That only clears out the current monitoring session AFAIK, it doesn't remove entries from previous aircontrol or aircontrol2 server instances. I created a script to do this previously that took a flat file ip list input.
On Tue, May 17, 2016 at 6:12 PM, Jesse DuPont <jesse.dup...@celeritycorp.net > wrote: > In the AC2 client connected to your test server, right-click each > monitored device, choose Stop Monitoring. After that, right-click each one > and choose Remove. > > *Jesse DuPont* > > Network Architect > email: jesse.dup...@celeritycorp.net > Celerity Networks LLC > > Celerity Broadband LLC > Like us! facebook.com/celeritynetworksllc > > Like us! facebook.com/celeritybroadband > On 5/17/16 5:10 PM, That One Guy /sarcasm wrote: > > whats the method to clear these ones out effectively > > > On Tue, May 17, 2016 at 1:27 PM, Josh Reynolds <j...@kyneticwifi.com> > wrote: > >> HRRRRNNNGGG don't do that. >> >> Every time you spin up and then kill an aircontrol server that you >> managed devices from, those devices will FOREVER try and report to that >> aircontrol server. Up to 4 or 5 per device. That generates a lot of ARP >> every 60 seconds or so when those servers don't exist anymore. >> >> It takes manual intervention via scripting on each device to get them >> clean. >> >> Put up a real server / vm, associate devices, and be done with it. Linux >> works best (by far). >> >> On Tue, May 17, 2016 at 1:21 PM, That One Guy /sarcasm < >> thatoneguyst...@gmail.com> wrote: >> >>> this was just a test install of ac2, if i reinstall on another machine >>> and kill this one, what do i need to do to control the devices from that? >>> >>> On Tue, May 17, 2016 at 1:07 PM, Josh Reynolds <j...@kyneticwifi.com> >>> wrote: >>> >>>> nothing monitors toughswitches. not really. >>>> >>>> kill them with fire anyway >>>> >>>> On Tue, May 17, 2016 at 12:35 PM, That One Guy /sarcasm < >>>> <thatoneguyst...@gmail.com>thatoneguyst...@gmail.com> wrote: >>>> >>>>> thats what i did, didnt find anything >>>>> >>>>> just found out, you apprently should not add a toghswitch, the UI is >>>>> hanging now...thats the ubnt ive come to know :-) >>>>> >>>>> On Tue, May 17, 2016 at 12:33 PM, Ty Featherling < >>>>> <tyfeatherl...@gmail.com>tyfeatherl...@gmail.com> wrote: >>>>> >>>>>> Discovery only works on layer 2. You have to switch it to IP mode and >>>>>> just type in subnets like so "10.10.5.0/24, 10.11.5.0/24, " and so >>>>>> on. >>>>>> >>>>>> >>>>>> >>>>>> -Ty >>>>>> >>>>>> On Tue, May 17, 2016 at 12:27 PM, That One Guy /sarcasm < >>>>>> <thatoneguyst...@gmail.com>thatoneguyst...@gmail.com> wrote: >>>>>> >>>>>>> I still need to read up on how to scan subnets, it fails to add >>>>>>> anything. I have to manually add the device >>>>>>> >>>>>>> On Tue, May 17, 2016 at 12:22 PM, Ty Featherling < >>>>>>> <tyfeatherl...@gmail.com>tyfeatherl...@gmail.com> wrote: >>>>>>> >>>>>>>> I wish they hadn't abandoned it. It is one of the best things about >>>>>>>> running a ubnt network. I have mine scan my subnets every night so I >>>>>>>> have >>>>>>>> monitoring of all radios from the start. >>>>>>>> On May 17, 2016 12:04 PM, "That One Guy /sarcasm" < >>>>>>>> <thatoneguyst...@gmail.com>thatoneguyst...@gmail.com> wrote: >>>>>>>> >>>>>>>>> holy dog balls, that was a simple install and simple >>>>>>>>> configuration. UBNT and beta together always scares me, but this is a >>>>>>>>> slick >>>>>>>>> tool. Chuck M must have overseen it since it actually works >>>>>>>>> >>>>>>>>> On Tue, May 17, 2016 at 11:17 AM, That One Guy /sarcasm < >>>>>>>>> <thatoneguyst...@gmail.com>thatoneguyst...@gmail.com> wrote: >>>>>>>>> >>>>>>>>>> is the windows server variant heavy? >>>>>>>>>> >>>>>>>>>> On Tue, May 17, 2016 at 11:16 AM, That One Guy /sarcasm < >>>>>>>>>> <thatoneguyst...@gmail.com>thatoneguyst...@gmail.com> wrote: >>>>>>>>>> >>>>>>>>>>> nm, i see it now >>>>>>>>>>> >>>>>>>>>>> On Tue, May 17, 2016 at 11:15 AM, That One Guy /sarcasm < >>>>>>>>>>> <thatoneguyst...@gmail.com>thatoneguyst...@gmail.com> wrote: >>>>>>>>>>> >>>>>>>>>>>> can you point me to where i would get it >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> On Tue, May 17, 2016 at 11:14 AM, Ty Featherling < >>>>>>>>>>>> <tyfeatherl...@gmail.com>tyfeatherl...@gmail.com> wrote: >>>>>>>>>>>> >>>>>>>>>>>>> Current AC2 is beta 21. I just installed it myself after a >>>>>>>>>>>>> failed upgrade from my old beta 12 install. It will do mass >>>>>>>>>>>>> firmware >>>>>>>>>>>>> updates, password changes, and a set number of other >>>>>>>>>>>>> configuration changes. >>>>>>>>>>>>> The only 2 things I wish it did that it doesn't are firewall >>>>>>>>>>>>> updates and >>>>>>>>>>>>> viewing bridge tables for devices. Great tool for everything >>>>>>>>>>>>> else. I >>>>>>>>>>>>> installed the local beta of the new CRM thing and It seems like >>>>>>>>>>>>> it barely >>>>>>>>>>>>> does anything by comparison. If you go the the forums and find >>>>>>>>>>>>> the AC2 beta >>>>>>>>>>>>> forum, the first sticky post is the latest version. >>>>>>>>>>>>> >>>>>>>>>>>>> -Ty >>>>>>>>>>>>> >>>>>>>>>>>>> >>>>>>>>>>>>> >>>>>>>>>>>>> -Ty >>>>>>>>>>>>> >>>>>>>>>>>>> On Tue, May 17, 2016 at 11:07 AM, That One Guy /sarcasm < >>>>>>>>>>>>> <thatoneguyst...@gmail.com>thatoneguyst...@gmail.com> wrote: >>>>>>>>>>>>> >>>>>>>>>>>>>> We need to do some mass password changes and verification of >>>>>>>>>>>>>> the firmware, I assume this AC2 does this, can somebody point me >>>>>>>>>>>>>> to the >>>>>>>>>>>>>> most current iteration of this? We do have the beta access. Im >>>>>>>>>>>>>> just fearful >>>>>>>>>>>>>> of wandering too much on the forum looking. >>>>>>>>>>>>>> >>>>>>>>>>>>>> Will AC2 let me add configurations en mass? I need to change >>>>>>>>>>>>>> and add some settings, if there is a fairly simple way of doing >>>>>>>>>>>>>> this >>>>>>>>>>>>>> (preferably with error checking) assuming that AC2 doesnt do it >>>>>>>>>>>>>> I would >>>>>>>>>>>>>> sure appreciate some pointers (that dont assume I am a script >>>>>>>>>>>>>> magician) >>>>>>>>>>>>>> >>>>>>>>>>>>>> On Tue, May 17, 2016 at 10:56 AM, Josh Reynolds < >>>>>>>>>>>>>> <j...@kyneticwifi.com>j...@kyneticwifi.com> wrote: >>>>>>>>>>>>>> >>>>>>>>>>>>>>> You want a toe? I can get you a toe, believe me. There are >>>>>>>>>>>>>>> ways, Dude. You don't wanna know about it, believe me. >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> Hell, I can get you a toe by 3 o'clock this afternoon... >>>>>>>>>>>>>>> with nail polish. >>>>>>>>>>>>>>> On May 17, 2016 9:43 AM, "CBB - Jay Fuller" < >>>>>>>>>>>>>>> <par...@cyberbroadband.net>par...@cyberbroadband.net> wrote: >>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> I WILL SEND YOU A BILL!!! (FOR YOUR HATE))) >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> hah >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> ----- Original Message ----- >>>>>>>>>>>>>>>> *From:* Ty Featherling <tyfeatherl...@gmail.com> >>>>>>>>>>>>>>>> *To:* <af@afmug.com>af@afmug.com >>>>>>>>>>>>>>>> *Sent:* Tuesday, May 17, 2016 8:29 AM >>>>>>>>>>>>>>>> *Subject:* Re: [AFMUG] ubnt malware >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> We're the hatiest! Our hate is refined though, and >>>>>>>>>>>>>>>> surgically applied. The forums are more like monkeys throwing >>>>>>>>>>>>>>>> their >>>>>>>>>>>>>>>> hate-shit indescriminately. >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> -Ty >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> On Tue, May 17, 2016 at 8:26 AM, Bill Prince < >>>>>>>>>>>>>>>> <part15...@gmail.com>part15...@gmail.com> wrote: >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> All your hate are belong to us. >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> bp >>>>>>>>>>>>>>>>> <part15sbs{at}gmail{dot}com> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> On 5/17/2016 6:25 AM, Chuck McCown wrote: >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> Hey, we got hate here... I hate it when people complain >>>>>>>>>>>>>>>>> about our lack of hate. We can hate with the best of them, >>>>>>>>>>>>>>>>> just choose to >>>>>>>>>>>>>>>>> reserve it for a better time and place... afmug: higher >>>>>>>>>>>>>>>>> quality hate >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> *From:* Ty Featherling <tyfeatherl...@gmail.com> >>>>>>>>>>>>>>>>> *Sent:* Tuesday, May 17, 2016 7:21 AM >>>>>>>>>>>>>>>>> *To:* <af@afmug.com>af@afmug.com >>>>>>>>>>>>>>>>> *Subject:* Re: [AFMUG] ubnt malware >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> When Steve comes back from somewhere complaining of too >>>>>>>>>>>>>>>>> much hate, you know that place is a hell-hole. >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> -Ty >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> -Ty >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> On Tue, May 17, 2016 at 4:48 AM, That One Guy /sarcasm < >>>>>>>>>>>>>>>>> <thatoneguyst...@gmail.com>thatoneguyst...@gmail.com> >>>>>>>>>>>>>>>>> wrote: >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> holy nuggets of hate. I just got done reading the 31 >>>>>>>>>>>>>>>>>> pages of hate, now i remember why i dont ever go there >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> On Tue, May 17, 2016 at 12:49 AM, That One Guy /sarcasm < >>>>>>>>>>>>>>>>>> <thatoneguyst...@gmail.com>thatoneguyst...@gmail.com> >>>>>>>>>>>>>>>>>> wrote: >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> wow, port 19081 turns out to be pretty popular >>>>>>>>>>>>>>>>>>> one im cleaning up now has a child connection active in >>>>>>>>>>>>>>>>>>> it since i logged in, im curious what its doing >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> On Mon, May 16, 2016 at 10:55 PM, Mathew Howard < >>>>>>>>>>>>>>>>>>> <mhoward...@gmail.com>mhoward...@gmail.com> wrote: >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>> ...unless of course it gets on a PC at the office... in >>>>>>>>>>>>>>>>>>>> which case we'd be in trouble. >>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>> On Mon, May 16, 2016 at 10:53 PM, Mathew Howard < >>>>>>>>>>>>>>>>>>>> <mhoward...@gmail.com>mhoward...@gmail.com> wrote: >>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>> True! but that hasn't happened yet, and it still >>>>>>>>>>>>>>>>>>>>> shouldn't get beyond that customer's radio. >>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>> On Mon, May 16, 2016 at 9:35 PM, Mike Hammett < >>>>>>>>>>>>>>>>>>>>> <af...@ics-il.net>af...@ics-il.net> wrote: >>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> Until it gets delivered via Flash or Java or >>>>>>>>>>>>>>>>>>>>>> something else... ;-) >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> ----- >>>>>>>>>>>>>>>>>>>>>> Mike Hammett >>>>>>>>>>>>>>>>>>>>>> Intelligent Computing Solutions >>>>>>>>>>>>>>>>>>>>>> <http://www.ics-il.com/> >>>>>>>>>>>>>>>>>>>>>> <https://www.facebook.com/ICSIL> >>>>>>>>>>>>>>>>>>>>>> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb> >>>>>>>>>>>>>>>>>>>>>> <https://www.linkedin.com/company/intelligent-computing-solutions> >>>>>>>>>>>>>>>>>>>>>> <https://twitter.com/ICSIL> >>>>>>>>>>>>>>>>>>>>>> Midwest Internet Exchange >>>>>>>>>>>>>>>>>>>>>> <http://www.midwest-ix.com/> >>>>>>>>>>>>>>>>>>>>>> <https://www.facebook.com/mdwestix> >>>>>>>>>>>>>>>>>>>>>> <https://www.linkedin.com/company/midwest-internet-exchange> >>>>>>>>>>>>>>>>>>>>>> <https://twitter.com/mdwestix> >>>>>>>>>>>>>>>>>>>>>> The Brothers WISP <http://www.thebrotherswisp.com/> >>>>>>>>>>>>>>>>>>>>>> <https://www.facebook.com/thebrotherswisp> >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg> >>>>>>>>>>>>>>>>>>>>>> ------------------------------ >>>>>>>>>>>>>>>>>>>>>> *From: *"Mathew Howard" < <mhoward...@gmail.com> >>>>>>>>>>>>>>>>>>>>>> mhoward...@gmail.com> >>>>>>>>>>>>>>>>>>>>>> *To: *"af" < <af@afmug.com>af@afmug.com> >>>>>>>>>>>>>>>>>>>>>> *Sent: *Monday, May 16, 2016 9:16:40 PM >>>>>>>>>>>>>>>>>>>>>> *Subject: *Re: [AFMUG] ubnt malware >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> If you have firewall rules at the edge of the network >>>>>>>>>>>>>>>>>>>>>> blocking the management ports ti the airrouters that are >>>>>>>>>>>>>>>>>>>>>> on public IPs, >>>>>>>>>>>>>>>>>>>>>> they're probably fine. We still have some radios that >>>>>>>>>>>>>>>>>>>>>> are on old firmware, >>>>>>>>>>>>>>>>>>>>>> but I haven't been able to find anything on our >>>>>>>>>>>>>>>>>>>>>> network that's infected. >>>>>>>>>>>>>>>>>>>>>> Fortunately, when I was setting up the firewall rules to >>>>>>>>>>>>>>>>>>>>>> block access to >>>>>>>>>>>>>>>>>>>>>> the CPEs from outside our network, I decided it was >>>>>>>>>>>>>>>>>>>>>> desirable to block >>>>>>>>>>>>>>>>>>>>>> customers from being able to get to other customers >>>>>>>>>>>>>>>>>>>>>> radios as well... which >>>>>>>>>>>>>>>>>>>>>> should break the self replicating part of this thing, so >>>>>>>>>>>>>>>>>>>>>> even if it does >>>>>>>>>>>>>>>>>>>>>> somehow get into our network, it shouldn't be able to >>>>>>>>>>>>>>>>>>>>>> get far. >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> That said, I'm updating everything that isn't on at >>>>>>>>>>>>>>>>>>>>>> least 5.6.2 right away. >>>>>>>>>>>>>>>>>>>>>> On May 16, 2016 8:41 PM, "That One Guy /sarcasm" < >>>>>>>>>>>>>>>>>>>>>> <thatoneguyst...@gmail.com>thatoneguyst...@gmail.com> >>>>>>>>>>>>>>>>>>>>>> wrote: >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> yeah, thats amazing me, one fella was complaining >>>>>>>>>>>>>>>>>>>>>> about how much of a problem it would be to take a unit >>>>>>>>>>>>>>>>>>>>>> offline to get on a >>>>>>>>>>>>>>>>>>>>>> bench. I would think if things are that bad that your >>>>>>>>>>>>>>>>>>>>>> network is >>>>>>>>>>>>>>>>>>>>>> progressively shutting down, convenience would be the >>>>>>>>>>>>>>>>>>>>>> least of your >>>>>>>>>>>>>>>>>>>>>> concerns. >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> I have to investigate a couple anomalies on the >>>>>>>>>>>>>>>>>>>>>> network, in the back of my mind Im hoping the air >>>>>>>>>>>>>>>>>>>>>> routers have been hit to >>>>>>>>>>>>>>>>>>>>>> put a nail in their coffins so we cam go with mikrotiks >>>>>>>>>>>>>>>>>>>>>> as the CPE router >>>>>>>>>>>>>>>>>>>>>> instead >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> On Mon, May 16, 2016 at 8:33 PM, Josh Reynolds < >>>>>>>>>>>>>>>>>>>>>> <j...@kyneticwifi.com>j...@kyneticwifi.com> wrote: >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>>> Or threatening to sue because of their own personal >>>>>>>>>>>>>>>>>>>>>>> ignorance and negligence. >>>>>>>>>>>>>>>>>>>>>>> On May 16, 2016 8:32 PM, "Mike Hammett" < >>>>>>>>>>>>>>>>>>>>>>> <af...@ics-il.net>af...@ics-il.net> wrote: >>>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>>>> A good amount of it is just people that don't know >>>>>>>>>>>>>>>>>>>>>>>> any better making false observations. >>>>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>>>> ----- >>>>>>>>>>>>>>>>>>>>>>>> Mike Hammett >>>>>>>>>>>>>>>>>>>>>>>> Intelligent Computing Solutions >>>>>>>>>>>>>>>>>>>>>>>> <http://www.ics-il.com/> >>>>>>>>>>>>>>>>>>>>>>>> <https://www.facebook.com/ICSIL> >>>>>>>>>>>>>>>>>>>>>>>> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb> >>>>>>>>>>>>>>>>>>>>>>>> <https://www.linkedin.com/company/intelligent-computing-solutions> >>>>>>>>>>>>>>>>>>>>>>>> <https://twitter.com/ICSIL> >>>>>>>>>>>>>>>>>>>>>>>> Midwest Internet Exchange >>>>>>>>>>>>>>>>>>>>>>>> <http://www.midwest-ix.com/> >>>>>>>>>>>>>>>>>>>>>>>> <https://www.facebook.com/mdwestix> >>>>>>>>>>>>>>>>>>>>>>>> <https://www.linkedin.com/company/midwest-internet-exchange> >>>>>>>>>>>>>>>>>>>>>>>> <https://twitter.com/mdwestix> >>>>>>>>>>>>>>>>>>>>>>>> The Brothers WISP <http://www.thebrotherswisp.com/> >>>>>>>>>>>>>>>>>>>>>>>> <https://www.facebook.com/thebrotherswisp> >>>>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>>>> <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg> >>>>>>>>>>>>>>>>>>>>>>>> ------------------------------ >>>>>>>>>>>>>>>>>>>>>>>> *From: *"That One Guy /sarcasm" < >>>>>>>>>>>>>>>>>>>>>>>> <thatoneguyst...@gmail.com> >>>>>>>>>>>>>>>>>>>>>>>> thatoneguyst...@gmail.com> >>>>>>>>>>>>>>>>>>>>>>>> *To: * <af@afmug.com>af@afmug.com >>>>>>>>>>>>>>>>>>>>>>>> *Sent: *Monday, May 16, 2016 8:19:00 PM >>>>>>>>>>>>>>>>>>>>>>>> *Subject: *[AFMUG] ubnt malware >>>>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>>>> From what im reading in their forums something set >>>>>>>>>>>>>>>>>>>>>>>> off over the weekend? or is it ubnt douche nozzles? >>>>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>>>> It sounds almost as if this malware is actively >>>>>>>>>>>>>>>>>>>>>>>> being manipulated (changing from key access to foul >>>>>>>>>>>>>>>>>>>>>>>> username/password, >>>>>>>>>>>>>>>>>>>>>>>> wandering control ports, etc, like script kiddies >>>>>>>>>>>>>>>>>>>>>>>> found a new toy? >>>>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>>>> is this thing self propagating from the device? >>>>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>>>> -- >>>>>>>>>>>>>>>>>>>>>>>> If you only see yourself as part of the team but >>>>>>>>>>>>>>>>>>>>>>>> you don't see your team as part of yourself you have >>>>>>>>>>>>>>>>>>>>>>>> already failed as part >>>>>>>>>>>>>>>>>>>>>>>> of the team. >>>>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> -- >>>>>>>>>>>>>>>>>>>>>> If you only see yourself as part of the team but you >>>>>>>>>>>>>>>>>>>>>> don't see your team as part of yourself you have already >>>>>>>>>>>>>>>>>>>>>> failed as part of >>>>>>>>>>>>>>>>>>>>>> the team. >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> -- >>>>>>>>>>>>>>>>>>> If you only see yourself as part of the team but you >>>>>>>>>>>>>>>>>>> don't see your team as part of yourself you have already >>>>>>>>>>>>>>>>>>> failed as part of >>>>>>>>>>>>>>>>>>> the team. >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> -- >>>>>>>>>>>>>>>>>> If you only see yourself as part of the team but you >>>>>>>>>>>>>>>>>> don't see your team as part of yourself you have already >>>>>>>>>>>>>>>>>> failed as part of >>>>>>>>>>>>>>>>>> the team. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> >>>>>>>>>>>>>> >>>>>>>>>>>>>> >>>>>>>>>>>>>> -- >>>>>>>>>>>>>> If you only see yourself as part of the team but >>>>>>>>>>>>>> you don't see your team as part of yourself you have already >>>>>>>>>>>>>> failed as part >>>>>>>>>>>>>> of the team. >>>>>>>>>>>>>> >>>>>>>>>>>>> >>>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> -- >>>>>>>>>>>> If you only see yourself as part of the team but you don't see >>>>>>>>>>>> your team as part of yourself you have already failed as part of >>>>>>>>>>>> the team. >>>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> -- >>>>>>>>>>> If you only see yourself as part of the team but you don't see >>>>>>>>>>> your team as part of yourself you have already failed as part of >>>>>>>>>>> the team. >>>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> -- >>>>>>>>>> If you only see yourself as part of the team but you don't see >>>>>>>>>> your team as part of yourself you have already failed as part of the >>>>>>>>>> team. >>>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>> -- >>>>>>>>> If you only see yourself as part of the team but you don't see >>>>>>>>> your team as part of yourself you have already failed as part of the >>>>>>>>> team. >>>>>>>>> >>>>>>>> >>>>>>> >>>>>>> >>>>>>> -- >>>>>>> If you only see yourself as part of the team but you don't see your >>>>>>> team as part of yourself you have already failed as part of the team. >>>>>>> >>>>>> >>>>>> >>>>> >>>>> >>>>> -- >>>>> If you only see yourself as part of the team but you don't see your >>>>> team as part of yourself you have already failed as part of the team. >>>>> >>>> >>>> >>> >>> >>> -- >>> If you only see yourself as part of the team but you don't see your team >>> as part of yourself you have already failed as part of the team. >>> >> >> > > > -- > If you only see yourself as part of the team but you don't see your team > as part of yourself you have already failed as part of the team. > > >