the interesting bit
tftp-enforce bypass is using IP.IP.**.*:d11_unauthorized.cm
Initiating fake TFTP Get (tftp-enforce bypass)
Bypass succeeded.File was 6816 bytes
Storing received cfg of size 6816 to memory
Now if only I found a way to get around it

turn off tftp bypass? or are your certs not from a paying subscriber
Certs are from a sub. I unchecked enable tftp bypass in haxorware, but that didn't help. Is there a telnet command for it maybe?
Someone posted this about my logs on a different forum
"Your on a closed NODE and TFTP Bypass is being forced, so NO hosting your own config and the un-authorized.cm means exactly what it says. Your NODE has had or has right now, a high level of Theft Of Service..Thus the "closed" NODE"
there is no such thing as a closed node(d3 is a different matter), some have more security than others and are extremely hard but the holes are still there
Get a new dump man. Your mac is unauthorized on that node/ location. If you can trick your cmts that your not from that node then maybe you get authorized.