vpc/obtaining_a_vpc_id.rst +++ b/umn/source/vpc_and_subnet/vpc/obtaining_a_vpc_id.rst @@ -10,7 +10,7 @@ Scenarios This section describes how to view and obtain a VPC ID. -If you want to obtain the ID of the peer VPC when you create a VPC peering connection between two VPCs from different accounts, you can share this section with the owner of the peer account to obtain the VPC ID. +If you create a VPC peering connection between two VPCs in different accounts, you need to obtain the project ID of the region that the peer VPC resides. You can recommend this section to the user of the peer VPC to obtain the project ID. Procedure --------- @@ -21,14 +21,16 @@ Procedure 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + 4. On the **Virtual Private Cloud** page, locate the VPC and click its name. The VPC details page is displayed. -5. In the **VPC Information area**, view the VPC ID. +5. In the **VPC Information** area, view the VPC ID. Click |image3| next to ID to copy the VPC ID. .. |image1| image:: /_static/images/en-us_image_0000001515644737.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001675613945.png .. |image3| image:: /_static/images/en-us_image_0000001465124712.png diff --git a/umn/source/vpc_and_subnet/vpc/viewing_a_vpc_topology.rst b/umn/source/vpc_and_subnet/vpc/viewing_a_vpc_topology.rst index 5ab4043..71c6ee9 100644 --- a/umn/source/vpc_and_subnet/vpc/viewing_a_vpc_topology.rst +++ b/umn/source/vpc_and_subnet/vpc/viewing_a_vpc_topology.rst @@ -19,6 +19,8 @@ Procedure 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + 4. In the VPC list, click the name of the VPC for which the topology is to be viewed. The VPC details page is displayed. @@ -33,4 +35,4 @@ Procedure - Add an ECS to a subnet, bind an EIP to the ECS, and change the security group of the ECS. .. |image1| image:: /_static/images/en-us_image_0000001221790501.png -.. |image2| image:: /_static/images/en-us_image_0000001500905066.png +.. |image2| image:: /_static/images/en-us_image_0000001675413833.png diff --git a/umn/source/vpc_flow_log/creating_a_vpc_flow_log.rst b/umn/source/vpc_flow_log/creating_a_vpc_flow_log.rst index 710dcbf..67a95c7 100644 --- a/umn/source/vpc_flow_log/creating_a_vpc_flow_log.rst +++ b/umn/source/vpc_flow_log/creating_a_vpc_flow_log.rst @@ -29,6 +29,8 @@ Procedure 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + 4. In the navigation pane on the left, choose **VPC Flow Logs**. 5. In the upper right corner, click **Create VPC Flow Log**. On the displayed page, configure parameters as prompted. @@ -76,4 +78,4 @@ Procedure 6. Click **OK**. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001553770733.png +.. |image2| image:: /_static/images/en-us_image_0000001675616561.png diff --git a/umn/source/vpc_flow_log/deleting_a_vpc_flow_log.rst b/umn/source/vpc_flow_log/deleting_a_vpc_flow_log.rst index 9742c64..bff6fff 100644 --- a/umn/source/vpc_flow_log/deleting_a_vpc_flow_log.rst +++ b/umn/source/vpc_flow_log/deleting_a_vpc_flow_log.rst @@ -23,6 +23,8 @@ Procedure 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + 4. In the navigation pane on the left, choose **VPC Flow Logs**. 5. Locate the row that contains the VPC flow log to be deleted and click **Delete** in the **Operation** column. @@ -36,4 +38,4 @@ Procedure 6. Click **Yes** in the displayed dialog box. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001503330854.png +.. |image2| image:: /_static/images/en-us_image_0000001626736794.png diff --git a/umn/source/vpc_flow_log/enabling_or_disabling_vpc_flow_log.rst b/umn/source/vpc_flow_log/enabling_or_disabling_vpc_flow_log.rst index 112d518..ba414d1 100644 --- a/umn/source/vpc_flow_log/enabling_or_disabling_vpc_flow_log.rst +++ b/umn/source/vpc_flow_log/enabling_or_disabling_vpc_flow_log.rst @@ -19,9 +19,11 @@ Procedure 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + 4. In the navigation pane on the left, choose **VPC Flow Logs**. 5. Locate the VPC flow log to be enabled or disabled, and choose **More** > **Enable** or **More** > **Disable** in the **Operation** column. 6. Click **Yes**. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001503011070.png +.. |image2| image:: /_static/images/en-us_image_0000001627056686.png diff --git a/umn/source/vpc_flow_log/viewing_a_vpc_flow_log.rst b/umn/source/vpc_flow_log/viewing_a_vpc_flow_log.rst index e677c2d..067e28c 100644 --- a/umn/source/vpc_flow_log/viewing_a_vpc_flow_log.rst +++ b/umn/source/vpc_flow_log/viewing_a_vpc_flow_log.rst @@ -25,6 +25,8 @@ Procedure 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + 4. In the navigation pane on the left, choose **VPC Flow Logs**. 5. Locate the target VPC flow log and click **View Log Record** in the **Operation** column to view information about the flow log record in LTS. @@ -119,4 +121,4 @@ Procedure You can enter a keyword on the log topic details page on the LTS console to search for flow log records. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001503490746.png +.. |image2| image:: /_static/images/en-us_image_0000001675256657.png diff --git a/umn/source/vpc_flow_log/vpc_flow_log_overview.rst b/umn/source/vpc_flow_log/vpc_flow_log_overview.rst index 98dd76b..2a58ce2 100644 --- a/umn/source/vpc_flow_log/vpc_flow_log_overview.rst +++ b/umn/source/vpc_flow_log/vpc_flow_log_overview.rst @@ -19,6 +19,6 @@ VPC flow logs must be used together with the Log Tank Service (LTS). Before you Notes and Constraints --------------------- -- Currently, only C3, M3, and S2 ECSs support VPC flow logs. -- By default, you can create a maximum of 10 VPC flow logs. +- Currently, C3, M3, and S2 ECSs support VPC flow logs. +- Each account can have up to 10 VPC flow logs in a region. - By default, a maximum of 400,000 flow log records are supported. diff --git a/umn/source/vpc_peering_connection/creating_a_vpc_peering_connection_with_a_vpc_in_another_account.rst b/umn/source/vpc_peering_connection/creating_a_vpc_peering_connection_with_a_vpc_in_another_account.rst index f01e01d..4e3428b 100644 --- a/umn/source/vpc_peering_connection/creating_a_vpc_peering_connection_with_a_vpc_in_another_account.rst +++ b/umn/source/vpc_peering_connection/creating_a_vpc_peering_connection_with_a_vpc_in_another_account.rst @@ -35,13 +35,13 @@ Notes and Constraints - For a VPC peering connection between VPCs in different accounts: - - If account A initiates a request to create a VPC peering connection with a VPC in another B, the VPC peering connection takes effect only after account B accepts the request. + - If account A initiates a request to create a VPC peering connection with a VPC in account B, the VPC peering connection takes effect only after account B accepts the request. - To ensure network security, do not accept VPC peering connections from unknown accounts. Prerequisites ------------- -You have two VPCs in the same region. If you want to create one, see :ref:`Creating a VPC `. +You have two VPCs in the same region, but they are from different accounts. If you want to create one, see :ref:`Creating a VPC `. .. _en-us_topic_0046655038__section14616192294815: @@ -54,6 +54,8 @@ Step 1: Create a VPC Peering Connection 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + 4. In the navigation pane on the left, choose **Virtual Private Cloud** > **VPC Peering Connections**. The VPC peering connection list is displayed. @@ -76,34 +78,38 @@ Step 1: Create a VPC Peering Connection .. table:: **Table 1** Parameters for creating a VPC peering connection - +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------------+ - | Parameter | Description | Example Value | - +=======================+==================================================================================================================================================================================================+==================================+ - | Name | Mandatory | peering-AB | - | | | | - | | Enter a name for the VPC peering connection. | | - | | | | - | | The name can contain a maximum of 64 characters, including letters, digits, hyphens (-), and underscores (_). | | - +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------------+ - | Local VPC | Mandatory | VPC-A | - | | | | - | | VPC at one end of the VPC peering connection. You can select one from the drop-down list. | | - +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------------+ - | Local VPC CIDR Block | CIDR block of the selected local VPC | 172.16.0.0/16 | - +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------------+ - | Account | Mandatory | Another account | - | | | | - | | - Options: **My account** and **Another account** | | - | | - Select **Another account**. | | - +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------------+ - | Peer Project ID | This parameter is mandatory because **Account** is set to **Another account**. | Project ID of VPC-B in region A: | - | | | | - | | The project ID of the region that the peer VPC resides. For details about how to obtain the project ID, see :ref:`Obtaining the Peer Project ID of a VPC Peering Connection `. | 067cf8aecf3XXX08322f13b | - +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------------+ - | Peer VPC ID | This parameter is mandatory because **Account** is set to **Another account**. | VPC-B ID: | - | | | | - | | ID of the VPC at the other end of the VPC peering connection. For details about how to obtain the ID, see :ref:`Obtaining a VPC ID `. | 17cd7278-XXX-530c952dcf35 | - +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------------------------------+ + +-----------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+--------------------------------------+ + | Parameter | Description | Example Value | + +=============================+==================================================================================================================================================================================================+======================================+ + | VPC Peering Connection Name | Mandatory | peering-AB | + | | | | + | | Enter a name for the VPC peering connection. | | + | | | | + | | The name can contain a maximum of 64 characters, including letters, digits, hyphens (-), and underscores (_). | | + +-----------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+--------------------------------------+ + | Local VPC | Mandatory | VPC-A | + | | | | + | | VPC at one end of the VPC peering connection. You can select one from the drop-down list. | | + +-----------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+--------------------------------------+ + | Local VPC CIDR Block | CIDR block of the selected local VPC | 172.16.0.0/16 | + +-----------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+--------------------------------------+ + | Account | Mandatory | Another account | + | | | | + | | - Options: **My account** and **Another account** | | + | | - Select **Another account**. | | + +-----------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+--------------------------------------+ + | Peer Project ID | This parameter is mandatory because **Account** is set to **Another account**. | Project ID of VPC-B in region A: | + | | | | + | | The project ID of the region that the peer VPC resides. For details about how to obtain the project ID, see :ref:`Obtaining the Peer Project ID of a VPC Peering Connection `. | 067cf8aecf3XXX08322f13b | + +-----------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+--------------------------------------+ + | Peer VPC ID | This parameter is mandatory because **Account** is set to **Another account**. | VPC-B ID: | + | | | | + | | ID of the VPC at the other end of the VPC peering connection. For details about how to obtain the ID, see :ref:`Obtaining a VPC ID `. | 17cd7278-XXX-530c952dcf35 | + +-----------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+--------------------------------------+ + | Description | Optional | peering-AB connects VPC-A and VPC-B. | + | | | | + | | Enter the description of the VPC peering connection in the text box as required. The description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | | + +-----------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+--------------------------------------+ 7. Click **OK**. @@ -125,6 +131,8 @@ After you create a VPC peering connection with a VPC in another account, you nee #. Click |image3| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + #. In the navigation pane on the left, choose **Virtual Private Cloud** > **VPC Peering Connections**. The VPC peering connection list is displayed. @@ -143,15 +151,13 @@ After you create a VPC peering connection with a VPC in another account, you nee #. Go to :ref:`Step 3: Add Routes for the VPC Peering Connection `. - .. important:: - - After a VPC peering connection is created, you must add routes to the route tables of the local and peer VPCs. Otherwise, the VPC peering connection does not take effect. - .. _en-us_topic_0046655038__section519111175712: Step 3: Add Routes for the VPC Peering Connection ------------------------------------------------- +To enable communications between VPCs connected by a VPC peering connection, you need to add forward and return routes to the route tables of the VPCs. For details, see :ref:`VPC Peering Connection Usage Examples `. + Both accounts need to add a route to the route table of their VPC. In this example, account A adds a route to the route table of VPC-A, and account B adds a route to the route table of VPC-B. #. Add routes to the route table of the local VPC: @@ -258,9 +264,9 @@ After you add routes for the VPC peering connection, verify the communication be .. important:: - - In this example, ECS-A01 and RDS-B01 are in the same security group. If the instances in different security groups, you need to add inbound rules to allow access from the peer security group. For details, see :ref:`Enabling ECSs in Different Security Groups to Communicate with Each Other Through an Internal Network `. + - In this example, ECS-A01 and RDS-B01 are in the same security group. If the instances in different security groups, you need to add inbound rules to allow access from the peer security group. For details, see :ref:`Enabling ECSs In Different Security Groups to Communicate Through an Internal Network `. - If VPCs connected by a VPC peering connection cannot communicate with each other, refer to :ref:`Why Did Communication Fail Between VPCs That Were Connected by a VPC Peering Connection? `. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001503159042.png -.. |image3| image:: /_static/images/en-us_image_0000001503478818.png +.. |image2| image:: /_static/images/en-us_image_0000001675415841.png +.. |image3| image:: /_static/images/en-us_image_0000001626736198.png diff --git a/umn/source/vpc_peering_connection/creating_a_vpc_peering_connection_with_another_vpc_in_your_account.rst b/umn/source/vpc_peering_connection/creating_a_vpc_peering_connection_with_another_vpc_in_your_account.rst index c484625..ce77edf 100644 --- a/umn/source/vpc_peering_connection/creating_a_vpc_peering_connection_with_another_vpc_in_your_account.rst +++ b/umn/source/vpc_peering_connection/creating_a_vpc_peering_connection_with_another_vpc_in_your_account.rst @@ -30,11 +30,12 @@ Notes and Constraints - Only one VPC peering connection can be created between two VPCs at the same time. - A VPC peering connection can only connect VPCs in the same region. - If the local and peer VPCs have overlapping CIDR blocks, the VPC peering connection may not take effect. +- After a VPC peering connection is created, you must add routes to the route tables of the local and peer VPCs. Otherwise, the VPC peering connection does not take effect. Prerequisites ------------- -You have two VPCs in the same region. If you want to create one, see :ref:`Creating a VPC `. +You have two VPCs from the same account in the same region. If you want to create one, see :ref:`Creating a VPC `. .. _en-us_topic_0046655037__section143383585438: @@ -47,6 +48,8 @@ Step 1: Create a VPC Peering Connection 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + 4. In the navigation pane on the left, choose **Virtual Private Cloud** > **VPC Peering Connections**. The VPC peering connection list is displayed. @@ -69,38 +72,42 @@ Step 1: Create a VPC Peering Connection .. table:: **Table 1** Parameters for creating a VPC peering connection - +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Parameter | Description | Example Value | - +=======================+==================================================================================================================================================================================================+=======================+ - | Name | Mandatory | peering-AB | - | | | | - | | Enter a name for the VPC peering connection. | | - | | | | - | | The name can contain a maximum of 64 characters, including letters, digits, hyphens (-), and underscores (_). | | - +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Local VPC | Mandatory | VPC-A | - | | | | - | | VPC at one end of the VPC peering connection. You can select one from the drop-down list. | | - +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Local VPC CIDR Block | CIDR block of the selected local VPC | 172.16.0.0/16 | - +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Account | Mandatory | My account | - | | | | - | | - Options: **My account** and **Another account** | | - | | - Select **My account**. | | - +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Peer Project | The system fills in the corresponding project by default because **My account** is set to **Account**. | ab-cdef-1 | - | | | | - | | For example, if VPC-A and VPC-B are in account A and region A, the system fills in the correspond project of account A in region A by default. | | - +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Peer VPC | This parameter is mandatory if **Account** is set to **My account**. | VPC-B | - | | | | - | | VPC at the other end of the VPC peering connection. You can select one from the drop-down list. | | - +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ - | Peer VPC CIDR Block | CIDR block of the selected peer VPC | 172.17.0.0/16 | - | | | | - | | If the local and peer VPCs have overlapping CIDR blocks, the VPC peering connection may not take effect. For details, see :ref:`VPC Peering Connection Usage Examples `. | | - +-----------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------------+ + +-----------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+--------------------------------------+ + | Parameter | Description | Example Value | + +=============================+==================================================================================================================================================================================================+======================================+ + | VPC Peering Connection Name | Mandatory | peering-AB | + | | | | + | | Enter a name for the VPC peering connection. | | + | | | | + | | The name can contain a maximum of 64 characters, including letters, digits, hyphens (-), and underscores (_). | | + +-----------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+--------------------------------------+ + | Local VPC | Mandatory | VPC-A | + | | | | + | | VPC at one end of the VPC peering connection. You can select one from the drop-down list. | | + +-----------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+--------------------------------------+ + | Local VPC CIDR Block | CIDR block of the selected local VPC | 172.16.0.0/16 | + +-----------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+--------------------------------------+ + | Account | Mandatory | My account | + | | | | + | | - Options: **My account** and **Another account** | | + | | - Select **My account**. | | + +-----------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+--------------------------------------+ + | Peer Project | The system fills in the corresponding project by default because **My account** is set to **Account**. | ab-cdef-1 | + | | | | + | | For example, if VPC-A and VPC-B are in account A and region A, the system fills in the correspond project of account A in region A by default. | | + +-----------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+--------------------------------------+ + | Peer VPC | This parameter is mandatory if **Account** is set to **My account**. | VPC-B | + | | | | + | | VPC at the other end of the VPC peering connection. You can select one from the drop-down list. | | + +-----------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+--------------------------------------+ + | Peer VPC CIDR Block | CIDR block of the selected peer VPC | 172.17.0.0/16 | + | | | | + | | If the local and peer VPCs have overlapping CIDR blocks, the VPC peering connection may not take effect. For details, see :ref:`VPC Peering Connection Usage Examples `. | | + +-----------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+--------------------------------------+ + | Description | Optional | peering-AB connects VPC-A and VPC-B. | + | | | | + | | Enter the description of the VPC peering connection in the text box as required. | | + +-----------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+--------------------------------------+ 7. Click **OK**. @@ -111,15 +118,13 @@ Step 1: Create a VPC Peering Connection a. If you click **Add Route**, the **Local Routes** page is displayed. Then, go to :ref:`Step 2: Add Routes for the VPC Peering Connection `. b. If you click **Add Later**, the VPC peering connection list is displayed. - .. important:: - - After a VPC peering connection is created, you must add routes to the route tables of the local and peer VPCs. Otherwise, the VPC peering connection does not take effect. - .. _en-us_topic_0046655037__section19655123018712: Step 2: Add Routes for the VPC Peering Connection ------------------------------------------------- +To enable communications between VPCs connected by a VPC peering connection, you need to add forward and return routes to the route tables of the VPCs. For details, see :ref:`VPC Peering Connection Usage Examples `. + #. Add routes to the route table of the local VPC: a. On the **Local Routes** tab of the VPC peering connection, click the **Route Tables** hyperlink. @@ -216,8 +221,8 @@ After you add routes for the VPC peering connection, verify the communication be .. important:: - - In this example, ECS-A01 and RDS-B01 are in the same security group. If the instances in different security groups, you need to add inbound rules to allow access from the peer security group. For details, see :ref:`Enabling ECSs in Different Security Groups to Communicate with Each Other Through an Internal Network `. + - In this example, ECS-A01 and RDS-B01 are in the same security group. If the instances in different security groups, you need to add inbound rules to allow access from the peer security group. For details, see :ref:`Enabling ECSs In Different Security Groups to Communicate Through an Internal Network `. - If VPCs connected by a VPC peering connection cannot communicate with each other, refer to :ref:`Why Did Communication Fail Between VPCs That Were Connected by a VPC Peering Connection? `. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001503318922.png +.. |image2| image:: /_static/images/en-us_image_0000001627056086.png diff --git a/umn/source/vpc_peering_connection/deleting_a_vpc_peering_connection.rst b/umn/source/vpc_peering_connection/deleting_a_vpc_peering_connection.rst index c56f0d9..325e8ac 100644 --- a/umn/source/vpc_peering_connection/deleting_a_vpc_peering_connection.rst +++ b/umn/source/vpc_peering_connection/deleting_a_vpc_peering_connection.rst @@ -24,7 +24,7 @@ Procedure 2. Click |image1| in the upper left corner and select the desired region and project. -3. On the console homepage, under **Network**, click **Virtual Private Cloud**. +3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. The **Virtual Private Cloud** page is displayed. @@ -39,3 +39,4 @@ Procedure 6. Click **Yes**. .. |image1| image:: /_static/images/en-us_image_0141273034.png +.. |image2| image:: /_static/images/en-us_image_0000001675416345.png diff --git a/umn/source/vpc_peering_connection/deleting_routes_configured_for_a_vpc_peering_connection.rst b/umn/source/vpc_peering_connection/deleting_routes_configured_for_a_vpc_peering_connection.rst index 4ad2cf0..1957805 100644 --- a/umn/source/vpc_peering_connection/deleting_routes_configured_for_a_vpc_peering_connection.rst +++ b/umn/source/vpc_peering_connection/deleting_routes_configured_for_a_vpc_peering_connection.rst @@ -24,6 +24,8 @@ Deleting Routes of a VPC Peering Connection Between VPCs in the Same Account #. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + #. In the navigation pane on the left, choose **Virtual Private Cloud** > **VPC Peering Connections**. The VPC peering connection list is displayed. @@ -71,6 +73,8 @@ Only the account owner of a VPC in a VPC peering connection can delete the route b. Click |image4| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + c. In the navigation pane on the left, choose **Virtual Private Cloud** > **VPC Peering Connections**. The VPC peering connection list is displayed. @@ -94,6 +98,6 @@ Only the account owner of a VPC in a VPC peering connection can delete the route #. Log in to the management console using the account of the peer VPC and delete the route of the peer VPC by referring to :ref:`1 `. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001503330858.png +.. |image2| image:: /_static/images/en-us_image_0000001626896590.png .. |image3| image:: /_static/images/en-us_image_0141273034.png -.. |image4| image:: /_static/images/en-us_image_0000001553770737.png +.. |image4| image:: /_static/images/en-us_image_0000001675616433.png diff --git a/umn/source/vpc_peering_connection/modifying_a_vpc_peering_connection.rst b/umn/source/vpc_peering_connection/modifying_a_vpc_peering_connection.rst index e6f3d76..0af6278 100644 --- a/umn/source/vpc_peering_connection/modifying_a_vpc_peering_connection.rst +++ b/umn/source/vpc_peering_connection/modifying_a_vpc_peering_connection.rst @@ -19,7 +19,7 @@ Procedure 2. Click |image1| in the upper left corner and select the desired region and project. -3. On the console homepage, under **Network**, click **Virtual Private Cloud**. +3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. The **Virtual Private Cloud** page is displayed. @@ -34,3 +34,4 @@ Procedure 6. Modify the VPC peering connection information and click **OK**. .. |image1| image:: /_static/images/en-us_image_0141273034.png +.. |image2| image:: /_static/images/en-us_image_0000001626576382.png diff --git a/umn/source/vpc_peering_connection/modifying_routes_configured_for_a_vpc_peering_connection.rst b/umn/source/vpc_peering_connection/modifying_routes_configured_for_a_vpc_peering_connection.rst index 5004df6..13e1ecb 100644 --- a/umn/source/vpc_peering_connection/modifying_routes_configured_for_a_vpc_peering_connection.rst +++ b/umn/source/vpc_peering_connection/modifying_routes_configured_for_a_vpc_peering_connection.rst @@ -26,6 +26,8 @@ Modifying Routes of a VPC Peering Connection Between VPCs in the Same Account #. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + #. In the navigation pane on the left, choose **Virtual Private Cloud** > **VPC Peering Connections**. The VPC peering connection list is displayed. @@ -73,6 +75,8 @@ Only the account owner of a VPC can modify the routes added for the connection. b. Click |image4| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + c. In the navigation pane on the left, choose **Virtual Private Cloud** > **VPC Peering Connections**. The VPC peering connection list is displayed. @@ -96,6 +100,6 @@ Only the account owner of a VPC can modify the routes added for the connection. #. Log in to the management console using the account of the peer VPC and modify the route of the peer VPC by referring to :ref:`1 `. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001554010649.png +.. |image2| image:: /_static/images/en-us_image_0000001627056574.png .. |image3| image:: /_static/images/en-us_image_0141273034.png -.. |image4| image:: /_static/images/en-us_image_0000001553650757.png +.. |image4| image:: /_static/images/en-us_image_0000001626736678.png diff --git a/umn/source/vpc_peering_connection/obtaining_the_peer_project_id_of_a_vpc_peering_connection.rst b/umn/source/vpc_peering_connection/obtaining_the_peer_project_id_of_a_vpc_peering_connection.rst index dbcdf54..f73d923 100644 --- a/umn/source/vpc_peering_connection/obtaining_the_peer_project_id_of_a_vpc_peering_connection.rst +++ b/umn/source/vpc_peering_connection/obtaining_the_peer_project_id_of_a_vpc_peering_connection.rst @@ -17,5 +17,5 @@ Procedure The owner of the peer account logs in to the management console. -2. Select **My Credentials** from the username drop-down list. +2. In the upper right corner of the page, select **My Credentials** from the username drop-down list. 3. In the project list, obtain the project ID. diff --git a/umn/source/vpc_peering_connection/viewing_routes_configured_for_a_vpc_peering_connection.rst b/umn/source/vpc_peering_connection/viewing_routes_configured_for_a_vpc_peering_connection.rst index b8fb49f..d122d37 100644 --- a/umn/source/vpc_peering_connection/viewing_routes_configured_for_a_vpc_peering_connection.rst +++ b/umn/source/vpc_peering_connection/viewing_routes_configured_for_a_vpc_peering_connection.rst @@ -26,6 +26,8 @@ Viewing Routes of a VPC Peering Connection Between VPCs in the Same Account 3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + 4. In the navigation pane on the left, choose **Virtual Private Cloud** > **VPC Peering Connections**. The VPC peering connection list is displayed. @@ -54,6 +56,8 @@ Only the account owner of a VPC in a VPC peering connection can view the routes b. Click |image4| in the upper left corner and choose **Network** > **Virtual Private Cloud**. + The **Virtual Private Cloud** page is displayed. + c. In the navigation pane on the left, choose **Virtual Private Cloud** > **VPC Peering Connections**. The VPC peering connection list is displayed. @@ -67,6 +71,6 @@ Only the account owner of a VPC in a VPC peering connection can view the routes #. Log in to the management console using the account of the peer VPC and view the route of the peer VPC by referring to :ref:`1 `. .. |image1| image:: /_static/images/en-us_image_0141273034.png -.. |image2| image:: /_static/images/en-us_image_0000001503011074.png +.. |image2| image:: /_static/images/en-us_image_0000001626576858.png .. |image3| image:: /_static/images/en-us_image_0141273034.png -.. |image4| image:: /_static/images/en-us_image_0000001503490750.png +.. |image4| image:: /_static/images/en-us_image_0000001675256529.png diff --git a/umn/source/vpc_peering_connection/viewing_vpc_peering_connections.rst b/umn/source/vpc_peering_connection/viewing_vpc_peering_connections.rst index 5f7f8cc..fc9f207 100644 --- a/umn/source/vpc_peering_connection/viewing_vpc_peering_connections.rst +++ b/umn/source/vpc_peering_connection/viewing_vpc_peering_connections.rst @@ -19,7 +19,7 @@ Procedure 2. Click |image1| in the upper left corner and select the desired region and project. -3. On the console homepage, under **Network**, click **Virtual Private Cloud**. +3. Click |image2| in the upper left corner and choose **Network** > **Virtual Private Cloud**. The **Virtual Private Cloud** page is displayed. @@ -32,3 +32,4 @@ Procedure On the displayed page, view details about the VPC peering connection. .. |image1| image:: /_static/images/en-us_image_0141273034.png +.. |image2| image:: /_static/images/en-us_image_0000001675256029.png diff --git a/umn/source/vpc_peering_connection/vpc_peering_connection_usage_examples.rst b/umn/source/vpc_peering_connection/vpc_peering_connection_usage_examples.rst index 7ea19dd..aff425b 100644 --- a/umn/source/vpc_peering_connection/vpc_peering_connection_usage_examples.rst +++ b/umn/source/vpc_peering_connection/vpc_peering_connection_usage_examples.rst @@ -5,7 +5,7 @@ VPC Peering Connection Usage Examples ===================================== -A VPC peering connection is a networking connection between two VPCs and enables them to communicate. :ref:`Table 1 ` lists different scenarios of using VPC peering connections. +A VPC peering connection is a networking connection between two VPCs in the same region and enables them to communicate. :ref:`Table 1 ` lists different scenarios of using VPC peering connections. .. _en-us_topic_0046809840__table18339193642913: @@ -191,7 +191,10 @@ As shown in :ref:`Figure 4 `, VPC-A and Peering ECSs in a Central VPC with ECSs in Two Other VPCs --------------------------------------------------------- -As shown in :ref:`Figure 5 `, VPC-B and VPC-C have overlapping CIDR blocks, and their Subnet-B01 and Subnet-BC01 have overlapping CIDR blocks. In this case, the VPC peering connection can connect ECSs in Subnet-B01 and Subnet-A01, and ECSs in Subnet-C01 and Subnet-A01. +As shown in :ref:`Figure 5 `, VPC-B and VPC-C have overlapping CIDR blocks, and their Subnet-B01 and Subnet-C01 have overlapping CIDR blocks. You can only create a VPC peering connection between ECSs. + +- Use VPC peering connection Peering-AB to connect ECSs in Subnet-B01 and Subnet-A01. +- Use VPC peering connection Peering-AC to connect ECSs in Subnet-C01 and Subnet-A01. .. _en-us_topic_0046809840__fig568511518481: