opnsense Increase UFS read-ahead speeds to match the state of hard drives and NCQ. vfs.read_max default Set the ephemeral port range to be lower. net.inet.ip.portrange.first default Drop packets to closed TCP ports without returning a RST net.inet.tcp.blackhole default Do not send ICMP port unreachable messages for closed UDP ports net.inet.udp.blackhole default Randomize the ID field in IP packets net.inet.ip.random_id default Source routing is another way for an attacker to try to reach non-routable addresses behind your box. It can also be used to probe for information about your internal networks. These functions come enabled as part of the standard FreeBSD core system. net.inet.ip.sourceroute default Source routing is another way for an attacker to try to reach non-routable addresses behind your box. It can also be used to probe for information about your internal networks. These functions come enabled as part of the standard FreeBSD core system. net.inet.ip.accept_sourceroute default This option turns off the logging of redirect packets because there is no limit and this could fill up your logs consuming your whole hard drive. net.inet.icmp.log_redirect default Drop SYN-FIN packets (breaks RFC1379, but nobody uses it anyway) net.inet.tcp.drop_synfin default Enable sending IPv6 redirects net.inet6.ip6.redirect default Enable privacy settings for IPv6 (RFC 4941) net.inet6.ip6.use_tempaddr default Prefer privacy addresses and use them over the normal addresses net.inet6.ip6.prefer_tempaddr default Generate SYN cookies for outbound SYN-ACK packets net.inet.tcp.syncookies default Maximum incoming/outgoing TCP datagram size (receive) net.inet.tcp.recvspace default Maximum incoming/outgoing TCP datagram size (send) net.inet.tcp.sendspace default Do not delay ACK to try and piggyback it onto a data packet net.inet.tcp.delayed_ack default Maximum outgoing UDP datagram size net.inet.udp.maxdgram default Handling of non-IP packets which are not passed to pfil (see if_bridge(4)) net.link.bridge.pfil_onlyip default Set to 1 to additionally filter on the physical interface for locally destined packets net.link.bridge.pfil_local_phys default Set to 0 to disable filtering on the incoming and outgoing member interfaces. net.link.bridge.pfil_member default Set to 1 to enable filtering on the bridge interface net.link.bridge.pfil_bridge default Allow unprivileged access to tap(4) device nodes net.link.tap.user_open default Randomize PID's (see src/sys/kern/kern_fork.c: sysctl_kern_randompid()) kern.randompid default Maximum size of the IP input queue net.inet.ip.intr_queue_maxlen default Disable CTRL+ALT+Delete reboot from keyboard. hw.syscons.kbd_reboot default Hint at default settings for serial console in case the autodetect is not working hw.uart.console default Enable TCP extended debugging net.inet.tcp.log_debug default Set ICMP Limits net.inet.icmp.icmplim default TCP Offload Engine net.inet.tcp.tso default UDP Checksums net.inet.udp.checksum default Maximum socket buffer size kern.ipc.maxsockbuf default Page Table Isolation (Meltdown mitigation, requires reboot.) vm.pmap.pti default Disable Indirect Branch Restricted Speculation (Spectre V2 mitigation) hw.ibrs_disable default Hide processes running as other groups security.bsd.see_other_gids default Hide processes running as other users security.bsd.see_other_uids default Enable/disable sending of ICMP redirects in response to IP packets for which a better, and for the sender directly reachable, route and next hop is known. net.inet.ip.redirect 0 Redirect attacks are the purposeful mass-issuing of ICMP type 5 packets. In a normal network, redirects to the end stations should not be required. This option enables the NIC to drop all inbound ICMP redirect packets without returning a response. net.inet.icmp.drop_redirect 1 Maximum outgoing UDP datagram size net.local.dgram.maxdgram default normal gondor2 dss.mywire.org 1 admins System Administrators system 1999 0 2000 page-all root System Administrator system admins $2y$10$V5R3OFK0X8dz/shqsIj3AuuhVvT/TR8gA6u9s.j0gknxplOMg4tyC 0 $2y$11$77rIEmn8xjecWoKfve.cZ.Fb5PIDN6PR8mM4MdlHubJiuBMiWacqW user dion Dion LYA2AG53OBHL35L6NMGE4KEM4ZPHYAWI dionscarman@gmail.com 2000 65b4a1c0bffcf 2001 2000 Australia/Adelaide 0.opnsense.pool.ntp.org 1.opnsense.pool.ntp.org 2.opnsense.pool.ntp.org 3.opnsense.pool.ntp.org http 60132b5e4fc3d 8004 1 yes 1 1 1 1 1 1 hadp hadp hadp monthly aesni 1 1 admins 1 enabled 1 1 0 OPNsense-Backup 1 ssh://omv.dss.mywire.org:222/opnsense/OPNsense.git main -----BEGIN OPENSSH PRIVATE KEY----- b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW QyNTUxOQAAACDP5vkf5UfCrx0gxRfPWKyplHvuwDz5hOPh3X8oXMLNTAAAAKAgiKUyIIil MgAAAAtzc2gtZWQyNTUxOQAAACDP5vkf5UfCrx0gxRfPWKyplHvuwDz5hOPh3X8oXMLNTA AAAEDJKcyJaUCgNMTKViAR3qCMCgL5oRU0AbdG0q29IDGpQ8/m+R/lR8KvHSDFF89YrKmU e+7APPmE4+Hdfyhcws1MAAAAG3Jvb3RAZ29uZG9yMi5kc3MubXl3aXJlLm9yZwEC -----END OPENSSH PRIVATE KEY----- git 115200 video en_US none none none none none none none none 1 1 os-acme-client,os-ddclient,os-git-backup,os-nginx,os-wol 5 on 111886561813089399264 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 1rq_I9W6E96oWuB5tfzLYR2M6Zc_2bgpc on 10 tQ;ELd8"%YW=@VB pppoe1 InternodeNBN 1 1 1 1 pppoe vtnet0 1 10.0.1.1 24 1 Loopback 1 lo0 127.0.0.1 ::1 8 128 none 1 1 1 openvpn OpenVPN group 1 vtnet0_vlan2 General 1 10.0.20.1 24 1 hmac-md5 10.0.1.200 10.0.1.245 10.0.1.4 32:7c:28:9e:62:62 10.0.1.4 bombadil e0:3f:49:b2:12:35 10.0.1.11 omv OpenMediaVault 86400 00:26:6c:28:0a:a1 10.0.1.12 proxmox 32:99:3e:df:d8:50 10.0.1.13 docker debian ct for docker ba:f3:5a:9e:b7:33 10.0.1.15 nginx nginx reverse proxy server 3a:2f:5c:14:f2:0b 10.0.1.21 nextcloud Nextcloud turnkey VM 3a:eb:61:8d:27:08 10.0.1.22 seafile 86:fa:fd:13:d4:25 10.0.1.23 heimdall heimdall application dashboard de:f9:0c:c1:d5:5c 10.0.1.24 jellyfin 52:81:b4:45:f0:0a 10.0.1.25 elrond 4a:91:89:08:73:d8 10.0.1.26 boromir e2:8b:aa:80:6b:a6 10.0.1.27 ansible debian ct on rohan d2:40:37:56:ef:6b 10.0.1.31 mc1 minecraft on debian d2:17:2f:bc:1b:16 10.0.1.32 mc2 06:98:19:95:51:21 10.0.1.33 minecraft3 minecraft server harry potter c2:ec:33:bb:bb:f8 10.0.1.34 minecraft4 minecraft server for HTTYD 8e:61:fc:24:89:85 10.0.1.41 certbot-vm certbot vm for testing de:24:76:34:28:8f 10.0.1.43 tvheadend tvheadend server on (rohan) ea:e6:3f:bc:dd:36 10.0.1.51 mc1-test minecraft server 1 dc:a6:32:e0:85:2a 10.0.1.61 kodi 7a:72:1a:bd:a1:98 10.0.1.81 web1 test web server #1 ca:c0:3e:24:99:03 10.0.1.82 web2 test web server #2 4a:02:45:30:ea:02 10.0.1.100 debian 18:c0:4d:db:2a:7c 10.0.1.101 SimRig Sim Racing PC f4:8c:50:1a:36:9b 10.0.1.102 dion-latitude 66:a3:f0:c7:5e:89 10.0.1.103 debian2 debian2 vm 7a:3b:72:16:fd:b3 10.0.1.104 vm-desktop alpine linux with wm 8c:88:2b:00:10:8d 10.0.1.105 games2 Gaming PC for the boys. GTX 570Ti 08:d4:0c:64:98:ad 10.0.1.106 Logan-Archie-Harry Laptop for the boys 26:50:b1:d7:14:7b 10.0.1.111 pocof3 poco F3 android 52:fe:2b:0e:1c:89 10.0.1.112 pocof1 Poco F1 android ec:71:db:49:8e:24 10.0.1.121 Camera1 ec:71:db:8c:07:4e 10.0.1.122 Camera2 16:e9:1e:ab:33:e2 10.0.1.131 Trading-PC Win10 Virtual PC for trading 66:1f:7a:58:86:ba 10.0.1.132 trading2 Win11 PC for trading c6:19:1e:a6:d6:fc 10.0.1.151 hass 08:d4:2b:13:8d:d8 10.0.1.152 nexus10 Nexus 10 Android Tablet dc:a6:32:e0:85:29 10.0.1.161 Legolas Legolas ethernet fc:aa:14:c1:5a:9b 10.0.1.165 games2-lan Boys Gaming PC ethernet connection 40:55:39:cc:77:00 10.0.1.250 anduin Cisco router 1 hmac-md5 10.0.3.201 10.0.3.230 1 hmac-md5 10.0.20.100 10.0.20.199 public automatic tcp wan inet HASS.io nat_603a219d254010.34486638 10.0.1.151 8123 1 wanip 8123 root@10.0.1.100 /firewall_nat_edit.php made changes root@10.0.1.201 /firewall_nat_edit.php made changes tcp wan inet debian vm nat_603a31025c4875.51279624 10.0.1.100 22 1 wanip 22 root@10.0.1.100 /firewall_nat_edit.php made changes root@10.0.1.201 /firewall_nat_edit.php made changes tcp wan inet debian2 vm nat_61fe6823a62ff9.38653503 10.0.1.103 22 1 wanip 22 root@10.0.1.102 /firewall_nat_edit.php made changes root@10.0.1.100 /firewall_nat_edit.php made changes 1 tcp wan inet nginx reverse proxy ssl nat_609ab30d1bcb08.88985266 10.0.1.15 443 1 wanip 443 root@10.0.1.100 /firewall_nat_edit.php made changes root@10.0.8.6 /firewall_nat_edit.php made changes tcp wan inet minecraft java mc1 nat_6189c4e0d85e51.54054052 10.0.1.105 25565 1 wanip 25565 root@10.0.1.131 /firewall_nat_edit.php made changes root@10.0.1.201 /firewall_nat_edit.php made changes tcp wan inet minecraft java mc2 nat_61eca513f3ab54.12999814 10.0.1.32 25566 1 wanip 25566 root@10.0.1.100 /firewall_nat_edit.php made changes root@10.0.1.201 /firewall_nat_edit.php made changes tcp wan inet minecraft3 java nat_61f372df8b6171.53361896 10.0.1.33 25567 1 wanip 25567 root@10.0.1.201 /firewall_nat_edit.php made changes root@10.0.1.201 /firewall_nat_edit.php made changes 1 tcp wan inet minecraft4 java nat_61f373074cc973.44719320 10.0.1.34 25568 1 wanip 25568 root@10.0.1.201 /firewall_nat_edit.php made changes root@10.0.1.201 /firewall_nat_edit.php made changes 1 udp wan inet minecraft bedrock mc1 pass 10.0.1.105 19132 1 wanip 19132 root@10.0.1.131 /firewall_nat_edit.php made changes root@10.0.1.201 /firewall_nat_edit.php made changes udp wan inet minecraft bedrock mc2 nat_61eca544a8b730.21185118 10.0.1.32 19133 1 wanip 19133 root@10.0.1.100 /firewall_nat_edit.php made changes root@10.0.1.201 /firewall_nat_edit.php made changes udp wan inet minecraft3 bedrock nat_61f3734f494c02.95558635 10.0.1.33 19134 1 wanip 19134 root@10.0.1.201 /firewall_nat_edit.php made changes root@10.0.1.201 /firewall_nat_edit.php made changes 1 udp wan inet minecraft4 bedrock nat_61f3736fb310c2.90636878 10.0.1.34 19135 1 wanip 19135 root@10.0.1.201 /firewall_nat_edit.php made changes root@10.0.1.201 /firewall_nat_edit.php made changes 1 tcp wan inet nginx reverse proxy server nat_61d69bc2d88db3.30171087 10.0.1.15 80 1 wanip 80 root@10.0.1.100 /firewall_nat_edit.php made changes root@10.0.1.100 /firewall_nat_edit.php made changes tcp wan inet Jellyfin services nat_61f140996d6708.06843852 10.0.1.24 8096 1 wanip 8096 root@10.0.1.100 /firewall_nat_edit.php made changes root@10.0.1.100 /firewall_nat_edit.php made changes tcp wan inet bitwarden nat_62261aed26de09.52732628 10.0.1.11 18080 1 wanip 18080 root@10.0.1.201 /firewall_nat_edit.php made changes root@10.0.1.201 /firewall_nat_edit.php made changes 1 udp wan inet nat_62cc09e3b73e87.61248567 10.0.1.102 3478 1 wanip 3478 root@10.0.1.102 /firewall_nat_edit.php made changes root@10.0.1.102 /firewall_nat_edit.php made changes 1 udp wan inet nat_62cc0a1f5e00c2.77730298 10.0.1.102 4379 1 wanip 4379-4380 root@10.0.1.102 /firewall_nat_edit.php made changes root@10.0.1.102 /firewall_nat_edit.php made changes 1 tcp/udp wan inet Stick Fight the Game nat_62cc0abca222d4.02229027 10.0.1.101 27015 1 wanip 27015 root@10.0.1.101 /firewall_nat_edit.php made changes root@10.0.1.102 /firewall_nat_edit.php made changes 1 tcp/udp wan inet nat_62dfdf81c63009.25391203 10.0.1.11 6881 1 wanip 6881 root@10.0.1.102 /firewall_nat_edit.php made changes root@10.0.1.102 /firewall_nat_edit.php made changes tcp/udp wan inet nat_62e3ed166f0e56.88516001 10.0.1.101 24642 1 wanip 24642 root@10.0.1.101 /firewall_nat_edit.php made changes root@10.0.1.101 /firewall_nat_edit.php made changes 1 tcp wan inet nat_65b268fb447592.11055352 10.0.1.11 2283 1 wanip 2283 root@10.0.1.131 /firewall_nat_edit.php made changes root@10.0.1.131 /firewall_nat_edit.php made changes 1 wan keep state tcp inet
10.0.1.151
8123
HASS.io nat_603a219d254010.34486638 root@10.0.1.201 /firewall_nat_edit.php made changes
1 wan keep state tcp inet
10.0.1.100
22
debian vm nat_603a31025c4875.51279624 root@10.0.1.201 /firewall_nat_edit.php made changes
pass wan inet keep state Allow VPN Traffic in 1 1 udp 1 1 1194 root@10.0.1.100 /firewall_rules_edit.php made changes root@10.0.1.100 /firewall_rules_edit.php made changes 1 wan keep state tcp inet
10.0.1.15
443
nginx reverse proxy ssl nat_609ab30d1bcb08.88985266 root@10.0.8.6 /firewall_nat_edit.php made changes
1 wan keep state tcp inet
10.0.1.105
25565
minecraft java mc1 nat_6189c4e0d85e51.54054052 root@10.0.1.201 /firewall_nat_edit.php made changes
1 wan keep state tcp inet
10.0.1.15
80
nginx reverse proxy server nat_61d69bc2d88db3.30171087 root@10.0.1.100 /firewall_nat_edit.php made changes
1 wan keep state tcp inet
10.0.1.32
25566
minecraft java mc2 nat_61eca513f3ab54.12999814 root@10.0.1.201 /firewall_nat_edit.php made changes
1 wan keep state udp inet
10.0.1.32
19133
minecraft bedrock mc2 nat_61eca544a8b730.21185118 root@10.0.1.201 /firewall_nat_edit.php made changes
1 wan keep state tcp inet
10.0.1.24
8096
Jellyfin services nat_61f140996d6708.06843852 root@10.0.1.100 /firewall_nat_edit.php made changes
1 wan keep state tcp inet
10.0.1.33
25567
minecraft3 java nat_61f372df8b6171.53361896 root@10.0.1.201 /firewall_nat_edit.php made changes
1 wan keep state tcp inet
10.0.1.34
25568
minecraft4 java nat_61f373074cc973.44719320 root@10.0.1.201 /firewall_nat_edit.php made changes
1 wan keep state udp inet
10.0.1.33
19134
minecraft3 bedrock nat_61f3734f494c02.95558635 root@10.0.1.201 /firewall_nat_edit.php made changes
1 wan keep state udp inet
10.0.1.34
19135
minecraft4 bedrock nat_61f3736fb310c2.90636878 root@10.0.1.201 /firewall_nat_edit.php made changes
1 wan keep state tcp inet
10.0.1.103
22
debian2 vm nat_61fe6823a62ff9.38653503 root@10.0.1.100 /firewall_nat_edit.php made changes
1 wan keep state tcp inet
10.0.1.11
18080
bitwarden nat_62261aed26de09.52732628 root@10.0.1.201 /firewall_nat_edit.php made changes 1
1 wan keep state udp inet
10.0.1.102
3478
nat_62cc09e3b73e87.61248567 root@10.0.1.102 /firewall_nat_edit.php made changes
1 wan keep state udp inet
10.0.1.102
4379-4380
nat_62cc0a1f5e00c2.77730298 root@10.0.1.102 /firewall_nat_edit.php made changes
1 wan keep state tcp/udp inet
10.0.1.101
27015
Stick Fight the Game nat_62cc0abca222d4.02229027 root@10.0.1.102 /firewall_nat_edit.php made changes
1 wan keep state tcp/udp inet
10.0.1.11
6881
nat_62dfdf81c63009.25391203 root@10.0.1.102 /firewall_nat_edit.php made changes
1 wan keep state tcp/udp inet
10.0.1.101
24642
nat_62e3ed166f0e56.88516001 root@10.0.1.101 /firewall_nat_edit.php made changes
nat_65b268fb447592.11055352 1 wan keep state tcp inet
10.0.1.11
2283
root@10.0.1.131 /firewall_nat_edit.php made changes
pass inet Default allow LAN to any rule lan lan pass inet6 Default allow LAN IPv6 to any rule lan lan pass lan inet keep state Allow OpenVPN traffic in 1 openvpn 1 root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes pass lan inet keep state in 1 icmp lan 1 root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes OpenVPN wizard in 1 anyip 1194 any udp pass on root@10.0.1.100 /wizard.php made changes pass openvpn inet keep state OpenVPN wizard in 1
10.0.8.0/24
1 root@10.0.1.100 /firewall_rules_edit.php made changes root@10.0.1.100 /wizard.php made changes
pass opt1 inet keep state in 1 tcp/udp opt1 opt1ip 53 root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes pass opt1 inet keep state in 1 opt1 opt1ip root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes pass opt1 inet keep state in 1 opt1
OMV
root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes
pass opt1 inet keep state in 1 tcp
10.0.20.101
10.0.1.1
root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes
pass opt1 inet keep state Allow internet in 1 opt1
PrivateNet
1
root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes
ICMP icmp ICMP TCP tcp Generic TCP HTTP http Generic HTTP / 200 HTTPS https Generic HTTPS / 200 SMTP send Generic SMTP 220 * 0.opnsense.pool.ntp.org system_information-container:00000000-col3:show,services_status-container:00000001-col4:show,gateways-container:00000002-col4:show,interface_list-container:00000003-col4:show 2 root@10.0.1.131 /firewall_rules_edit.php made changes 1 PrivateNet network 0 10.0.0.0/8 172.16.0.0/12 192.168.0.0/16 All local networks 1 OMV host 0 10.0.1.11 OMV Server 1 Proxmox_IBM host 0 10.0.1.5 0 0 0 wan 192.168.0.0/16,10.0.0.0/8,172.16.0.0/12 W0D23 4 ac medium 0 0 0 0 opnsense 1 1 0 on strip 1 1 0 admin@localhost.local 0 /var/squid/cache 256 always 100 16 256 0 0 0 2048 1024 1024 256 0 0 username password lan 3128 3129 0 0 4 5 0 3401 public 2121 0 1 0 80:http,21:ftp,443:https,70:gopher,210:wais,1025-65535:unregistered ports,280:http-mgmt,488:gss-http,591:filemaker,777:multiling http 443:https 0 icap://[::1]:1344/avscan icap://[::1]:1344/avscan 1 0 0 X-Username 1 1024 60 OPNsense proxy authentication 2 5