opnsense vfs.read_max Increase UFS read-ahead speeds to match the state of hard drives and NCQ. net.inet.ip.portrange.first Set the ephemeral port range to be lower. net.inet.tcp.blackhole Drop packets to closed TCP ports without returning a RST net.inet.udp.blackhole Do not send ICMP port unreachable messages for closed UDP ports net.inet.ip.random_id Randomize the ID field in IP packets net.inet.ip.sourceroute Source routing is another way for an attacker to try to reach non-routable addresses behind your box. It can also be used to probe for information about your internal networks. These functions come enabled as part of the standard FreeBSD core system. net.inet.ip.accept_sourceroute Source routing is another way for an attacker to try to reach non-routable addresses behind your box. It can also be used to probe for information about your internal networks. These functions come enabled as part of the standard FreeBSD core system. net.inet.icmp.log_redirect This option turns off the logging of redirect packets because there is no limit and this could fill up your logs consuming your whole hard drive. net.inet.tcp.drop_synfin Drop SYN-FIN packets (breaks RFC1379, but nobody uses it anyway) net.inet6.ip6.redirect Enable sending IPv6 redirects net.inet6.ip6.use_tempaddr Enable privacy settings for IPv6 (RFC 4941) net.inet6.ip6.prefer_tempaddr Prefer privacy addresses and use them over the normal addresses net.inet.tcp.syncookies Generate SYN cookies for outbound SYN-ACK packets net.inet.tcp.recvspace Maximum incoming/outgoing TCP datagram size (receive) net.inet.tcp.sendspace Maximum incoming/outgoing TCP datagram size (send) net.inet.tcp.delayed_ack Do not delay ACK to try and piggyback it onto a data packet net.inet.udp.maxdgram Maximum outgoing UDP datagram size net.link.bridge.pfil_onlyip Handling of non-IP packets which are not passed to pfil (see if_bridge(4)) net.link.bridge.pfil_local_phys Set to 1 to additionally filter on the physical interface for locally destined packets net.link.bridge.pfil_member Set to 0 to disable filtering on the incoming and outgoing member interfaces. net.link.bridge.pfil_bridge Set to 1 to enable filtering on the bridge interface net.link.tap.user_open Allow unprivileged access to tap(4) device nodes kern.randompid Randomize PID's (see src/sys/kern/kern_fork.c: sysctl_kern_randompid()) net.inet.ip.intr_queue_maxlen Maximum size of the IP input queue hw.syscons.kbd_reboot Disable CTRL+ALT+Delete reboot from keyboard. hw.uart.console Hint at default settings for serial console in case the autodetect is not working net.inet.tcp.log_debug Enable TCP extended debugging net.inet.icmp.icmplim Set ICMP Limits net.inet.tcp.tso TCP Offload Engine net.inet.udp.checksum UDP Checksums kern.ipc.maxsockbuf Maximum socket buffer size vm.pmap.pti Page Table Isolation (Meltdown mitigation, requires reboot.) hw.ibrs_disable Disable Indirect Branch Restricted Speculation (Spectre V2 mitigation) security.bsd.see_other_gids Hide processes running as other groups security.bsd.see_other_uids Hide processes running as other users net.inet.ip.redirect 0 Enable/disable sending of ICMP redirects in response to IP packets for which a better, and for the sender directly reachable, route and next hop is known. net.inet.icmp.drop_redirect 1 Redirect attacks are the purposeful mass-issuing of ICMP type 5 packets. In a normal network, redirects to the end stations should not be required. This option enables the NIC to drop all inbound ICMP redirect packets without returning a response. net.local.dgram.maxdgram Maximum outgoing UDP datagram size dev.netmap.buf_num 1000000 Automatically added by Zenarmor: Netmap Generic/Native Driver dev.netmap.ring_num 1024 Automatically added by Zenarmor normal gondor2 dss.mywire.org 1 1999 admins system System Administrators page-all 0,2000 0 root 0 system $2y$10$V5R3OFK0X8dz/shqsIj3AuuhVvT/TR8gA6u9s.j0gknxplOMg4tyC System Administrator 2000 dion 0 user LYA2AG53OBHL35L6NMGE4KEM4ZPHYAWI $2y$11$77rIEmn8xjecWoKfve.cZ.Fb5PIDN6PR8mM4MdlHubJiuBMiWacqW dionscarman@gmail.com Dion 2001 2000 Australia/Adelaide 0.opnsense.pool.ntp.org 1.opnsense.pool.ntp.org 2.opnsense.pool.ntp.org 3.opnsense.pool.ntp.org http 60132b5e4fc3d 8004 1 yes 1 1 1 1 1 hadp hadp hadp monthly aesni 1 1 admins 1 enabled 1 1 0 OPNsense-Backup 1 ssh://docker.dss.mywire.org:222/opnsense/OPNsense.git main -----BEGIN OPENSSH PRIVATE KEY----- b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW QyNTUxOQAAACDP5vkf5UfCrx0gxRfPWKyplHvuwDz5hOPh3X8oXMLNTAAAAKAgiKUyIIil MgAAAAtzc2gtZWQyNTUxOQAAACDP5vkf5UfCrx0gxRfPWKyplHvuwDz5hOPh3X8oXMLNTA AAAEDJKcyJaUCgNMTKViAR3qCMCgL5oRU0AbdG0q29IDGpQ8/m+R/lR8KvHSDFF89YrKmU e+7APPmE4+Hdfyhcws1MAAAAG3Jvb3RAZ29uZG9yMi5kc3MubXl3aXJlLm9yZwEC -----END OPENSSH PRIVATE KEY----- git en_US none none none none none none none none 1 os-acme-client,os-ddclient,os-gdrive-backup,os-git-backup,os-nginx,os-sensei,os-sensei-updater,os-sunnyvalley,os-wol 5 on 111886561813089399264 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 1rq_I9W6E96oWuB5tfzLYR2M6Zc_2bgpc on 10 tQ;ELd8"%YW=@VB pppoe0 NBNwired 1 1 1 1 pppoe vtnet1 1 10.0.1.1 24 1 Loopback 1 lo0 127.0.0.1 ::1 8 128 none 1 1 1 openvpn OpenVPN group 1 vlan01 Servers 1 10.0.10.1 24 vlan02 General 1 10.0.20.1 24 vlan03 IOTnetwork 1 10.0.30.1 24 vlan04 Guest 1 1 10.0.40.1 24 1 WireGuard (Group) wireguard 1 1 group wg0 WireGuardVPN 1 1 vlan05 Kids 1 1 10.0.50.1 24 1500 1 hmac-md5 10.0.1.200 10.0.1.245 10.0.1.4 bc:24:11:a7:1a:ea 10.0.1.4 shelob Pi-Hole server 10.0.1.1 e0:3f:49:b2:12:35 10.0.1.11 omv OpenMediaVault 86400 00:26:6c:28:0a:a1 10.0.1.12 proxmox ba:f3:5a:9e:b7:33 10.0.1.15 nginx nginx reverse proxy server bc:24:11:fd:6c:73 10.0.1.20 smolxp Minimal XP to manage cisco router 86:fa:fd:13:d4:25 10.0.1.23 heimdall heimdall application dashboard 52:81:b4:45:f0:0a 10.0.1.25 elrond 4a:91:89:08:73:d8 10.0.1.26 boromir e2:8b:aa:80:6b:a6 10.0.1.27 ansible debian ct on rohan 8e:61:fc:24:89:85 10.0.1.41 certbot-vm certbot vm for testing 18:c0:4d:db:2a:7c 10.0.1.101 SimRig Sim Racing PC f4:8c:50:1a:36:9b 10.0.1.102 dion-latitude 66:a3:f0:c7:5e:89 10.0.1.103 debian2 debian2 vm 7a:3b:72:16:fd:b3 10.0.1.104 vm-desktop alpine linux with wm ec:71:db:49:8e:24 10.0.1.121 Camera1 ec:71:db:8c:07:4e 10.0.1.122 Camera2 bc:24:11:df:76:99 10.0.1.135 macos Mac OS virtual machine dc:a6:32:e0:85:29 10.0.1.161 Legolas Legolas ethernet 40:55:39:cc:77:00 10.0.1.250 anduin Cisco router 1 hmac-md5 10.0.20.151 10.0.20.199 10.0.1.4 c8:8a:d8:12:ce:5e 10.0.20.16 GoogleTV Lounge TV 18:c0:4d:db:2a:7c 10.0.20.20 simrig Gaming PC a4:bb:6d:9a:9a:f2 10.0.20.21 optiplex Optiplex for Trading f4:8c:50:1a:36:9b 10.0.20.22 laptop 9c:5a:81:75:74:20 10.0.20.23 pocof3 3c:9c:0f:fa:fe:15 10.0.20.24 xps131 bc:24:11:09:20:07 10.0.20.30 win11 bc:24:11:df:76:99 10.0.20.35 macos bc:24:11:83:20:b3 10.0.20.43 whonix-gw whonix gateway 4a:02:45:30:ea:02 10.0.20.101 debian bc:24:11:77:77:88 10.0.20.102 arch 5c:80:b6:47:f6:7b 10.0.20.121 optiplex-wifi Optiplex MicroPC for Trading (WiFi) bc:24:11:8a:5c:82 10.0.20.147 zorin VM with ZorinOS bc:24:11:11:aa:aa 10.0.20.148 winux VM with winux os bc:24:11:9c:39:39 10.0.20.149 gentoo 1 hmac-md5 10.0.10.100 10.0.10.199 10.0.1.4 e0:3f:49:b2:12:35 10.0.10.11 omv bc:24:11:96:40:ba 10.0.10.12 truenas bc:24:11:cb:c8:85 10.0.10.13 docker bc:24:11:4a:8d:97 10.0.10.14 musicbrainz bc:24:11:07:e0:0f 10.0.10.16 musicbrainz-docker bc:24:11:ab:76:a3 10.0.10.21 web simple apache web server bc:24:11:45:07:6e 10.0.10.22 nexiitech ecommerce site for NexiiTech de:f9:0c:c1:d5:5c 10.0.10.24 jellyfin bc:24:11:ee:62:5c 10.0.10.26 gpodder bc:24:11:9e:e9:f7 10.0.10.27 nextcloud bc:24:11:bc:75:fc 10.0.10.28 nextcloud2 bc:24:11:05:07:bc 10.0.10.30 velocity velocity proxy server for minecraft bc:24:11:2c:3e:09 10.0.10.31 minecraft1 bc:24:11:7e:10:ae 10.0.10.32 minecraft2 minecraft 'scarman' server bc:24:11:60:b0:46 10.0.10.33 minecraft3 bc:24:11:dc:09:45 10.0.10.34 minecraft4 minecraft server bc:24:11:f1:e7:c2 10.0.10.40 ollama bc:24:11:e5:19:c4 10.0.10.41 openwebui bc:24:11:a7:36:14 10.0.10.42 diffusion bc:24:11:a2:64:33 10.0.10.43 stable-vd bc:24:11:43:0b:c4 10.0.10.51 fakentp2 bc:24:11:a5:41:ea 10.0.10.52 fakentp bc:24:11:a7:1a:ea 10.0.10.53 pihole bc:24:11:aa:59:86 10.0.10.61 study-docker Docker CT for study app stack bc:24:11:98:5a:b8 10.0.10.62 study-compute Compute CT for study app stack 1 hmac-md5 10.0.40.100 10.0.40.199 10.0.1.4 c8:8a:d8:12:ce:5e 10.0.40.16 google-tv 56:b5:94:ff:55:f1 10.0.40.21 kidsphone 16:e9:1e:ab:33:e2 10.0.40.31 trading1 66:1f:7a:58:86:ba 10.0.40.32 trading2 bc:24:11:2a:27:40 10.0.40.33 trading3 1 hmac-md5 10.0.30.21 10.0.30.199 c6:19:1e:a6:d6:fc 10.0.30.11 hass dss.mywire.org 10.0.1.4 00:0a:f5:46:2a:9f 10.0.30.12 ticwatch5 Dion's Mobvoi Ticwatch 5 pro enduro b8:27:eb:a6:f8:ce 10.0.30.15 pi3 Raspberry Pi 3 2c:3a:e8:1a:44:72 10.0.30.18 wifi-clock wifi-clock ESP-1A4472 70:89:76:0a:28:63 10.0.30.19 star-projector dc:a6:32:e0:85:2a 10.0.30.20 3dprint Raspberry Pi 4 with OctoPrint 1 hmac-md5 10.0.50.200 10.0.50.230 10.0.1.4 8c:88:2b:00:10:8d 10.0.50.11 kidspc Desktop PC for the kids (WiFi) f4:60:e2:f8:e2:80 10.0.50.12 pocof1 Phone for the kids 00:1f:32:6a:fd:4a 10.0.50.13 Wii Nintendo Wii console 94:be:46:ee:df:81 10.0.50.142 logan-tab Logan's tablet 70:bc:10:2f:df:29 10.0.50.143 XBOXONE Logan's Xbox a4:34:d9:8e:e3:b5 10.0.50.151 As-PC Archie's laptop (Metabox N170RD) 94:be:46:ee:df:89 10.0.50.152 archie-tab Archie's tablet 94:be:46:ee:df:85 10.0.50.172 harry-tab Harry's tablet public 10 100 automatic tcp wan inet HASS.io nat_603a219d254010.34486638 hass 8123 1 wanip 8123 root@10.0.1.131 /firewall_nat_edit.php made changes root@10.0.1.201 /firewall_nat_edit.php made changes 1 tcp wan inet debian vm nat_603a31025c4875.51279624 terminal 22 1 wanip 22 root@10.0.40.31 /firewall_nat_edit.php made changes root@10.0.1.201 /firewall_nat_edit.php made changes tcp wan inet debian2 vm nat_61fe6823a62ff9.38653503 10.0.1.103 22 1 wanip 22 root@10.0.1.102 /firewall_nat_edit.php made changes root@10.0.1.100 /firewall_nat_edit.php made changes 1 tcp wan inet nginx reverse proxy ssl nat_609ab30d1bcb08.88985266 nginx 443 1 wanip 443 root@10.0.1.131 /firewall_nat_edit.php made changes root@10.0.8.6 /firewall_nat_edit.php made changes tcp wan inet nginx reverse proxy server nat_61d69bc2d88db3.30171087 nginx 80 1 wanip 80 root@10.0.1.131 /firewall_nat_edit.php made changes root@10.0.1.100 /firewall_nat_edit.php made changes tcp wan inet velocity for minecraft java pass velocity 25565 1 wanip 25565 root@10.0.20.24 /firewall_nat_edit.php made changes root@10.0.1.201 /firewall_nat_edit.php made changes udp wan inet velocity for minecraft bedrock pass velocity 19132 1 wanip 19132 root@10.0.20.24 /firewall_nat_edit.php made changes root@10.0.1.201 /firewall_nat_edit.php made changes tcp wan inet Jellyfin services nat_61f140996d6708.06843852 jellyfin 8096 1 wanip 8096 root@10.0.1.131 /firewall_nat_edit.php made changes root@10.0.1.100 /firewall_nat_edit.php made changes 1 udp wan inet nat_62cc09e3b73e87.61248567 10.0.1.102 3478 1 wanip 3478 root@10.0.1.102 /firewall_nat_edit.php made changes root@10.0.1.102 /firewall_nat_edit.php made changes 1 udp wan inet Steam related nat_62cc0a1f5e00c2.77730298 1 10.0.1.102 4379 1 wanip 4379-4380 root@10.0.20.24 /firewall_nat_edit.php made changes root@10.0.1.102 /firewall_nat_edit.php made changes tcp/udp wan inet deluge nat_62dfdf81c63009.25391203 10.0.10.13 6881 1 wanip 6881 root@10.0.20.24 /firewall_nat_edit.php made changes root@10.0.1.102 /firewall_nat_edit.php made changes 1 wan keep state tcp inet
hass
8123
HASS.io nat_603a219d254010.34486638 root@10.0.1.201 /firewall_nat_edit.php made changes 1
1 wan keep state tcp inet
terminal
22
debian vm nat_603a31025c4875.51279624 root@10.0.1.201 /firewall_nat_edit.php made changes
pass wan inet keep state Allow VPN Traffic in 1 1 udp 1 1 1194 root@10.0.1.100 /firewall_rules_edit.php made changes root@10.0.1.100 /firewall_rules_edit.php made changes 1 1 wan keep state tcp inet
nginx
443
nginx reverse proxy ssl nat_609ab30d1bcb08.88985266 root@10.0.8.6 /firewall_nat_edit.php made changes
1 wan keep state tcp inet
nginx
80
nginx reverse proxy server nat_61d69bc2d88db3.30171087 root@10.0.1.100 /firewall_nat_edit.php made changes
1 wan keep state tcp inet
jellyfin
8096
Jellyfin services nat_61f140996d6708.06843852 root@10.0.1.100 /firewall_nat_edit.php made changes 1
1 wan keep state tcp inet
10.0.1.103
22
debian2 vm nat_61fe6823a62ff9.38653503 root@10.0.1.100 /firewall_nat_edit.php made changes
1 wan keep state udp inet
10.0.1.102
3478
nat_62cc09e3b73e87.61248567 root@10.0.1.102 /firewall_nat_edit.php made changes
1 wan keep state udp inet
10.0.1.102
4379-4380
Steam related nat_62cc0a1f5e00c2.77730298 root@10.0.1.102 /firewall_nat_edit.php made changes 1
1 wan keep state tcp/udp inet
10.0.10.13
6881
deluge nat_62dfdf81c63009.25391203 root@10.0.1.102 /firewall_nat_edit.php made changes
pass wan inet keep state Allow WireGuard VPN service in 1 udp 1 wanip 51820 root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes pass inet Default allow LAN to any rule lan lan pass inet6 Default allow LAN IPv6 to any rule lan lan pass lan inet keep state Allow OpenVPN traffic in 1 openvpn 1 root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes pass lan inet keep state in 1 icmp lan 1 root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes pass lan inet keep state in 1 tcp/udp
terminal
opt2 root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes
pass lan inet keep state in 1
hass
opt3 root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes
pass lan inet keep state in 1
terminal
adminpc
root@10.0.40.31 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes
pass lan inet46 keep state in 1 tcp/udp
nginx
docker
root@10.0.20.22 /firewall_rules_edit.php made changes root@10.0.20.22 /firewall_rules_edit.php made changes
pass lan inet46 keep state in 1 tcp/udp
nginx
OMV
root@10.0.20.22 /firewall_rules_edit.php made changes root@10.0.20.22 /firewall_rules_edit.php made changes
OpenVPN wizard in 1 anyip 1194 any udp pass on root@10.0.1.100 /wizard.php made changes pass openvpn inet keep state OpenVPN wizard in 1
10.0.8.0/24
1 root@10.0.1.100 /firewall_rules_edit.php made changes root@10.0.1.100 /wizard.php made changes
pass opt1 inet keep state Allow DNS with PiHole in 1 tcp/udp opt1
PiHole
53
root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes
pass opt1 inet keep state in 1 opt1 opt1ip root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes pass opt1 inet keep state in 1 opt1
OMV
root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes
pass opt1 inet keep state in 1
docker
jellyfin
root@10.0.20.30 /firewall_rules_edit.php made changes root@10.0.20.30 /firewall_rules_edit.php made changes
pass opt1 inet keep state in 1
docker
kodi
root@10.0.20.30 /firewall_rules_edit.php made changes root@10.0.20.30 /firewall_rules_edit.php made changes
pass opt1 inet keep state test for HASS in heimdall dash in 1 tcp/udp
docker
hass
8123
root@10.0.20.24 /firewall_rules_edit.php made changes root@10.0.20.24 /firewall_rules_edit.php made changes
pass opt1 inet keep state in 1 tcp
10.0.20.101
10.0.1.1
root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes 1
pass opt1 inet keep state temporary allow shellinabox in 1 tcp
10.0.10.21/24
10.0.1.100/24
22
root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes
pass opt1 inet keep state allow heimdall to access octoprint api in 1 tcp/udp
docker
_3dprint
80
root@10.0.20.24 /firewall_rules_edit.php made changes root@10.0.20.24 /firewall_rules_edit.php made changes
pass opt1 inet keep state Allow internet in 1 opt1
PrivateNet
1
root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes
pass opt1 inet keep state Allow server 'web' access for webcam stream in 1 tcp
10.0.10.21
_3dprint
80
root@10.0.20.24 /firewall_rules_edit.php made changes root@10.0.20.24 /firewall_rules_edit.php made changes
block opt2 inet6 keep state Block IPv6 in 1 opt2 1 root@10.0.20.24 /firewall_rules_edit.php made changes root@10.0.20.24 /firewall_rules_edit.php made changes pass opt2 inet keep state Allow DNS with PiHole in 1 tcp/udp opt2
PiHole
53
root@10.0.20.24 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes
pass opt2 inet keep state Allow ICMPv4 to all networks in 1 icmp opt2 1 root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes pass opt2 inet keep state Allow laptop access to everything in 1
laptop
1 root@10.0.20.30 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes
pass opt2 inet keep state Allow admin pc access to everything in 1
adminpc
1 root@10.0.40.31 /firewall_rules_edit.php made changes root@10.0.40.31 /firewall_rules_edit.php made changes
pass opt2 inet keep state Allow access to Home Assistant in 1 tcp opt2
hass
8123
root@10.0.20.22 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes
pass opt2 inet keep state Allow access to Kodi in 1 tcp/udp opt2
kodi
root@10.0.20.22 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes
pass opt2 inet keep state Allow access to *arr stack in 1 tcp opt2
docker
arrPorts
root@10.0.20.22 /firewall_rules_edit.php made changes root@10.0.20.22 /firewall_rules_edit.php made changes
pass opt2 inet keep state Allow access to Deluge in 1 tcp opt2
docker
delugePorts
root@10.0.20.22 /firewall_rules_edit.php made changes root@10.0.20.22 /firewall_rules_edit.php made changes
pass opt2 inet keep state Allow Immich photo backup in 1 tcp/udp opt2
docker
2283
root@10.0.20.22 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes
pass opt2 inet keep state Allow tvheadend in 1 tcp/udp opt2
docker
9981
root@10.0.20.22 /firewall_rules_edit.php made changes root@10.0.20.22 /firewall_rules_edit.php made changes
pass opt2 inet keep state Allow tvheadend HTSP in 1 tcp/udp opt2
docker
9982
root@10.0.20.24 /firewall_rules_edit.php made changes root@10.0.20.24 /firewall_rules_edit.php made changes
pass opt2 inet keep state Calibre book library in 1 tcp/udp opt2
docker
8080-8081
root@10.0.20.30 /firewall_rules_edit.php made changes root@10.0.20.30 /firewall_rules_edit.php made changes
pass opt2 inet keep state Allow Jellyfin in 1 tcp/udp opt2
jellyfin
8096
root@10.0.20.30 /firewall_rules_edit.php made changes root@10.0.20.30 /firewall_rules_edit.php made changes
pass opt2 inet keep state Allow nginx access in 1 tcp/udp opt2
nginx
root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes
pass opt2 inet keep state Allow nextcloud access in 1 tcp/udp opt2
10.0.10.27
root@10.0.20.22 /firewall_rules_edit.php made changes root@10.0.20.22 /firewall_rules_edit.php made changes
pass opt2 inet keep state Allow samba access in 1 tcp/udp opt2
TrueNAS
445
root@10.0.20.30 /firewall_rules_edit.php made changes root@10.0.20.30 /firewall_rules_edit.php made changes
pass opt2 inet keep state Allow samba access in 1 tcp/udp opt2
_3dprint
445
root@10.0.20.30 /firewall_rules_edit.php made changes root@10.0.20.30 /firewall_rules_edit.php made changes
pass opt2 inet keep state Minecraft proxy server in 1 tcp/udp opt2
minecraft
MinecraftPorts
root@10.0.20.24 /firewall_rules_edit.php made changes root@10.0.20.24 /firewall_rules_edit.php made changes
pass opt2 inet keep state tvheadend htsp in 1 tcp
dion_phone
docker
9982
root@10.0.20.30 /firewall_rules_edit.php made changes root@10.0.20.30 /firewall_rules_edit.php made changes
pass opt2 inet keep state Phone to Proxmox access in 1 tcp
dion_phone
Proxmox_Dell
8006
root@10.0.20.24 /firewall_rules_edit.php made changes root@10.0.20.30 /firewall_rules_edit.php made changes
pass opt2 inet keep state watch to phone test in 1
dion_phone
10.0.30.12
root@10.0.20.24 /firewall_rules_edit.php made changes root@10.0.20.24 /firewall_rules_edit.php made changes
pass opt2 inet keep state in 1 tcp/udp
optiplex
Trading1
3389
root@10.0.20.22 /firewall_rules_edit.php made changes root@10.0.20.22 /firewall_rules_edit.php made changes
pass opt2 inet keep state in 1 tcp/udp
XPS131
Trading1
3389
root@10.0.20.22 /firewall_rules_edit.php made changes root@10.0.20.22 /firewall_rules_edit.php made changes
pass opt2 inet keep state in 1 tcp/udp
optiplex
Trading2
3389
root@10.0.20.22 /firewall_rules_edit.php made changes root@10.0.20.22 /firewall_rules_edit.php made changes
pass opt2 inet keep state in 1 tcp/udp
XPS131
Trading2
3389
root@10.0.20.22 /firewall_rules_edit.php made changes root@10.0.20.22 /firewall_rules_edit.php made changes
pass opt2 inet keep state in 1 tcp/udp
optiplex
adminpc
3389
root@10.0.20.22 /firewall_rules_edit.php made changes root@10.0.20.22 /firewall_rules_edit.php made changes
pass opt2 inet keep state in 1 tcp/udp
XPS131
adminpc
3389
root@10.0.20.22 /firewall_rules_edit.php made changes root@10.0.20.22 /firewall_rules_edit.php made changes
pass opt2 inet keep state in 1 tcp/udp opt2
_3dprint
80
root@10.0.20.30 /firewall_rules_edit.php made changes root@10.0.20.30 /firewall_rules_edit.php made changes
pass opt2 inet keep state Allow SSH from 'debian' to 'TrueNAS' in 1 tcp
10.0.20.101/24
TrueNAS
22
root@10.0.20.30 /firewall_rules_edit.php made changes root@10.0.20.30 /firewall_rules_edit.php made changes
pass opt2 inet keep state allow NFS to debian in 1 tcp/udp
10.0.20.101/32
TrueNAS
2049
root@10.0.20.24 /firewall_rules_edit.php made changes root@10.0.20.24 /firewall_rules_edit.php made changes
pass opt2 inet keep state allow NFS to debian in 1 tcp/udp
10.0.20.101/32
TrueNAS
root@10.0.20.24 /firewall_rules_edit.php made changes root@10.0.20.24 /firewall_rules_edit.php made changes
pass opt2 inet keep state Allow Dions phone to access Standard Notes server in 1 tcp
dion_phone
docker
3125
root@10.0.20.24 /firewall_rules_edit.php made changes root@10.0.20.24 /firewall_rules_edit.php made changes
pass opt2 inet keep state in 1 tcp
optiplex
Proxmox_Dell
8006
root@10.0.20.30 /firewall_rules_edit.php made changes root@10.0.20.30 /firewall_rules_edit.php made changes
pass opt2 inet keep state Allow access to 'memos' server in 1 tcp opt2
docker
5230
root@10.0.20.24 /firewall_rules_edit.php made changes root@10.0.20.24 /firewall_rules_edit.php made changes
pass opt2 inet keep state Allow my phone to admin pihole in 1 tcp
dion_phone
PiHole
443
root@10.0.20.24 /firewall_rules_edit.php made changes root@10.0.20.24 /firewall_rules_edit.php made changes
pass opt2 inet keep state temporary - connect phone to guest tv in 1
dion_phone
10.0.40.109/32
root@10.0.20.24 /firewall_rules_edit.php made changes root@10.0.20.24 /firewall_rules_edit.php made changes
pass opt2 inet keep state Allow only internet in 1 opt2
PrivateNet
1
root@10.0.20.24 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes
pass opt3 inet keep state in 1
hass
PiHole
root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes
pass opt3 inet keep state star projector temporary allow internet in 1
10.0.30.19
PiHole
root@10.0.20.22 /firewall_rules_edit.php made changes root@10.0.20.22 /firewall_rules_edit.php made changes 1
pass opt3 inet keep state in 1 opt3
PiHole
root@10.0.20.22 /firewall_rules_edit.php made changes root@10.0.20.22 /firewall_rules_edit.php made changes 1
pass opt3 inet keep state Allow HASS server internet access in 1
hass
1 root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes
pass opt3 inet keep state in 1
_3dprint
1 root@10.0.20.30 /firewall_rules_edit.php made changes root@10.0.20.30 /firewall_rules_edit.php made changes
pass opt3 inet keep state Allow internet to Ticwatch watch in 1
10.0.30.12/24
1 root@10.0.20.30 /firewall_rules_edit.php made changes root@10.0.20.30 /firewall_rules_edit.php made changes
block opt3 inet46 keep state Block everything in 1 opt3 1 root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes 1 pass opt3 inet46 keep state Pass everything in 1 opt3 1 root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes 1 pass opt3 inet keep state Lounge wifi clock ntp access to 'fakentp' in 1 udp
10.0.30.18
10.0.10.52
123
root@10.0.20.24 /firewall_rules_edit.php made changes root@10.0.20.24 /firewall_rules_edit.php made changes
pass opt3 inet keep state Lounge wifi clock ntp access to 'fakentp2' in 1 udp
10.0.30.18/32
10.0.10.51/32
123
root@10.0.20.24 /firewall_rules_edit.php made changes root@10.0.20.24 /firewall_rules_edit.php made changes
block opt3 inet keep state Lounge wifi clock BLOCK ALL in 1
10.0.30.18/24
1 root@10.0.20.22 /firewall_rules_edit.php made changes root@10.0.20.22 /firewall_rules_edit.php made changes
pass opt3 inet keep state Lounge wifi clock ntp access in 1 tcp/udp
10.0.30.18/24
10.0.1.1/24
123
root@10.0.20.22 /firewall_rules_edit.php made changes root@10.0.20.22 /firewall_rules_edit.php made changes 1
pass opt3 inet keep state in 1 opt3
PrivateNet
1
root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes 1
block opt4 inet keep state block everything in 1 1 1 root@10.0.20.22 /firewall_rules_edit.php made changes root@10.0.20.22 /firewall_rules_edit.php made changes 1 pass opt4 inet46 keep state Allow DNS in 1 tcp/udp opt4
PiHole
53
root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes
block opt4 inet keep state Block other DNS in 1 tcp/udp opt4 1 53 root@10.0.20.24 /firewall_rules_edit.php made changes root@10.0.20.24 /firewall_rules_edit.php made changes block opt4 inet keep state Block DoT in 1 tcp opt4 1 853 root@10.0.20.24 /firewall_rules_edit.php made changes root@10.0.20.24 /firewall_rules_edit.php made changes pass opt4 inet keep state Allow samba to TrueNAS in 1 tcp/udp
Trading1
TrueNAS
445
root@10.0.20.30 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes
pass opt4 inet keep state Allow samba to TrueNAS in 1 tcp/udp
Trading2
TrueNAS
445
root@10.0.20.30 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes
pass opt4 inet keep state Allow samba to TrueNAS in 1 tcp/udp
Trading3
TrueNAS
445
root@10.0.20.24 /firewall_rules_edit.php made changes root@10.0.20.24 /firewall_rules_edit.php made changes
pass opt4 inet keep state in 1 tcp
Trading2
10.0.1.15/24
root@10.0.20.22 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes
pass opt4 inet keep state in 1 tcp
Trading1
10.0.1.1/24
8004
root@10.0.40.32 /firewall_rules_edit.php made changes root@10.0.40.32 /firewall_rules_edit.php made changes 1
pass opt4 inet keep state in 1 tcp
Trading2
Proxmox_Dell
8006
root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes 1
pass opt4 inet keep state in 1 tcp
Trading1
Proxmox_Dell
8006
root@10.0.40.31 /firewall_rules_edit.php made changes root@10.0.40.31 /firewall_rules_edit.php made changes 1
pass opt4 inet keep state in 1 tcp/udp
Trading1
docker
root@10.0.40.31 /firewall_rules_edit.php made changes root@10.0.40.31 /firewall_rules_edit.php made changes 1
pass opt4 inet keep state in 1 tcp/udp
Trading2
docker
root@10.0.20.22 /firewall_rules_edit.php made changes root@10.0.20.22 /firewall_rules_edit.php made changes 1
pass opt4 inet keep state test access to fakentp2 server (+30min) in 1 udp
Trading1
10.0.10.51/32
123
root@10.0.20.24 /firewall_rules_edit.php made changes root@10.0.20.24 /firewall_rules_edit.php made changes
block opt4 inet keep state block internet on kids phone in 1 tcp/udp
10.0.40.21
1 80 root@10.0.20.22 /firewall_rules_edit.php made changes root@10.0.20.22 /firewall_rules_edit.php made changes
block opt4 inet keep state block internet on kids phone in 1 tcp/udp
10.0.40.21
1 443 root@10.0.20.22 /firewall_rules_edit.php made changes root@10.0.20.22 /firewall_rules_edit.php made changes
pass opt4 inet keep state allow jellyfin on the TV (guest network) in 1
10.0.40.16/32
nginx,jellyfin
root@10.0.20.24 /firewall_rules_edit.php made changes root@10.0.20.24 /firewall_rules_edit.php made changes
pass opt4 inet46 keep state in 1 opt4
PrivateNet
1
root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes
pass opt5 inet46 keep state Allow DNS in 1 tcp/udp opt5 opt5ip 53 root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes pass opt5 inet keep state Allow laptop everything through wireguard in 1
10.0.8.11/24
1 root@10.0.20.30 /firewall_rules_edit.php made changes root@10.0.20.30 /firewall_rules_edit.php made changes 1
pass opt5 inet keep state in 1 opt5
PiHole
root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes
pass opt5 inet keep state in 1 tcp/udp opt5
nginx
root@10.0.20.30 /firewall_rules_edit.php made changes root@10.0.20.30 /firewall_rules_edit.php made changes
pass opt5 inet keep state in 1 opt5
hass
root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes
pass opt5 inet keep state in 1 opt5
jellyfin
root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes
pass opt5 inet keep state Allow Immich photo backup in 1 tcp/udp opt5
docker
2283
root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes
pass opt5 inet keep state in 1 tcp opt5
docker
arrPorts
root@10.0.20.22 /firewall_rules_edit.php made changes root@10.0.20.22 /firewall_rules_edit.php made changes
pass opt5 inet keep state in 1 tcp opt5
OMV
arrPorts
root@10.0.20.22 /firewall_rules_edit.php made changes root@10.0.20.22 /firewall_rules_edit.php made changes 1
pass opt5 inet keep state in 1 tcp opt5
Trading1
3389
root@10.0.40.32 /firewall_rules_edit.php made changes root@10.0.40.32 /firewall_rules_edit.php made changes
pass opt5 inet keep state in 1 tcp opt5
Trading2
3389
root@10.0.40.32 /firewall_rules_edit.php made changes root@10.0.40.32 /firewall_rules_edit.php made changes
pass opt5 inet keep state connect to optiplex micro PC in 1 tcp opt5
optiplex
3389
root@10.0.20.30 /firewall_rules_edit.php made changes root@10.0.20.30 /firewall_rules_edit.php made changes
pass opt5 inet keep state allow wireguard phone access to adminpc remote desktop in 1 tcp/udp opt5
adminpc
3389
root@10.0.40.31 /firewall_rules_edit.php made changes root@10.0.40.31 /firewall_rules_edit.php made changes
pass opt5 inet keep state in 1 tcp/udp opt5
TrueNAS
445
root@10.0.20.30 /firewall_rules_edit.php made changes root@10.0.20.30 /firewall_rules_edit.php made changes
pass opt5 inet keep state in 1 opt5
kodi
root@10.0.40.31 /firewall_rules_edit.php made changes root@10.0.40.31 /firewall_rules_edit.php made changes 1
pass opt5 inet46 keep state in 1 opt5
PrivateNet
1
root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes
block opt6 inet keep state block everything in 1 1 1 root@10.0.20.22 /firewall_rules_edit.php made changes root@10.0.20.22 /firewall_rules_edit.php made changes 1 pass opt6 inet keep state Allow DNS to pihole in 1 tcp/udp opt6
PiHole
53
root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes
block opt6 inet keep state Block other DNS in 1 tcp/udp opt6 1 53 root@10.0.20.24 /firewall_rules_edit.php made changes root@10.0.20.24 /firewall_rules_edit.php made changes block opt6 inet keep state Block DoT requests in 1 tcp opt6 1 853 root@10.0.20.24 /firewall_rules_edit.php made changes root@10.0.20.24 /firewall_rules_edit.php made changes block opt6 inet keep state block poco f1 in 1
10.0.50.12
1 root@10.0.20.22 /firewall_rules_edit.php made changes root@10.0.20.22 /firewall_rules_edit.php made changes 1
pass opt6 inet keep state in 1 tcp/udp opt6
minecraft
MinecraftPorts
root@10.0.20.24 /firewall_rules_edit.php made changes root@10.0.20.24 /firewall_rules_edit.php made changes
pass opt6 inet keep state in 1 tcp 1
jellyfin
8096
root@10.0.20.24 /firewall_rules_edit.php made changes root@10.0.20.24 /firewall_rules_edit.php made changes
pass opt6 inet keep state Allow SMB to Archie's laptop in 1 tcp/udp
10.0.50.151
TrueNAS
445
root@10.0.20.24 /firewall_rules_edit.php made changes root@10.0.20.24 /firewall_rules_edit.php made changes
pass opt6 inet keep state Allow SMB to Archie's laptop in 1 tcp/udp
TrueNAS
10.0.50.151/32
139
root@10.0.20.24 /firewall_rules_edit.php made changes root@10.0.20.24 /firewall_rules_edit.php made changes
pass opt6 inet keep state Allow only internet in 1 opt6
PrivateNet
1
root@10.0.1.131 /firewall_rules_edit.php made changes root@10.0.1.131 /firewall_rules_edit.php made changes
ICMP icmp ICMP TCP tcp Generic TCP HTTP http Generic HTTP / 200 HTTPS https Generic HTTPS / 200 SMTP send Generic SMTP 220 * 0.opnsense.pool.ntp.org system_information-container:00000000-col3:show,services_status-container:00000001-col4:show,gateways-container:00000002-col4:show,interface_list-container:00000003-col4:show 2 root@10.0.20.24 /services_dhcp_edit.php made changes 1 PrivateNet network 0 10.0.0.0/8 172.16.0.0/12 192.168.0.0/16 All local networks 1 OMV host 0 10.0.1.11 OMV Server 1 Proxmox_Dell host 0 10.0.1.6 Dell R630 1 nginx host 0 10.0.1.15 nginx instance 1 Trading1 host 0 10.0.40.31 VM for trading 1 Trading2 host 0 10.0.40.32 VM for trading 1 terminal host 0 10.0.20.101 vm for shell access (debian) 1 minecraft host 0 10.0.10.30 minecraft velocity proxy 0 minecraft2 host 0 10.0.10.32 0 minecraft3 host 0 10.0.10.33 0 minecraft4 host 0 10.0.10.34 1 PiHole host 0 10.0.1.4 1 hass host 0 10.0.30.11 1 jellyfin host 0 10.0.10.24 jellyfin server 1 docker host 0 10.0.10.13 1 laptop host 0 10.0.20.22 10.0.20.24 1 dion_phone host 0 10.0.20.23 1 kodi host 0 10.0.20.15 1 WebPorts port 0 80 443 1 arrPorts port 0 6969 7878 8686 8787 8989 8080 8081 ports used by the *arr services 1 delugePorts port 0 8112 58846 1 adminpc host 0 10.0.20.30 Windows VM for admin 1 optiplex host 0 10.0.20.21 Desktop Micro PC 1 XPS131 host 0 10.0.20.24 Dell XPS 13 2-in-1 laptop 1 _3dprint host 0 10.0.30.20 1 TrueNAS host 0 10.0.10.12 1 MinecraftPorts port 0 19132 25565 1 velocity host 0 10.0.10.30 minecraft proxy server (velocity) 1 Trading3 host 0 10.0.40.33 VM for trading 0 0 0 wan 192.168.0.0/16,10.0.0.0/8,172.16.0.0/12 W0D23 4 ac medium 0 0 0 0 0 0 0 0 0 0 16 32 4 1000 1 0 0 0 1 0 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 ipsec 0 1 0 opnsense 1 1 0 on strip 1 1 0 admin@localhost.local 0 /var/squid/cache 256 always 100 16 256 0 0 0 2048 1024 1024 256 0 0 username password lan 3128 3129 0 0 4 5 0 3401 public 2121 0 1 0 80:http,21:ftp,443:https,70:gopher,210:wais,1025-65535:unregistered ports,280:http-mgmt,488:gss-http,591:filemaker,777:multiling http 443:https 0 icap://[::1]:1344/avscan icap://[::1]:1344/avscan 1 0 0 X-Username 1 1024 60 OPNsense proxy authentication 2 5