diff --git a/config-gondor2.dss.mywire.org-20240130000703.xml b/config-gondor2.dss.mywire.org-20240130000703.xml deleted file mode 100644 index 41396a5..0000000 --- a/config-gondor2.dss.mywire.org-20240130000703.xml +++ /dev/null @@ -1,3348 +0,0 @@ - - - opnsense - - - Increase UFS read-ahead speeds to match the state of hard drives and NCQ. - vfs.read_max - default - - - Set the ephemeral port range to be lower. - net.inet.ip.portrange.first - default - - - Drop packets to closed TCP ports without returning a RST - net.inet.tcp.blackhole - default - - - Do not send ICMP port unreachable messages for closed UDP ports - net.inet.udp.blackhole - default - - - Randomize the ID field in IP packets - net.inet.ip.random_id - default - - - - Source routing is another way for an attacker to try to reach non-routable addresses behind your box. - It can also be used to probe for information about your internal networks. These functions come enabled - as part of the standard FreeBSD core system. - - net.inet.ip.sourceroute - default - - - - Source routing is another way for an attacker to try to reach non-routable addresses behind your box. - It can also be used to probe for information about your internal networks. These functions come enabled - as part of the standard FreeBSD core system. - - net.inet.ip.accept_sourceroute - default - - - - This option turns off the logging of redirect packets because there is no limit and this could fill - up your logs consuming your whole hard drive. - - net.inet.icmp.log_redirect - default - - - Drop SYN-FIN packets (breaks RFC1379, but nobody uses it anyway) - net.inet.tcp.drop_synfin - default - - - Enable sending IPv6 redirects - net.inet6.ip6.redirect - default - - - Enable privacy settings for IPv6 (RFC 4941) - net.inet6.ip6.use_tempaddr - default - - - Prefer privacy addresses and use them over the normal addresses - net.inet6.ip6.prefer_tempaddr - default - - - Generate SYN cookies for outbound SYN-ACK packets - net.inet.tcp.syncookies - default - - - Maximum incoming/outgoing TCP datagram size (receive) - net.inet.tcp.recvspace - default - - - Maximum incoming/outgoing TCP datagram size (send) - net.inet.tcp.sendspace - default - - - Do not delay ACK to try and piggyback it onto a data packet - net.inet.tcp.delayed_ack - default - - - Maximum outgoing UDP datagram size - net.inet.udp.maxdgram - default - - - Handling of non-IP packets which are not passed to pfil (see if_bridge(4)) - net.link.bridge.pfil_onlyip - default - - - Set to 1 to additionally filter on the physical interface for locally destined packets - net.link.bridge.pfil_local_phys - default - - - Set to 0 to disable filtering on the incoming and outgoing member interfaces. - net.link.bridge.pfil_member - default - - - Set to 1 to enable filtering on the bridge interface - net.link.bridge.pfil_bridge - default - - - Allow unprivileged access to tap(4) device nodes - net.link.tap.user_open - default - - - Randomize PID's (see src/sys/kern/kern_fork.c: sysctl_kern_randompid()) - kern.randompid - default - - - Maximum size of the IP input queue - net.inet.ip.intr_queue_maxlen - default - - - Disable CTRL+ALT+Delete reboot from keyboard. - hw.syscons.kbd_reboot - default - - - Hint at default settings for serial console in case the autodetect is not working - hw.uart.console - default - - - Enable TCP extended debugging - net.inet.tcp.log_debug - default - - - Set ICMP Limits - net.inet.icmp.icmplim - default - - - TCP Offload Engine - net.inet.tcp.tso - default - - - UDP Checksums - net.inet.udp.checksum - default - - - Maximum socket buffer size - kern.ipc.maxsockbuf - default - - - Page Table Isolation (Meltdown mitigation, requires reboot.) - vm.pmap.pti - default - - - Disable Indirect Branch Restricted Speculation (Spectre V2 mitigation) - hw.ibrs_disable - default - - - Hide processes running as other groups - security.bsd.see_other_gids - default - - - Hide processes running as other users - security.bsd.see_other_uids - default - - - Enable/disable sending of ICMP redirects in response to IP packets for which a better, - and for the sender directly reachable, route and next hop is known. - - net.inet.ip.redirect - 0 - - - - Redirect attacks are the purposeful mass-issuing of ICMP type 5 packets. In a normal network, redirects - to the end stations should not be required. This option enables the NIC to drop all inbound ICMP redirect - packets without returning a response. - - net.inet.icmp.drop_redirect - 1 - - - Maximum outgoing UDP datagram size - net.local.dgram.maxdgram - default - - - - normal - gondor2 - dss.mywire.org - 1 - - admins - System Administrators - system - 1999 - 0 - 2000 - page-all - - - root - System Administrator - system - admins - $2y$10$V5R3OFK0X8dz/shqsIj3AuuhVvT/TR8gA6u9s.j0gknxplOMg4tyC - 0 - - - $2y$11$77rIEmn8xjecWoKfve.cZ.Fb5PIDN6PR8mM4MdlHubJiuBMiWacqW - user - dion - Dion - - - - LYA2AG53OBHL35L6NMGE4KEM4ZPHYAWI - dionscarman@gmail.com - 2000 - 65b4a1c0bffcf - - 2001 - 2000 - Australia/Adelaide - 0.opnsense.pool.ntp.org 1.opnsense.pool.ntp.org 2.opnsense.pool.ntp.org 3.opnsense.pool.ntp.org - - http - 60132b5e4fc3d - 8004 - - - - 1 - - yes - 1 - 1 - 1 - 1 - 1 - 1 - - hadp - hadp - hadp - - monthly - - aesni - 1 - 1 - - admins - 1 - - - - - - enabled - 1 - 1 - - - - 0 - - - - - OPNsense-Backup - - - 1 - ssh://omv.dss.mywire.org:222/opnsense/OPNsense.git - main - -----BEGIN OPENSSH PRIVATE KEY----- -b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAABlwAAAAdzc2gtcn -NhAAAAAwEAAQAAAYEA25Gs26MQjjEEZuv6FOIkW0DFRDeclHMVicOSE3XAgB6L7bWUTH6F -O05CDMrJZffv+sAuJsKbX8q4PJ5xIcRhenDhx4Yb3uq67Z0furWNPr/Dxfe3G9y+xLF8ce -UzEmAXhHo55uklZMLJWvO5rgZEf902RZ+SXUr/fc25CQPdyuu40T7tuygMQvJfIwyGKNEM -hVu90yRFJWqkpCfnNigD8IYuGjnrK3rp8W2JSbXL2CTYMQTPR7kpgmmdZlMi/u8SHWVrpE -ii7DfohattUjSrAguXa1PiOoD+KemkiIY+I2Q3qB9lMLOiYSgvcawl4r35MVAGssSXeXbX -gcOQkdsEijWePNLV2HvtsF4XuYxxeyjHN8pGlQ/AypGiFyPO9EjppyRl8xYCHR7dB1Rkt2 -PXX5Ud4ZmXrr5e9ceawOfu/UNPwiNvTP7TV/k/DNjdp0EQPOfnjq2tHI6BxgV3ARQON96y -H1smtKCZW18DOXFPb4KWCMf5tPqt93paoA/BlD+zAAAFkNlJkPjZSZD4AAAAB3NzaC1yc2 -EAAAGBANuRrNujEI4xBGbr+hTiJFtAxUQ3nJRzFYnDkhN1wIAei+21lEx+hTtOQgzKyWX3 -7/rALibCm1/KuDyecSHEYXpw4ceGG97quu2dH7q1jT6/w8X3txvcvsSxfHHlMxJgF4R6Oe -bpJWTCyVrzua4GRH/dNkWfkl1K/33NuQkD3crruNE+7bsoDELyXyMMhijRDIVbvdMkRSVq -pKQn5zYoA/CGLho56yt66fFtiUm1y9gk2DEEz0e5KYJpnWZTIv7vEh1la6RIouw36IWrbV -I0qwILl2tT4jqA/inppIiGPiNkN6gfZTCzomEoL3GsJeK9+TFQBrLEl3l214HDkJHbBIo1 -njzS1dh77bBeF7mMcXsoxzfKRpUPwMqRohcjzvRI6ackZfMWAh0e3QdUZLdj11+VHeGZl6 -6+XvXHmsDn7v1DT8Ijb0z+01f5PwzY3adBEDzn546trRyOgcYFdwEUDjfesh9bJrSgmVtf -AzlxT2+ClgjH+bT6rfd6WqAPwZQ/swAAAAMBAAEAAAGAJ0dsMO5+67EBJJhaaJn7/wcbQx -Tfwf7Ef5yo6SpLgZ/1UFUHbpfDpdReJIOye7dbCvSOTQjLWtudEdsWSgAjoA/JlDP9kGdV -gWR2ZKRN3EfZ8fRaoXVf+zf1Fzr1Y/gkvOJQsWpL8jaWZtrrAKLGZklgiBv/xwi/o/XFgE -NczgxVR7mGNdD4QJGzS0XWSj77im/bCYaXiBYH1gX9asbFzaVzYeWymFiouTPrN3B6QvR0 -aHB/1EjfkCDss31z6T9DHXxFsB8qLF/BMTeus+mkCd/6+giL282bxSplzT0uv3g1ohSPAO -U4MnfJzAZ0TvlOlF3HdWJW4qHtdc3L/WvmTfqTXYFb+vdxG/CRhoCPfw9WopyBLNRhw44f -GAXLIqfXW4isd/3emIvAWUXkrlVfcugJpOEL3+H1MH0mmdIVwi2gpMD7ddbIa54vG/U+K6 -ZTqLJd0ve8zUO2clzz22VOyr0cqwfWdIbXS6XIxSriZ9JidHxlmPBWc0tHfWCrrhWhAAAA -wB47Ju/GHUpX30Hm9LImxZxO89srxHAVLltkANAgO4Ct6rtVMDIjR1fjoV6SEMPwaQQbmq -hi57TNisUZpd2BHgCiVbuepDWTufdVwGNIaFvD3vBXk/19LN60BDCSYRKNE5XINLTRJK+9 -sb/PdDwIaKAUHJIt1nm0XzAWvhQgEb8ZU/JF4z7d+GBPiptPBrEzePXRGI4A3TkTLjBbAd -Jii1mmsGeV1bSxJ2rG+GgzxfGHTVbZFTX/PGfAWkjP4CXRCgAAAMEA807zz3n208xTIjt7 -HXxR7FgIMxa2vt8nxXW00RKr57zOFZSB5EkkCzR5LJKCK7cI49DhAhH23LM7oWJufwGExD -WI1YH87oZeR5o/9qrPwCmH5XJ52HhhvvwiPEcDlphq1PntU8C6TW/ovWNFDZSHmG8cSbYo -g/CAPPdNMpdVgJtf00kaUsKLIeSlr7YeXrsZs79SJ14GEl8UnpivaN7/rNqKc8IHuklm6K -qrcacvXbdj2zfDwA7JkVOqMTl/GH2nAAAAwQDnBbdoZaMFmX3I6Oq0DrsBhmKLOXXNs6oi -/HmM8B8aDMros5DQ0mgoXBSEJ953Dq2fw+Otg6GjpXlLeilAtOihYn0qErbuQGkqtyVtw7 -eTBQ/widn7ywVu+160llPfPYJUCwcmfOCbfSZQRNeZ3mIGvqsawXERhbOyNkBNZ5RqU9o4 -XAfK7zJpHmjBOOK5iILUJClVBcQaVRPB8kcE7EDDh1scm58Z18THfXudFjWr2R78w5weMS -r6xRExm0fWpxUAAAAbcm9vdEBnb25kb3IyLmRzcy5teXdpcmUub3Jn ------END OPENSSH PRIVATE KEY----- - opnsense - - - - 115200 - video - en_US - - - none - none - none - none - none - none - none - none - - 1 - 1 - - - - os-acme-client,os-ddclient,os-git-backup,os-nginx,os-wol - - - - 5 - - on - 111886561813089399264 - MIIJqwIBAzCCCWQGCSqGSIb3DQEHAaCCCVUEgglRMIIJTTCCBXEGCSqGSIb3DQEHAaCCBWIEggVeMIIFWjCCBVYGCyqGSIb3DQEMCgECoIIE+zCCBPcwKQYKKoZIhvcNAQwBAzAbBBRiGwbZITGFKChy8NvSZlOi7IrsNgIDAMNQBIIEyPsBv2zebWc1uCSr8XP+yEa6QHnFez9TU13S2x61/NN2bVWqyRrLdbNjykZU4xYpVe94cMSxOYD7nUJMdJ8HmSXaVji555vrMB+5ZtiM2Lk6Hj72vVnShZUO+vYTp0+pCO+vYLdJMDoeAIFpFMClpIAEqBfgSY0tHBRiX3QJ4nFL0T82fMgaLef1hTl5tuyhGUcLA37Eoo3kgXHESyvrsbw6ZU5ud0VXpxey7pFKKHl7CFeXNWBSiNbBFp/qpT0sHrDyeXllLiSg/cC9iofyqdo9L90tYKdCtdRg5NHWuxXbjDoztSvBndDE9VwtQ7YkPytk/sL/v7nrUzHImxJ3I0W49N6yto0FGrM0oLWq0VnfeN42n3eqqzhfqcki65q7uwOQa+B/oV3eihOsROJbYXSO5UFwEsxLxZLB3EDPkVpblcG5/1tsEz5JZcTz/3ivtUHajRC/XsXLCyuNFl9ypN0xVyVt9KpmJaabZAtaH/6YOp3OzCMGwbABHAKiuSuZ5UJaB7wUQgzB8bwMCmGkKQz+Z1rADiciTNkpPqHE5sdpgpox7c55T6KWMPXXCjqkHbhpGZFTN03BVekTlpH+cEq4MxUbliDHW1jT2a1XXkfoHO8fUXOoHw7snUV2Wuw96H9Xtpr8fuftfV/qvZcWNla/Uq9aOL85MaFWEJ8HEAt8uoiT0yJkMuyIVPS5ZOWKbYV2zYx39YueRgzzxX4hZ6OY+L3Pb9G2uqfUJG1R8gL6/yvZqPp8XhAr7Cmua0MuO48b65DN6q+42TupOQZlYI0nhIRhlHae0qI/sdVaifOI7Qv2R8Adi+0CRjOYVDiDDE3b8o8goa8QMS3eJB1tuYd9IO/3hPfmvZutrAJkkj8U7+EapHflUZDw1sRIYa7xnSGbhAQSZHOPqEJkBL2S54lzCAhEczKG+NZx/Lmc+1/5D9BF6zEhXFn3miIl41YXu4ylqMekZv5iAVYYZStJ4IABzS6dwETGz4o7f0RrJmTx/mTbWSK3BpUg+h1gBepKXDymwZ+BjjRPkmWnKelq/XQwMu9s8n2fFRgPOQJRUwNjW1pyTokBcikZV9pCcaeC0I0G6f0c623V1ZyPSQfw+liEi4xX4ksAlwoW6s2aUGaVcBh8c7f6hsuMZYZNBsduLAbALyMMO5cQpYV2KZB0lbDcbZSWYdekoXqmmOJmOTu3Jxsr7/BEeimOy3ni4y8UAmWY40G8y4G7ECEwEnhqq6lwumbi4Iic1krRppKjmK3CktoXWMwqvUEvtTr729AIV5enKJVnLmOfoeIFdW2MPy7IOSIcJJYMJPWChmyx6ucbKpq/LheG7EI5X5lYIn13pqnC3B5IW5Lw65thcBpHgOZyZ3IX8Y9DJ8AkeDGQeSChv+N4rjAGG4LEeQSKTSZfy6jVGdhqgxIfZGVvC96ZSVaRCDa0pkHjWNm64rulb5ptQVlc+yi+UDOzCzZdulRMEVDh6fIA+F9iDoK7imLsRwo4Fiz/s7SqoHsaD+1yu6KD9gwkCOMl01/o6hlt6GQE/UXRQFl/QGGbV6l/FF6yuqgJpR2VzH+VHnKtscESvR40bVf9OyRVMCaitgMuI5tx5yNwolSI3OShrQRQfU6FTF8gZwEFfyp1lDFIMCMGCSqGSIb3DQEJFDEWHhQAcAByAGkAdgBhAHQAZQBrAGUAeTAhBgkqhkiG9w0BCRUxFAQSVGltZSAxNzA2NTEwMTcxMjE0MIID1AYJKoZIhvcNAQcGoIIDxTCCA8ECAQAwggO6BgkqhkiG9w0BBwEwKQYKKoZIhvcNAQwBBjAbBBSbVNl6gddLNCPG4nPmr7z60ft8bAIDAMNQgIIDgKqgPYiykK+RjbqxXAgctRl5byM+gRlsZHxrnB5Zoap4cprSm28RZ5lIuoS4N4kjbs2MjbnCaXC3LjFnSLpiqWuzU8XVAE3Us9owKsnOJzoAyJ2c+/7NXHqaxAXnFuCEuhSpgca9Rnjoz2FP3Wlgr44jFs4tiroWwOLHnnPRUj/WX5OoDIw6Rmn3bFF+Zy63ymauF9W2pW1e32PMUzV18FgcZsr+Su3lsKz0EVi1HTs6qid0bXhF7Tk8FThCtJlB/Q3SzwsJ3rh2A7JimlWrHqocK366WyHD+h0Kcj6UBTzxzgwFoZe3f2EBnoxh/uI6CNG9cIwWbemGrMctf85jPpUq3/C1z/DP3o1KzUydXuFekCH3j/wRniDc9B4/hZq2wPbR4sCFFb0T7wwIXrMkoFXdLnyg0Em4AS6zbzugiOunOlpBLKvFZSayw+1JR52vBwCYsmtwCRwkftXkCJzgX+wORjj/8SHZrUis3EBsgld6Ziuf+o8tdVKrXCIpkRehsvHcKPWRGK3RrPwabYrmXkFGrP+sZsDjkCBGD9kULSlY3DZ1yJrM84ENUMQdxV8t5UMMeCpzKaKJD7uEA2G+LcGSIuRDP+FNfrMVlm5/fQQ2O6YD8pqH6qOWsmLLmesn8+F69vluXB28MddcC2Lxz7aH+1v3QQqju2C2E9L8Zncl5mcTru+AlNTn8gA3IB9Z5OnK41IXCr4VzkAG1WyQ5lSzWZZ8G0cgc8+kUq3j8DYfy76RqC6xVlSrLkypL8gVzmEDIXplvO1fJAn7X+liyaIlthzy/znGWcGcMMkzpA7/DubvmwOKibqx6DAob6390GK6Ala17w+/Qt5ZYHkCClqDcC3FJhFBX7TzoleJZ7l3cITt2vvuPQM7xMk8Gwvb8Pu9hJqqj3gvgCM3Nv/4FRIZxcl5xHMx1AfKgmorx/ZeQ1wMGAk2GDLiOlV6n4BEHr3zrFr7MYR0YjchIxTPsYA/DKylXy6Jy4bJJoGwzo7fK9SmatEFWYJAR/F0R9doBJCUtaPnZKwe+VoQ1QnHThd6LF14SIdeVi+XpIYYjHSCCX8bB18wQOJbd9Eadc441xmTJ64KqPZHDP89AE0ZijZlhPbCUIokJQCt8eTjh+mQAtjb6kDLcve7vqWpRrK9UJ2dNPqr/qvlpQi1UNiDIdsJXtigUs8JAA73BpoW3Kv5MD4wITAJBgUrDgMCGgUABBQE5BctNk/Q49nQSwbxKl2rv9XjOQQU0QcfBgrYmUNhr/047aDhddePCtMCAwGGoA== - 1rq_I9W6E96oWuB5tfzLYR2M6Zc_2bgpc - on - 10 - tQ;ELd8"%YW=@VB - - - - - pppoe1 - InternodeNBN - 1 - 1 - - 1 - 1 - pppoe - - - vtnet0 - - 1 - - 10.0.1.1 - 24 - - - 1 - Loopback - 1 - lo0 - 127.0.0.1 - ::1 - 8 - 128 - none - 1 - - - 1 - 1 - openvpn - OpenVPN - group - 1 - - - - - - 1 - hmac-md5 - - - - - 10.0.1.200 - 10.0.1.245 - - - 10.0.1.4 - - - 56:8d:ae:f7:7f:f0 - 10.0.1.4 - bombadil - - - - - - e0:3f:49:b2:12:35 - 10.0.1.11 - omv - OpenMediaVault - 86400 - - - - - - 00:26:6c:28:0a:a1 - 10.0.1.12 - proxmox - - - - - - 32:99:3e:df:d8:50 - 10.0.1.13 - docker - debian ct for docker - - - - - - ba:f3:5a:9e:b7:33 - 10.0.1.15 - nginx - nginx reverse proxy server - - - - - - 3a:2f:5c:14:f2:0b - 10.0.1.21 - nextcloud - Nextcloud turnkey VM - - - - - - 3a:eb:61:8d:27:08 - 10.0.1.22 - seafile - - - - - - 86:fa:fd:13:d4:25 - 10.0.1.23 - heimdall - heimdall application dashboard - - - - - - de:f9:0c:c1:d5:5c - 10.0.1.24 - jellyfin - - - - - - 52:81:b4:45:f0:0a - 10.0.1.25 - elrond - - - - - - 4a:91:89:08:73:d8 - 10.0.1.26 - boromir - - - - - - e2:8b:aa:80:6b:a6 - 10.0.1.27 - ansible - debian ct on rohan - - - - - - d2:40:37:56:ef:6b - 10.0.1.31 - mc1 - minecraft on debian - - - - - - d2:17:2f:bc:1b:16 - 10.0.1.32 - mc2 - - - - - - 06:98:19:95:51:21 - 10.0.1.33 - minecraft3 - minecraft server harry potter - - - - - - c2:ec:33:bb:bb:f8 - 10.0.1.34 - minecraft4 - minecraft server for HTTYD - - - - - - 8e:61:fc:24:89:85 - 10.0.1.41 - certbot-vm - certbot vm for testing - - - - - - de:24:76:34:28:8f - 10.0.1.43 - tvheadend - tvheadend server on (rohan) - - - - - - ea:e6:3f:bc:dd:36 - 10.0.1.51 - mc1-test - minecraft server 1 - - - - - - dc:a6:32:e0:85:2a - 10.0.1.61 - kodi - - - - - - 7a:72:1a:bd:a1:98 - 10.0.1.81 - web1 - test web server #1 - - - - - - ca:c0:3e:24:99:03 - 10.0.1.82 - web2 - test web server #2 - - - - - - bc:ae:c5:76:86:84 - 10.0.1.99 - omvslah - Skyes OpenMediaVault - - - - - - 4a:02:45:30:ea:02 - 10.0.1.100 - debian - - - - - - 18:c0:4d:db:2a:7c - 10.0.1.101 - SimRig - Sim Racing PC - - - - - - f4:8c:50:1a:36:9b - 10.0.1.102 - dion-latitude - - - - - - 66:a3:f0:c7:5e:89 - 10.0.1.103 - debian2 - debian2 vm - - - - - - 7a:3b:72:16:fd:b3 - 10.0.1.104 - vm-desktop - alpine linux with wm - - - - - - 8c:88:2b:00:10:8d - 10.0.1.105 - games2 - Gaming PC for the boys. GTX 570Ti - - - - - - 08:d4:0c:64:98:ad - 10.0.1.106 - Logan-Archie-Harry - Laptop for the boys - - - - - - 26:50:b1:d7:14:7b - 10.0.1.111 - pocof3 - poco F3 android - - - - - - 52:fe:2b:0e:1c:89 - 10.0.1.112 - pocof1 - Poco F1 android - - - - - - ec:71:db:49:8e:24 - 10.0.1.121 - Camera1 - - - - - - ec:71:db:8c:07:4e - 10.0.1.122 - Camera2 - - - - - - 16:e9:1e:ab:33:e2 - 10.0.1.131 - Trading-PC - Win10 Virtual PC for trading - - - - - - b2:b7:70:3a:28:41 - 10.0.1.132 - debian-vm - debian VM with desktop - - - - - - c6:19:1e:a6:d6:fc - 10.0.1.151 - hass - - - - - - 08:d4:2b:13:8d:d8 - 10.0.1.152 - nexus10 - Nexus 10 Android Tablet - - - - - - dc:a6:32:e0:85:29 - 10.0.1.161 - Legolas - Legolas ethernet - - - - - - fc:aa:14:c1:5a:9b - 10.0.1.165 - games2-lan - Boys Gaming PC ethernet connection - - - - - - 40:55:39:cc:77:00 - 10.0.1.250 - anduin - Cisco router - - - - - - - 1 - hmac-md5 - - - - - 10.0.3.201 - 10.0.3.230 - - - - - - - - - - public - - - - - - - automatic - - - tcp - wan - - inet - HASS.io - - - - nat_603a219d254010.34486638 - 10.0.1.151 - 8123 - - 1 - - - wanip - 8123 - - - root@10.0.1.100 - - /firewall_nat_edit.php made changes - - - root@10.0.1.201 - - /firewall_nat_edit.php made changes - - - - tcp - wan - - inet - debian vm - - - - nat_603a31025c4875.51279624 - 10.0.1.100 - 22 - - 1 - - - wanip - 22 - - - root@10.0.1.100 - - /firewall_nat_edit.php made changes - - - root@10.0.1.201 - - /firewall_nat_edit.php made changes - - - - tcp - wan - - inet - debian2 vm - - - - nat_61fe6823a62ff9.38653503 - 10.0.1.103 - 22 - - 1 - - - wanip - 22 - - - root@10.0.1.102 - - /firewall_nat_edit.php made changes - - - root@10.0.1.100 - - /firewall_nat_edit.php made changes - - 1 - - - tcp - wan - - inet - nginx reverse proxy ssl - - - - nat_609ab30d1bcb08.88985266 - 10.0.1.15 - 443 - - 1 - - - wanip - 443 - - - root@10.0.1.100 - - /firewall_nat_edit.php made changes - - - root@10.0.8.6 - - /firewall_nat_edit.php made changes - - - - tcp - wan - - inet - minecraft java mc1 - - - - nat_6189c4e0d85e51.54054052 - 10.0.1.105 - 25565 - - 1 - - - wanip - 25565 - - - root@10.0.1.131 - - /firewall_nat_edit.php made changes - - - root@10.0.1.201 - - /firewall_nat_edit.php made changes - - - - tcp - wan - - inet - minecraft java mc2 - - - - nat_61eca513f3ab54.12999814 - 10.0.1.32 - 25566 - - 1 - - - wanip - 25566 - - - root@10.0.1.100 - - /firewall_nat_edit.php made changes - - - root@10.0.1.201 - - /firewall_nat_edit.php made changes - - - - tcp - wan - - inet - minecraft3 java - - - - nat_61f372df8b6171.53361896 - 10.0.1.33 - 25567 - - 1 - - - wanip - 25567 - - - root@10.0.1.201 - - /firewall_nat_edit.php made changes - - - root@10.0.1.201 - - /firewall_nat_edit.php made changes - - 1 - - - tcp - wan - - inet - minecraft4 java - - - - nat_61f373074cc973.44719320 - 10.0.1.34 - 25568 - - 1 - - - wanip - 25568 - - - root@10.0.1.201 - - /firewall_nat_edit.php made changes - - - root@10.0.1.201 - - /firewall_nat_edit.php made changes - - 1 - - - udp - wan - - inet - minecraft bedrock mc1 - - - - pass - 10.0.1.105 - 19132 - - 1 - - - wanip - 19132 - - - root@10.0.1.131 - - /firewall_nat_edit.php made changes - - - root@10.0.1.201 - - /firewall_nat_edit.php made changes - - - - udp - wan - - inet - minecraft bedrock mc2 - - - - nat_61eca544a8b730.21185118 - 10.0.1.32 - 19133 - - 1 - - - wanip - 19133 - - - root@10.0.1.100 - - /firewall_nat_edit.php made changes - - - root@10.0.1.201 - - /firewall_nat_edit.php made changes - - - - udp - wan - - inet - minecraft3 bedrock - - - - nat_61f3734f494c02.95558635 - 10.0.1.33 - 19134 - - 1 - - - wanip - 19134 - - - root@10.0.1.201 - - /firewall_nat_edit.php made changes - - - root@10.0.1.201 - - /firewall_nat_edit.php made changes - - 1 - - - udp - wan - - inet - minecraft4 bedrock - - - - nat_61f3736fb310c2.90636878 - 10.0.1.34 - 19135 - - 1 - - - wanip - 19135 - - - root@10.0.1.201 - - /firewall_nat_edit.php made changes - - - root@10.0.1.201 - - /firewall_nat_edit.php made changes - - 1 - - - tcp - wan - - inet - nginx reverse proxy server - - - - nat_61d69bc2d88db3.30171087 - 10.0.1.15 - 80 - - 1 - - - wanip - 80 - - - root@10.0.1.100 - - /firewall_nat_edit.php made changes - - - root@10.0.1.100 - - /firewall_nat_edit.php made changes - - - - tcp - wan - - inet - Jellyfin services - - - - nat_61f140996d6708.06843852 - 10.0.1.24 - 8096 - - 1 - - - wanip - 8096 - - - root@10.0.1.100 - - /firewall_nat_edit.php made changes - - - root@10.0.1.100 - - /firewall_nat_edit.php made changes - - - - tcp - wan - - inet - bitwarden - - - - nat_62261aed26de09.52732628 - 10.0.1.11 - 18080 - - 1 - - - wanip - 18080 - - - root@10.0.1.201 - - /firewall_nat_edit.php made changes - - - root@10.0.1.201 - - /firewall_nat_edit.php made changes - - 1 - - - udp - wan - - inet - - - - - nat_62cc09e3b73e87.61248567 - 10.0.1.102 - 3478 - - 1 - - - wanip - 3478 - - - root@10.0.1.102 - - /firewall_nat_edit.php made changes - - - root@10.0.1.102 - - /firewall_nat_edit.php made changes - - 1 - - - udp - wan - - inet - - - - - nat_62cc0a1f5e00c2.77730298 - 10.0.1.102 - 4379 - - 1 - - - wanip - 4379-4380 - - - root@10.0.1.102 - - /firewall_nat_edit.php made changes - - - root@10.0.1.102 - - /firewall_nat_edit.php made changes - - 1 - - - tcp/udp - wan - - inet - Stick Fight the Game - - - - nat_62cc0abca222d4.02229027 - 10.0.1.101 - 27015 - - 1 - - - wanip - 27015 - - - root@10.0.1.101 - - /firewall_nat_edit.php made changes - - - root@10.0.1.102 - - /firewall_nat_edit.php made changes - - 1 - - - tcp/udp - wan - - inet - - - - - nat_62dfdf81c63009.25391203 - 10.0.1.11 - 6881 - - 1 - - - wanip - 6881 - - - root@10.0.1.102 - - /firewall_nat_edit.php made changes - - - root@10.0.1.102 - - /firewall_nat_edit.php made changes - - - - tcp/udp - wan - - inet - - - - - nat_62e3ed166f0e56.88516001 - 10.0.1.101 - 24642 - - 1 - - - wanip - 24642 - - - root@10.0.1.101 - - /firewall_nat_edit.php made changes - - - root@10.0.1.101 - - /firewall_nat_edit.php made changes - - 1 - - - tcp - wan - - inet - - - - - nat_65b268fb447592.11055352 - 10.0.1.11 - 2283 - - 1 - - - wanip - 2283 - - - root@10.0.1.131 - - /firewall_nat_edit.php made changes - - - root@10.0.1.131 - - /firewall_nat_edit.php made changes - - - - - - - 1 - - wan - keep state - tcp - inet - -
10.0.1.151
- 8123 -
- HASS.io - - nat_603a219d254010.34486638 - - root@10.0.1.201 - - /firewall_nat_edit.php made changes - -
- - - 1 - - wan - keep state - tcp - inet - -
10.0.1.100
- 22 -
- debian vm - - nat_603a31025c4875.51279624 - - root@10.0.1.201 - - /firewall_nat_edit.php made changes - -
- - pass - wan - inet - keep state - Allow VPN Traffic - in - 1 - 1 - udp - - 1 - - - 1 - 1194 - - - root@10.0.1.100 - - /firewall_rules_edit.php made changes - - - root@10.0.1.100 - - /firewall_rules_edit.php made changes - - - - - 1 - - wan - keep state - tcp - inet - -
10.0.1.15
- 443 -
- nginx reverse proxy ssl - - nat_609ab30d1bcb08.88985266 - - root@10.0.8.6 - - /firewall_nat_edit.php made changes - -
- - - 1 - - wan - keep state - tcp - inet - -
10.0.1.105
- 25565 -
- minecraft java mc1 - - nat_6189c4e0d85e51.54054052 - - root@10.0.1.201 - - /firewall_nat_edit.php made changes - -
- - - 1 - - wan - keep state - tcp - inet - -
10.0.1.15
- 80 -
- nginx reverse proxy server - - nat_61d69bc2d88db3.30171087 - - root@10.0.1.100 - - /firewall_nat_edit.php made changes - -
- - - 1 - - wan - keep state - tcp - inet - -
10.0.1.32
- 25566 -
- minecraft java mc2 - - nat_61eca513f3ab54.12999814 - - root@10.0.1.201 - - /firewall_nat_edit.php made changes - -
- - - 1 - - wan - keep state - udp - inet - -
10.0.1.32
- 19133 -
- minecraft bedrock mc2 - - nat_61eca544a8b730.21185118 - - root@10.0.1.201 - - /firewall_nat_edit.php made changes - -
- - - 1 - - wan - keep state - tcp - inet - -
10.0.1.24
- 8096 -
- Jellyfin services - - nat_61f140996d6708.06843852 - - root@10.0.1.100 - - /firewall_nat_edit.php made changes - -
- - - 1 - - wan - keep state - tcp - inet - -
10.0.1.33
- 25567 -
- minecraft3 java - - nat_61f372df8b6171.53361896 - - root@10.0.1.201 - - /firewall_nat_edit.php made changes - -
- - - 1 - - wan - keep state - tcp - inet - -
10.0.1.34
- 25568 -
- minecraft4 java - - nat_61f373074cc973.44719320 - - root@10.0.1.201 - - /firewall_nat_edit.php made changes - -
- - - 1 - - wan - keep state - udp - inet - -
10.0.1.33
- 19134 -
- minecraft3 bedrock - - nat_61f3734f494c02.95558635 - - root@10.0.1.201 - - /firewall_nat_edit.php made changes - -
- - - 1 - - wan - keep state - udp - inet - -
10.0.1.34
- 19135 -
- minecraft4 bedrock - - nat_61f3736fb310c2.90636878 - - root@10.0.1.201 - - /firewall_nat_edit.php made changes - -
- - - 1 - - wan - keep state - tcp - inet - -
10.0.1.103
- 22 -
- debian2 vm - - nat_61fe6823a62ff9.38653503 - - root@10.0.1.100 - - /firewall_nat_edit.php made changes - -
- - - 1 - - wan - keep state - tcp - inet - -
10.0.1.11
- 18080 -
- bitwarden - - nat_62261aed26de09.52732628 - - root@10.0.1.201 - - /firewall_nat_edit.php made changes - - 1 -
- - - 1 - - wan - keep state - udp - inet - -
10.0.1.102
- 3478 -
- - - nat_62cc09e3b73e87.61248567 - - root@10.0.1.102 - - /firewall_nat_edit.php made changes - -
- - - 1 - - wan - keep state - udp - inet - -
10.0.1.102
- 4379-4380 -
- - - nat_62cc0a1f5e00c2.77730298 - - root@10.0.1.102 - - /firewall_nat_edit.php made changes - -
- - - 1 - - wan - keep state - tcp/udp - inet - -
10.0.1.101
- 27015 -
- Stick Fight the Game - - nat_62cc0abca222d4.02229027 - - root@10.0.1.102 - - /firewall_nat_edit.php made changes - -
- - - 1 - - wan - keep state - tcp/udp - inet - -
10.0.1.11
- 6881 -
- - - nat_62dfdf81c63009.25391203 - - root@10.0.1.102 - - /firewall_nat_edit.php made changes - -
- - - 1 - - wan - keep state - tcp/udp - inet - -
10.0.1.101
- 24642 -
- - - nat_62e3ed166f0e56.88516001 - - root@10.0.1.101 - - /firewall_nat_edit.php made changes - -
- - nat_65b268fb447592.11055352 - - 1 - - wan - keep state - tcp - inet - -
10.0.1.11
- 2283 -
- - - - root@10.0.1.131 - - /firewall_nat_edit.php made changes - -
- - pass - inet - Default allow LAN to any rule - lan - - lan - - - - - - - pass - inet6 - Default allow LAN IPv6 to any rule - lan - - lan - - - - - - - pass - lan - inet - keep state - Allow OpenVPN traffic - in - 1 - - openvpn - - - 1 - - - root@10.0.1.131 - - /firewall_rules_edit.php made changes - - - root@10.0.1.131 - - /firewall_rules_edit.php made changes - - - - OpenVPN wizard - in - - 1 - - - anyip - 1194 - - any - udp - pass - on - - root@10.0.1.100 - - /wizard.php made changes - - - - pass - openvpn - inet - keep state - OpenVPN wizard - in - 1 - -
10.0.8.0/24
- - - 1 - - - root@10.0.1.100 - - /firewall_rules_edit.php made changes - - - root@10.0.1.100 - - /wizard.php made changes - -
-
- - - - - - ICMP - icmp - ICMP - - - - TCP - tcp - Generic TCP - - - - HTTP - http - Generic HTTP - - / - - 200 - - - - HTTPS - https - Generic HTTPS - - / - - 200 - - - - SMTP - send - Generic SMTP - - - 220 * - - - - - 0.opnsense.pool.ntp.org - - - system_information-container:00000000-col3:show,services_status-container:00000001-col4:show,gateways-container:00000002-col4:show,interface_list-container:00000003-col4:show - 2 - - - root@10.0.1.102 - /diag_backup.php made changes - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 0 - 0 - 0 - wan - 192.168.0.0/16,10.0.0.0/8,172.16.0.0/12 - - - W0D23 - 4 - ac - - medium - - - - 0 - 0 - 0 - - - - - - - - - - - - - - - - - 0 - opnsense - - - - 1 - 1 - - - - - - 0 - on - strip - 1 - 1 - 0 - - admin@localhost.local - - - - 0 - /var/squid/cache - 256 - - - always - 100 - 16 - 256 - 0 - 0 - - - - 0 - 2048 - 1024 - 1024 - 256 - - - 0 - - 0 - username - password - - - - - - - lan - 3128 - 3129 - 0 - 0 - - - 4 - 5 - 0 - 3401 - public - - 2121 - 0 - 1 - 0 - - - - - - - - - - - 80:http,21:ftp,443:https,70:gopher,210:wais,1025-65535:unregistered ports,280:http-mgmt,488:gss-http,591:filemaker,777:multiling http - 443:https - - - - - - - 0 - icap://[::1]:1344/avscan - icap://[::1]:1344/avscan - 1 - 0 - 0 - X-Username - 1 - 1024 - 60 - - - - - - OPNsense proxy authentication - 2 - 5 - - - - -