From 6b760471ed6cd50afa7cf25e1254eb736b91dbee Mon Sep 17 00:00:00 2001 From: opnsense Date: Tue, 30 Jan 2024 00:07:53 +1030 Subject: [PATCH] Upload files to "/" --- ...-gondor2.dss.mywire.org-20240130000703.xml | 3348 +++++++++++++++++ 1 file changed, 3348 insertions(+) create mode 100644 config-gondor2.dss.mywire.org-20240130000703.xml diff --git a/config-gondor2.dss.mywire.org-20240130000703.xml b/config-gondor2.dss.mywire.org-20240130000703.xml new file mode 100644 index 0000000..41396a5 --- /dev/null +++ b/config-gondor2.dss.mywire.org-20240130000703.xml @@ -0,0 +1,3348 @@ + + + opnsense + + + Increase UFS read-ahead speeds to match the state of hard drives and NCQ. + vfs.read_max + default + + + Set the ephemeral port range to be lower. + net.inet.ip.portrange.first + default + + + Drop packets to closed TCP ports without returning a RST + net.inet.tcp.blackhole + default + + + Do not send ICMP port unreachable messages for closed UDP ports + net.inet.udp.blackhole + default + + + Randomize the ID field in IP packets + net.inet.ip.random_id + default + + + + Source routing is another way for an attacker to try to reach non-routable addresses behind your box. + It can also be used to probe for information about your internal networks. These functions come enabled + as part of the standard FreeBSD core system. + + net.inet.ip.sourceroute + default + + + + Source routing is another way for an attacker to try to reach non-routable addresses behind your box. + It can also be used to probe for information about your internal networks. These functions come enabled + as part of the standard FreeBSD core system. + + net.inet.ip.accept_sourceroute + default + + + + This option turns off the logging of redirect packets because there is no limit and this could fill + up your logs consuming your whole hard drive. + + net.inet.icmp.log_redirect + default + + + Drop SYN-FIN packets (breaks RFC1379, but nobody uses it anyway) + net.inet.tcp.drop_synfin + default + + + Enable sending IPv6 redirects + net.inet6.ip6.redirect + default + + + Enable privacy settings for IPv6 (RFC 4941) + net.inet6.ip6.use_tempaddr + default + + + Prefer privacy addresses and use them over the normal addresses + net.inet6.ip6.prefer_tempaddr + default + + + Generate SYN cookies for outbound SYN-ACK packets + net.inet.tcp.syncookies + default + + + Maximum incoming/outgoing TCP datagram size (receive) + net.inet.tcp.recvspace + default + + + Maximum incoming/outgoing TCP datagram size (send) + net.inet.tcp.sendspace + default + + + Do not delay ACK to try and piggyback it onto a data packet + net.inet.tcp.delayed_ack + default + + + Maximum outgoing UDP datagram size + net.inet.udp.maxdgram + default + + + Handling of non-IP packets which are not passed to pfil (see if_bridge(4)) + net.link.bridge.pfil_onlyip + default + + + Set to 1 to additionally filter on the physical interface for locally destined packets + net.link.bridge.pfil_local_phys + default + + + Set to 0 to disable filtering on the incoming and outgoing member interfaces. + net.link.bridge.pfil_member + default + + + Set to 1 to enable filtering on the bridge interface + net.link.bridge.pfil_bridge + default + + + Allow unprivileged access to tap(4) device nodes + net.link.tap.user_open + default + + + Randomize PID's (see src/sys/kern/kern_fork.c: sysctl_kern_randompid()) + kern.randompid + default + + + Maximum size of the IP input queue + net.inet.ip.intr_queue_maxlen + default + + + Disable CTRL+ALT+Delete reboot from keyboard. + hw.syscons.kbd_reboot + default + + + Hint at default settings for serial console in case the autodetect is not working + hw.uart.console + default + + + Enable TCP extended debugging + net.inet.tcp.log_debug + default + + + Set ICMP Limits + net.inet.icmp.icmplim + default + + + TCP Offload Engine + net.inet.tcp.tso + default + + + UDP Checksums + net.inet.udp.checksum + default + + + Maximum socket buffer size + kern.ipc.maxsockbuf + default + + + Page Table Isolation (Meltdown mitigation, requires reboot.) + vm.pmap.pti + default + + + Disable Indirect Branch Restricted Speculation (Spectre V2 mitigation) + hw.ibrs_disable + default + + + Hide processes running as other groups + security.bsd.see_other_gids + default + + + Hide processes running as other users + security.bsd.see_other_uids + default + + + Enable/disable sending of ICMP redirects in response to IP packets for which a better, + and for the sender directly reachable, route and next hop is known. + + net.inet.ip.redirect + 0 + + + + Redirect attacks are the purposeful mass-issuing of ICMP type 5 packets. In a normal network, redirects + to the end stations should not be required. This option enables the NIC to drop all inbound ICMP redirect + packets without returning a response. + + net.inet.icmp.drop_redirect + 1 + + + Maximum outgoing UDP datagram size + net.local.dgram.maxdgram + default + + + + normal + gondor2 + dss.mywire.org + 1 + + admins + System Administrators + system + 1999 + 0 + 2000 + page-all + + + root + System Administrator + system + admins + $2y$10$V5R3OFK0X8dz/shqsIj3AuuhVvT/TR8gA6u9s.j0gknxplOMg4tyC + 0 + + + $2y$11$77rIEmn8xjecWoKfve.cZ.Fb5PIDN6PR8mM4MdlHubJiuBMiWacqW + user + dion + Dion + + + + LYA2AG53OBHL35L6NMGE4KEM4ZPHYAWI + dionscarman@gmail.com + 2000 + 65b4a1c0bffcf + + 2001 + 2000 + Australia/Adelaide + 0.opnsense.pool.ntp.org 1.opnsense.pool.ntp.org 2.opnsense.pool.ntp.org 3.opnsense.pool.ntp.org + + http + 60132b5e4fc3d + 8004 + + + + 1 + + yes + 1 + 1 + 1 + 1 + 1 + 1 + + hadp + hadp + hadp + + monthly + + aesni + 1 + 1 + + admins + 1 + + + + + + enabled + 1 + 1 + + + + 0 + + + + + OPNsense-Backup + + + 1 + ssh://omv.dss.mywire.org:222/opnsense/OPNsense.git + main + -----BEGIN OPENSSH PRIVATE KEY----- +b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAABlwAAAAdzc2gtcn +NhAAAAAwEAAQAAAYEA25Gs26MQjjEEZuv6FOIkW0DFRDeclHMVicOSE3XAgB6L7bWUTH6F +O05CDMrJZffv+sAuJsKbX8q4PJ5xIcRhenDhx4Yb3uq67Z0furWNPr/Dxfe3G9y+xLF8ce +UzEmAXhHo55uklZMLJWvO5rgZEf902RZ+SXUr/fc25CQPdyuu40T7tuygMQvJfIwyGKNEM +hVu90yRFJWqkpCfnNigD8IYuGjnrK3rp8W2JSbXL2CTYMQTPR7kpgmmdZlMi/u8SHWVrpE +ii7DfohattUjSrAguXa1PiOoD+KemkiIY+I2Q3qB9lMLOiYSgvcawl4r35MVAGssSXeXbX +gcOQkdsEijWePNLV2HvtsF4XuYxxeyjHN8pGlQ/AypGiFyPO9EjppyRl8xYCHR7dB1Rkt2 +PXX5Ud4ZmXrr5e9ceawOfu/UNPwiNvTP7TV/k/DNjdp0EQPOfnjq2tHI6BxgV3ARQON96y +H1smtKCZW18DOXFPb4KWCMf5tPqt93paoA/BlD+zAAAFkNlJkPjZSZD4AAAAB3NzaC1yc2 +EAAAGBANuRrNujEI4xBGbr+hTiJFtAxUQ3nJRzFYnDkhN1wIAei+21lEx+hTtOQgzKyWX3 +7/rALibCm1/KuDyecSHEYXpw4ceGG97quu2dH7q1jT6/w8X3txvcvsSxfHHlMxJgF4R6Oe +bpJWTCyVrzua4GRH/dNkWfkl1K/33NuQkD3crruNE+7bsoDELyXyMMhijRDIVbvdMkRSVq +pKQn5zYoA/CGLho56yt66fFtiUm1y9gk2DEEz0e5KYJpnWZTIv7vEh1la6RIouw36IWrbV +I0qwILl2tT4jqA/inppIiGPiNkN6gfZTCzomEoL3GsJeK9+TFQBrLEl3l214HDkJHbBIo1 +njzS1dh77bBeF7mMcXsoxzfKRpUPwMqRohcjzvRI6ackZfMWAh0e3QdUZLdj11+VHeGZl6 +6+XvXHmsDn7v1DT8Ijb0z+01f5PwzY3adBEDzn546trRyOgcYFdwEUDjfesh9bJrSgmVtf +AzlxT2+ClgjH+bT6rfd6WqAPwZQ/swAAAAMBAAEAAAGAJ0dsMO5+67EBJJhaaJn7/wcbQx +Tfwf7Ef5yo6SpLgZ/1UFUHbpfDpdReJIOye7dbCvSOTQjLWtudEdsWSgAjoA/JlDP9kGdV +gWR2ZKRN3EfZ8fRaoXVf+zf1Fzr1Y/gkvOJQsWpL8jaWZtrrAKLGZklgiBv/xwi/o/XFgE +NczgxVR7mGNdD4QJGzS0XWSj77im/bCYaXiBYH1gX9asbFzaVzYeWymFiouTPrN3B6QvR0 +aHB/1EjfkCDss31z6T9DHXxFsB8qLF/BMTeus+mkCd/6+giL282bxSplzT0uv3g1ohSPAO +U4MnfJzAZ0TvlOlF3HdWJW4qHtdc3L/WvmTfqTXYFb+vdxG/CRhoCPfw9WopyBLNRhw44f +GAXLIqfXW4isd/3emIvAWUXkrlVfcugJpOEL3+H1MH0mmdIVwi2gpMD7ddbIa54vG/U+K6 +ZTqLJd0ve8zUO2clzz22VOyr0cqwfWdIbXS6XIxSriZ9JidHxlmPBWc0tHfWCrrhWhAAAA +wB47Ju/GHUpX30Hm9LImxZxO89srxHAVLltkANAgO4Ct6rtVMDIjR1fjoV6SEMPwaQQbmq +hi57TNisUZpd2BHgCiVbuepDWTufdVwGNIaFvD3vBXk/19LN60BDCSYRKNE5XINLTRJK+9 +sb/PdDwIaKAUHJIt1nm0XzAWvhQgEb8ZU/JF4z7d+GBPiptPBrEzePXRGI4A3TkTLjBbAd +Jii1mmsGeV1bSxJ2rG+GgzxfGHTVbZFTX/PGfAWkjP4CXRCgAAAMEA807zz3n208xTIjt7 +HXxR7FgIMxa2vt8nxXW00RKr57zOFZSB5EkkCzR5LJKCK7cI49DhAhH23LM7oWJufwGExD +WI1YH87oZeR5o/9qrPwCmH5XJ52HhhvvwiPEcDlphq1PntU8C6TW/ovWNFDZSHmG8cSbYo +g/CAPPdNMpdVgJtf00kaUsKLIeSlr7YeXrsZs79SJ14GEl8UnpivaN7/rNqKc8IHuklm6K +qrcacvXbdj2zfDwA7JkVOqMTl/GH2nAAAAwQDnBbdoZaMFmX3I6Oq0DrsBhmKLOXXNs6oi +/HmM8B8aDMros5DQ0mgoXBSEJ953Dq2fw+Otg6GjpXlLeilAtOihYn0qErbuQGkqtyVtw7 +eTBQ/widn7ywVu+160llPfPYJUCwcmfOCbfSZQRNeZ3mIGvqsawXERhbOyNkBNZ5RqU9o4 +XAfK7zJpHmjBOOK5iILUJClVBcQaVRPB8kcE7EDDh1scm58Z18THfXudFjWr2R78w5weMS +r6xRExm0fWpxUAAAAbcm9vdEBnb25kb3IyLmRzcy5teXdpcmUub3Jn +-----END OPENSSH PRIVATE KEY----- + opnsense + + + + 115200 + video + en_US + + + none + none + none + none + none + none + none + none + + 1 + 1 + + + + os-acme-client,os-ddclient,os-git-backup,os-nginx,os-wol + + + + 5 + + on + 111886561813089399264 + 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 + 1rq_I9W6E96oWuB5tfzLYR2M6Zc_2bgpc + on + 10 + tQ;ELd8"%YW=@VB + + + + + pppoe1 + InternodeNBN + 1 + 1 + + 1 + 1 + pppoe + + + vtnet0 + + 1 + + 10.0.1.1 + 24 + + + 1 + Loopback + 1 + lo0 + 127.0.0.1 + ::1 + 8 + 128 + none + 1 + + + 1 + 1 + openvpn + OpenVPN + group + 1 + + + + + + 1 + hmac-md5 + + + + + 10.0.1.200 + 10.0.1.245 + + + 10.0.1.4 + + + 56:8d:ae:f7:7f:f0 + 10.0.1.4 + bombadil + + + + + + e0:3f:49:b2:12:35 + 10.0.1.11 + omv + OpenMediaVault + 86400 + + + + + + 00:26:6c:28:0a:a1 + 10.0.1.12 + proxmox + + + + + + 32:99:3e:df:d8:50 + 10.0.1.13 + docker + debian ct for docker + + + + + + ba:f3:5a:9e:b7:33 + 10.0.1.15 + nginx + nginx reverse proxy server + + + + + + 3a:2f:5c:14:f2:0b + 10.0.1.21 + nextcloud + Nextcloud turnkey VM + + + + + + 3a:eb:61:8d:27:08 + 10.0.1.22 + seafile + + + + + + 86:fa:fd:13:d4:25 + 10.0.1.23 + heimdall + heimdall application dashboard + + + + + + de:f9:0c:c1:d5:5c + 10.0.1.24 + jellyfin + + + + + + 52:81:b4:45:f0:0a + 10.0.1.25 + elrond + + + + + + 4a:91:89:08:73:d8 + 10.0.1.26 + boromir + + + + + + e2:8b:aa:80:6b:a6 + 10.0.1.27 + ansible + debian ct on rohan + + + + + + d2:40:37:56:ef:6b + 10.0.1.31 + mc1 + minecraft on debian + + + + + + d2:17:2f:bc:1b:16 + 10.0.1.32 + mc2 + + + + + + 06:98:19:95:51:21 + 10.0.1.33 + minecraft3 + minecraft server harry potter + + + + + + c2:ec:33:bb:bb:f8 + 10.0.1.34 + minecraft4 + minecraft server for HTTYD + + + + + + 8e:61:fc:24:89:85 + 10.0.1.41 + certbot-vm + certbot vm for testing + + + + + + de:24:76:34:28:8f + 10.0.1.43 + tvheadend + tvheadend server on (rohan) + + + + + + ea:e6:3f:bc:dd:36 + 10.0.1.51 + mc1-test + minecraft server 1 + + + + + + dc:a6:32:e0:85:2a + 10.0.1.61 + kodi + + + + + + 7a:72:1a:bd:a1:98 + 10.0.1.81 + web1 + test web server #1 + + + + + + ca:c0:3e:24:99:03 + 10.0.1.82 + web2 + test web server #2 + + + + + + bc:ae:c5:76:86:84 + 10.0.1.99 + omvslah + Skyes OpenMediaVault + + + + + + 4a:02:45:30:ea:02 + 10.0.1.100 + debian + + + + + + 18:c0:4d:db:2a:7c + 10.0.1.101 + SimRig + Sim Racing PC + + + + + + f4:8c:50:1a:36:9b + 10.0.1.102 + dion-latitude + + + + + + 66:a3:f0:c7:5e:89 + 10.0.1.103 + debian2 + debian2 vm + + + + + + 7a:3b:72:16:fd:b3 + 10.0.1.104 + vm-desktop + alpine linux with wm + + + + + + 8c:88:2b:00:10:8d + 10.0.1.105 + games2 + Gaming PC for the boys. GTX 570Ti + + + + + + 08:d4:0c:64:98:ad + 10.0.1.106 + Logan-Archie-Harry + Laptop for the boys + + + + + + 26:50:b1:d7:14:7b + 10.0.1.111 + pocof3 + poco F3 android + + + + + + 52:fe:2b:0e:1c:89 + 10.0.1.112 + pocof1 + Poco F1 android + + + + + + ec:71:db:49:8e:24 + 10.0.1.121 + Camera1 + + + + + + ec:71:db:8c:07:4e + 10.0.1.122 + Camera2 + + + + + + 16:e9:1e:ab:33:e2 + 10.0.1.131 + Trading-PC + Win10 Virtual PC for trading + + + + + + b2:b7:70:3a:28:41 + 10.0.1.132 + debian-vm + debian VM with desktop + + + + + + c6:19:1e:a6:d6:fc + 10.0.1.151 + hass + + + + + + 08:d4:2b:13:8d:d8 + 10.0.1.152 + nexus10 + Nexus 10 Android Tablet + + + + + + dc:a6:32:e0:85:29 + 10.0.1.161 + Legolas + Legolas ethernet + + + + + + fc:aa:14:c1:5a:9b + 10.0.1.165 + games2-lan + Boys Gaming PC ethernet connection + + + + + + 40:55:39:cc:77:00 + 10.0.1.250 + anduin + Cisco router + + + + + + + 1 + hmac-md5 + + + + + 10.0.3.201 + 10.0.3.230 + + + + + + + + + + public + + + + + + + automatic + + + tcp + wan + + inet + HASS.io + + + + nat_603a219d254010.34486638 + 10.0.1.151 + 8123 + + 1 + + + wanip + 8123 + + + root@10.0.1.100 + + /firewall_nat_edit.php made changes + + + root@10.0.1.201 + + /firewall_nat_edit.php made changes + + + + tcp + wan + + inet + debian vm + + + + nat_603a31025c4875.51279624 + 10.0.1.100 + 22 + + 1 + + + wanip + 22 + + + root@10.0.1.100 + + /firewall_nat_edit.php made changes + + + root@10.0.1.201 + + /firewall_nat_edit.php made changes + + + + tcp + wan + + inet + debian2 vm + + + + nat_61fe6823a62ff9.38653503 + 10.0.1.103 + 22 + + 1 + + + wanip + 22 + + + root@10.0.1.102 + + /firewall_nat_edit.php made changes + + + root@10.0.1.100 + + /firewall_nat_edit.php made changes + + 1 + + + tcp + wan + + inet + nginx reverse proxy ssl + + + + nat_609ab30d1bcb08.88985266 + 10.0.1.15 + 443 + + 1 + + + wanip + 443 + + + root@10.0.1.100 + + /firewall_nat_edit.php made changes + + + root@10.0.8.6 + + /firewall_nat_edit.php made changes + + + + tcp + wan + + inet + minecraft java mc1 + + + + nat_6189c4e0d85e51.54054052 + 10.0.1.105 + 25565 + + 1 + + + wanip + 25565 + + + root@10.0.1.131 + + /firewall_nat_edit.php made changes + + + root@10.0.1.201 + + /firewall_nat_edit.php made changes + + + + tcp + wan + + inet + minecraft java mc2 + + + + nat_61eca513f3ab54.12999814 + 10.0.1.32 + 25566 + + 1 + + + wanip + 25566 + + + root@10.0.1.100 + + /firewall_nat_edit.php made changes + + + root@10.0.1.201 + + /firewall_nat_edit.php made changes + + + + tcp + wan + + inet + minecraft3 java + + + + nat_61f372df8b6171.53361896 + 10.0.1.33 + 25567 + + 1 + + + wanip + 25567 + + + root@10.0.1.201 + + /firewall_nat_edit.php made changes + + + root@10.0.1.201 + + /firewall_nat_edit.php made changes + + 1 + + + tcp + wan + + inet + minecraft4 java + + + + nat_61f373074cc973.44719320 + 10.0.1.34 + 25568 + + 1 + + + wanip + 25568 + + + root@10.0.1.201 + + /firewall_nat_edit.php made changes + + + root@10.0.1.201 + + /firewall_nat_edit.php made changes + + 1 + + + udp + wan + + inet + minecraft bedrock mc1 + + + + pass + 10.0.1.105 + 19132 + + 1 + + + wanip + 19132 + + + root@10.0.1.131 + + /firewall_nat_edit.php made changes + + + root@10.0.1.201 + + /firewall_nat_edit.php made changes + + + + udp + wan + + inet + minecraft bedrock mc2 + + + + nat_61eca544a8b730.21185118 + 10.0.1.32 + 19133 + + 1 + + + wanip + 19133 + + + root@10.0.1.100 + + /firewall_nat_edit.php made changes + + + root@10.0.1.201 + + /firewall_nat_edit.php made changes + + + + udp + wan + + inet + minecraft3 bedrock + + + + nat_61f3734f494c02.95558635 + 10.0.1.33 + 19134 + + 1 + + + wanip + 19134 + + + root@10.0.1.201 + + /firewall_nat_edit.php made changes + + + root@10.0.1.201 + + /firewall_nat_edit.php made changes + + 1 + + + udp + wan + + inet + minecraft4 bedrock + + + + nat_61f3736fb310c2.90636878 + 10.0.1.34 + 19135 + + 1 + + + wanip + 19135 + + + root@10.0.1.201 + + /firewall_nat_edit.php made changes + + + root@10.0.1.201 + + /firewall_nat_edit.php made changes + + 1 + + + tcp + wan + + inet + nginx reverse proxy server + + + + nat_61d69bc2d88db3.30171087 + 10.0.1.15 + 80 + + 1 + + + wanip + 80 + + + root@10.0.1.100 + + /firewall_nat_edit.php made changes + + + root@10.0.1.100 + + /firewall_nat_edit.php made changes + + + + tcp + wan + + inet + Jellyfin services + + + + nat_61f140996d6708.06843852 + 10.0.1.24 + 8096 + + 1 + + + wanip + 8096 + + + root@10.0.1.100 + + /firewall_nat_edit.php made changes + + + root@10.0.1.100 + + /firewall_nat_edit.php made changes + + + + tcp + wan + + inet + bitwarden + + + + nat_62261aed26de09.52732628 + 10.0.1.11 + 18080 + + 1 + + + wanip + 18080 + + + root@10.0.1.201 + + /firewall_nat_edit.php made changes + + + root@10.0.1.201 + + /firewall_nat_edit.php made changes + + 1 + + + udp + wan + + inet + + + + + nat_62cc09e3b73e87.61248567 + 10.0.1.102 + 3478 + + 1 + + + wanip + 3478 + + + root@10.0.1.102 + + /firewall_nat_edit.php made changes + + + root@10.0.1.102 + + /firewall_nat_edit.php made changes + + 1 + + + udp + wan + + inet + + + + + nat_62cc0a1f5e00c2.77730298 + 10.0.1.102 + 4379 + + 1 + + + wanip + 4379-4380 + + + root@10.0.1.102 + + /firewall_nat_edit.php made changes + + + root@10.0.1.102 + + /firewall_nat_edit.php made changes + + 1 + + + tcp/udp + wan + + inet + Stick Fight the Game + + + + nat_62cc0abca222d4.02229027 + 10.0.1.101 + 27015 + + 1 + + + wanip + 27015 + + + root@10.0.1.101 + + /firewall_nat_edit.php made changes + + + root@10.0.1.102 + + /firewall_nat_edit.php made changes + + 1 + + + tcp/udp + wan + + inet + + + + + nat_62dfdf81c63009.25391203 + 10.0.1.11 + 6881 + + 1 + + + wanip + 6881 + + + root@10.0.1.102 + + /firewall_nat_edit.php made changes + + + root@10.0.1.102 + + /firewall_nat_edit.php made changes + + + + tcp/udp + wan + + inet + + + + + nat_62e3ed166f0e56.88516001 + 10.0.1.101 + 24642 + + 1 + + + wanip + 24642 + + + root@10.0.1.101 + + /firewall_nat_edit.php made changes + + + root@10.0.1.101 + + /firewall_nat_edit.php made changes + + 1 + + + tcp + wan + + inet + + + + + nat_65b268fb447592.11055352 + 10.0.1.11 + 2283 + + 1 + + + wanip + 2283 + + + root@10.0.1.131 + + /firewall_nat_edit.php made changes + + + root@10.0.1.131 + + /firewall_nat_edit.php made changes + + + + + + + 1 + + wan + keep state + tcp + inet + +
10.0.1.151
+ 8123 +
+ HASS.io + + nat_603a219d254010.34486638 + + root@10.0.1.201 + + /firewall_nat_edit.php made changes + +
+ + + 1 + + wan + keep state + tcp + inet + +
10.0.1.100
+ 22 +
+ debian vm + + nat_603a31025c4875.51279624 + + root@10.0.1.201 + + /firewall_nat_edit.php made changes + +
+ + pass + wan + inet + keep state + Allow VPN Traffic + in + 1 + 1 + udp + + 1 + + + 1 + 1194 + + + root@10.0.1.100 + + /firewall_rules_edit.php made changes + + + root@10.0.1.100 + + /firewall_rules_edit.php made changes + + + + + 1 + + wan + keep state + tcp + inet + +
10.0.1.15
+ 443 +
+ nginx reverse proxy ssl + + nat_609ab30d1bcb08.88985266 + + root@10.0.8.6 + + /firewall_nat_edit.php made changes + +
+ + + 1 + + wan + keep state + tcp + inet + +
10.0.1.105
+ 25565 +
+ minecraft java mc1 + + nat_6189c4e0d85e51.54054052 + + root@10.0.1.201 + + /firewall_nat_edit.php made changes + +
+ + + 1 + + wan + keep state + tcp + inet + +
10.0.1.15
+ 80 +
+ nginx reverse proxy server + + nat_61d69bc2d88db3.30171087 + + root@10.0.1.100 + + /firewall_nat_edit.php made changes + +
+ + + 1 + + wan + keep state + tcp + inet + +
10.0.1.32
+ 25566 +
+ minecraft java mc2 + + nat_61eca513f3ab54.12999814 + + root@10.0.1.201 + + /firewall_nat_edit.php made changes + +
+ + + 1 + + wan + keep state + udp + inet + +
10.0.1.32
+ 19133 +
+ minecraft bedrock mc2 + + nat_61eca544a8b730.21185118 + + root@10.0.1.201 + + /firewall_nat_edit.php made changes + +
+ + + 1 + + wan + keep state + tcp + inet + +
10.0.1.24
+ 8096 +
+ Jellyfin services + + nat_61f140996d6708.06843852 + + root@10.0.1.100 + + /firewall_nat_edit.php made changes + +
+ + + 1 + + wan + keep state + tcp + inet + +
10.0.1.33
+ 25567 +
+ minecraft3 java + + nat_61f372df8b6171.53361896 + + root@10.0.1.201 + + /firewall_nat_edit.php made changes + +
+ + + 1 + + wan + keep state + tcp + inet + +
10.0.1.34
+ 25568 +
+ minecraft4 java + + nat_61f373074cc973.44719320 + + root@10.0.1.201 + + /firewall_nat_edit.php made changes + +
+ + + 1 + + wan + keep state + udp + inet + +
10.0.1.33
+ 19134 +
+ minecraft3 bedrock + + nat_61f3734f494c02.95558635 + + root@10.0.1.201 + + /firewall_nat_edit.php made changes + +
+ + + 1 + + wan + keep state + udp + inet + +
10.0.1.34
+ 19135 +
+ minecraft4 bedrock + + nat_61f3736fb310c2.90636878 + + root@10.0.1.201 + + /firewall_nat_edit.php made changes + +
+ + + 1 + + wan + keep state + tcp + inet + +
10.0.1.103
+ 22 +
+ debian2 vm + + nat_61fe6823a62ff9.38653503 + + root@10.0.1.100 + + /firewall_nat_edit.php made changes + +
+ + + 1 + + wan + keep state + tcp + inet + +
10.0.1.11
+ 18080 +
+ bitwarden + + nat_62261aed26de09.52732628 + + root@10.0.1.201 + + /firewall_nat_edit.php made changes + + 1 +
+ + + 1 + + wan + keep state + udp + inet + +
10.0.1.102
+ 3478 +
+ + + nat_62cc09e3b73e87.61248567 + + root@10.0.1.102 + + /firewall_nat_edit.php made changes + +
+ + + 1 + + wan + keep state + udp + inet + +
10.0.1.102
+ 4379-4380 +
+ + + nat_62cc0a1f5e00c2.77730298 + + root@10.0.1.102 + + /firewall_nat_edit.php made changes + +
+ + + 1 + + wan + keep state + tcp/udp + inet + +
10.0.1.101
+ 27015 +
+ Stick Fight the Game + + nat_62cc0abca222d4.02229027 + + root@10.0.1.102 + + /firewall_nat_edit.php made changes + +
+ + + 1 + + wan + keep state + tcp/udp + inet + +
10.0.1.11
+ 6881 +
+ + + nat_62dfdf81c63009.25391203 + + root@10.0.1.102 + + /firewall_nat_edit.php made changes + +
+ + + 1 + + wan + keep state + tcp/udp + inet + +
10.0.1.101
+ 24642 +
+ + + nat_62e3ed166f0e56.88516001 + + root@10.0.1.101 + + /firewall_nat_edit.php made changes + +
+ + nat_65b268fb447592.11055352 + + 1 + + wan + keep state + tcp + inet + +
10.0.1.11
+ 2283 +
+ + + + root@10.0.1.131 + + /firewall_nat_edit.php made changes + +
+ + pass + inet + Default allow LAN to any rule + lan + + lan + + + + + + + pass + inet6 + Default allow LAN IPv6 to any rule + lan + + lan + + + + + + + pass + lan + inet + keep state + Allow OpenVPN traffic + in + 1 + + openvpn + + + 1 + + + root@10.0.1.131 + + /firewall_rules_edit.php made changes + + + root@10.0.1.131 + + /firewall_rules_edit.php made changes + + + + OpenVPN wizard + in + + 1 + + + anyip + 1194 + + any + udp + pass + on + + root@10.0.1.100 + + /wizard.php made changes + + + + pass + openvpn + inet + keep state + OpenVPN wizard + in + 1 + +
10.0.8.0/24
+ + + 1 + + + root@10.0.1.100 + + /firewall_rules_edit.php made changes + + + root@10.0.1.100 + + /wizard.php made changes + +
+
+ + + + + + ICMP + icmp + ICMP + + + + TCP + tcp + Generic TCP + + + + HTTP + http + Generic HTTP + + / + + 200 + + + + HTTPS + https + Generic HTTPS + + / + + 200 + + + + SMTP + send + Generic SMTP + + + 220 * + + + + + 0.opnsense.pool.ntp.org + + + system_information-container:00000000-col3:show,services_status-container:00000001-col4:show,gateways-container:00000002-col4:show,interface_list-container:00000003-col4:show + 2 + + + root@10.0.1.102 + /diag_backup.php made changes + + + + + + + + + + + + + + + + + + + + + + + + + + + + + 0 + 0 + 0 + wan + 192.168.0.0/16,10.0.0.0/8,172.16.0.0/12 + + + W0D23 + 4 + ac + + medium + + + + 0 + 0 + 0 + + + + + + + + + + + + + + + + + 0 + opnsense + + + + 1 + 1 + + + + + + 0 + on + strip + 1 + 1 + 0 + + admin@localhost.local + + + + 0 + /var/squid/cache + 256 + + + always + 100 + 16 + 256 + 0 + 0 + + + + 0 + 2048 + 1024 + 1024 + 256 + + + 0 + + 0 + username + password + + + + + + + lan + 3128 + 3129 + 0 + 0 + + + 4 + 5 + 0 + 3401 + public + + 2121 + 0 + 1 + 0 + + + + + + + + + + + 80:http,21:ftp,443:https,70:gopher,210:wais,1025-65535:unregistered ports,280:http-mgmt,488:gss-http,591:filemaker,777:multiling http + 443:https + + + + + + + 0 + icap://[::1]:1344/avscan + icap://[::1]:1344/avscan + 1 + 0 + 0 + X-Username + 1 + 1024 + 60 + + + + + + OPNsense proxy authentication + 2 + 5 + + + + +