opnsensevfs.read_maxIncrease UFS read-ahead speeds to match the state of hard drives and NCQ.net.inet.ip.portrange.firstSet the ephemeral port range to be lower.net.inet.tcp.blackholeDrop packets to closed TCP ports without returning a RSTnet.inet.udp.blackholeDo not send ICMP port unreachable messages for closed UDP portsnet.inet.ip.random_idRandomize the ID field in IP packetsnet.inet.ip.sourceroute
Source routing is another way for an attacker to try to reach non-routable addresses behind your box.
It can also be used to probe for information about your internal networks. These functions come enabled
as part of the standard FreeBSD core system.
net.inet.ip.accept_sourceroute
Source routing is another way for an attacker to try to reach non-routable addresses behind your box.
It can also be used to probe for information about your internal networks. These functions come enabled
as part of the standard FreeBSD core system.
net.inet.icmp.log_redirect
This option turns off the logging of redirect packets because there is no limit and this could fill
up your logs consuming your whole hard drive.
net.inet.tcp.drop_synfinDrop SYN-FIN packets (breaks RFC1379, but nobody uses it anyway)net.inet6.ip6.redirectEnable sending IPv6 redirectsnet.inet6.ip6.use_tempaddrEnable privacy settings for IPv6 (RFC 4941)net.inet6.ip6.prefer_tempaddrPrefer privacy addresses and use them over the normal addressesnet.inet.tcp.syncookiesGenerate SYN cookies for outbound SYN-ACK packetsnet.inet.tcp.recvspaceMaximum incoming/outgoing TCP datagram size (receive)net.inet.tcp.sendspaceMaximum incoming/outgoing TCP datagram size (send)net.inet.tcp.delayed_ackDo not delay ACK to try and piggyback it onto a data packetnet.inet.udp.maxdgramMaximum outgoing UDP datagram sizenet.link.bridge.pfil_onlyipHandling of non-IP packets which are not passed to pfil (see if_bridge(4))net.link.bridge.pfil_local_physSet to 1 to additionally filter on the physical interface for locally destined packetsnet.link.bridge.pfil_memberSet to 0 to disable filtering on the incoming and outgoing member interfaces.net.link.bridge.pfil_bridgeSet to 1 to enable filtering on the bridge interfacenet.link.tap.user_openAllow unprivileged access to tap(4) device nodeskern.randompidRandomize PID's (see src/sys/kern/kern_fork.c: sysctl_kern_randompid())net.inet.ip.intr_queue_maxlenMaximum size of the IP input queuehw.syscons.kbd_rebootDisable CTRL+ALT+Delete reboot from keyboard.hw.uart.consoleHint at default settings for serial console in case the autodetect is not workingnet.inet.tcp.log_debugEnable TCP extended debuggingnet.inet.icmp.icmplimSet ICMP Limitsnet.inet.tcp.tsoTCP Offload Enginenet.inet.udp.checksumUDP Checksumskern.ipc.maxsockbufMaximum socket buffer sizevm.pmap.ptiPage Table Isolation (Meltdown mitigation, requires reboot.)hw.ibrs_disableDisable Indirect Branch Restricted Speculation (Spectre V2 mitigation)security.bsd.see_other_gidsHide processes running as other groupssecurity.bsd.see_other_uidsHide processes running as other usersnet.inet.ip.redirect0Enable/disable sending of ICMP redirects in response to IP packets for which a better,
and for the sender directly reachable, route and next hop is known.
net.inet.icmp.drop_redirect1
Redirect attacks are the purposeful mass-issuing of ICMP type 5 packets. In a normal network, redirects
to the end stations should not be required. This option enables the NIC to drop all inbound ICMP redirect
packets without returning a response.
net.local.dgram.maxdgramMaximum outgoing UDP datagram sizedev.netmap.buf_num1000000Automatically added by Zenarmor: Netmap Generic/Native Drivernormalgondor2dss.mywire.org11999adminssystemSystem Administratorspage-all0,20000root0system$2y$10$V5R3OFK0X8dz/shqsIj3AuuhVvT/TR8gA6u9s.j0gknxplOMg4tyCSystem Administrator2000dion0userLYA2AG53OBHL35L6NMGE4KEM4ZPHYAWI$2y$11$77rIEmn8xjecWoKfve.cZ.Fb5PIDN6PR8mM4MdlHubJiuBMiWacqWdionscarman@gmail.comDion20012000Australia/Adelaide0.opnsense.pool.ntp.org 1.opnsense.pool.ntp.org 2.opnsense.pool.ntp.org 3.opnsense.pool.ntp.orghttp60132b5e4fc3d80041yes11111hadphadphadpmonthlyaesni11admins1enabled110OPNsense-Backup1ssh://omv.dss.mywire.org:222/opnsense/OPNsense.gitmain-----BEGIN OPENSSH PRIVATE KEY-----
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
QyNTUxOQAAACDP5vkf5UfCrx0gxRfPWKyplHvuwDz5hOPh3X8oXMLNTAAAAKAgiKUyIIil
MgAAAAtzc2gtZWQyNTUxOQAAACDP5vkf5UfCrx0gxRfPWKyplHvuwDz5hOPh3X8oXMLNTA
AAAEDJKcyJaUCgNMTKViAR3qCMCgL5oRU0AbdG0q29IDGpQ8/m+R/lR8KvHSDFF89YrKmU
e+7APPmE4+Hdfyhcws1MAAAAG3Jvb3RAZ29uZG9yMi5kc3MubXl3aXJlLm9yZwEC
-----END OPENSSH PRIVATE KEY-----
giten_USnonenonenonenonenonenonenonenone1os-acme-client,os-ddclient,os-git-backup,os-nginx,os-sensei,os-sunnyvalley,os-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1rq_I9W6E96oWuB5tfzLYR2M6Zc_2bgpcon10tQ;ELd8"%YW=@VBpppoe0NBNwired1111pppoevtnet1110.0.1.1241Loopback1lo0127.0.0.1::18128none111openvpnOpenVPNgroup1vlan01Servers110.0.10.124vlan02General110.0.20.124vlan03IOTnetwork110.0.30.124vlan04Guest1110.0.40.1241WireGuard (Group)wireguard11groupwg0WireGuardVPN11vlan05Kids1110.0.50.1241hmac-md510.0.1.20010.0.1.24510.0.1.4bc:24:11:a7:1a:ea10.0.1.4shelobPi-Hole server10.0.1.1e0:3f:49:b2:12:3510.0.1.11omvOpenMediaVault8640000:26:6c:28:0a:a110.0.1.12proxmoxba:f3:5a:9e:b7:3310.0.1.15nginxnginx reverse proxy serverbc:24:11:fd:6c:7310.0.1.20smolxpMinimal XP to manage cisco router86:fa:fd:13:d4:2510.0.1.23heimdallheimdall application dashboard52:81:b4:45:f0:0a10.0.1.25elrond4a:91:89:08:73:d810.0.1.26boromire2:8b:aa:80:6b:a610.0.1.27ansibledebian ct on rohan8e:61:fc:24:89:8510.0.1.41certbot-vmcertbot vm for testing18:c0:4d:db:2a:7c10.0.1.101SimRigSim Racing PCf4:8c:50:1a:36:9b10.0.1.102dion-latitude66:a3:f0:c7:5e:8910.0.1.103debian2debian2 vm7a:3b:72:16:fd:b310.0.1.104vm-desktopalpine linux with wmec:71:db:49:8e:2410.0.1.121Camera1ec:71:db:8c:07:4e10.0.1.122Camera2bc:24:11:df:76:9910.0.1.135macosMac OS virtual machinedc:a6:32:e0:85:2910.0.1.161LegolasLegolas ethernet40:55:39:cc:77:0010.0.1.250anduinCisco router1hmac-md510.0.20.12010.0.20.19910.0.1.4dc:a6:32:e0:85:2a10.0.20.15kodi18:c0:4d:db:2a:7c10.0.20.20simrigGaming PCa4:bb:6d:9a:9a:f210.0.20.21optiplexOptiplex for Tradingf4:8c:50:1a:36:9b10.0.20.22laptop9c:5a:81:75:74:2010.0.20.23pocof33c:9c:0f:fa:fe:1510.0.20.24xps131bc:24:11:09:20:0710.0.20.30win11bc:24:11:df:76:9910.0.20.35macosbc:24:11:83:20:b310.0.20.43whonix-gwwhonix gateway4a:02:45:30:ea:0210.0.20.101debian5c:80:b6:47:f6:7b10.0.20.121optiplex-wifiOptiplex MicroPC for Trading (WiFi)1hmac-md510.0.10.10010.0.10.19910.0.1.4e0:3f:49:b2:12:3510.0.10.11omvbc:24:11:96:40:ba10.0.10.12truenasbc:24:11:cb:c8:8510.0.10.13dockerbc:24:11:ab:76:a310.0.10.21websimple apache web serverde:f9:0c:c1:d5:5c10.0.10.24jellyfinbc:24:11:ee:62:5c10.0.10.26gpodderbc:24:11:9e:e9:f710.0.10.27nextcloudbc:24:11:2c:3e:0910.0.10.31minecraft1bc:24:11:7e:10:ae10.0.10.32minecraft2minecraft 'scarman' serverbc:24:11:60:b0:4610.0.10.33minecraft3bc:24:11:43:0b:c410.0.10.51fakentp2bc:24:11:a5:41:ea10.0.10.52fakentpbc:24:11:a7:1a:ea10.0.10.53pihole1hmac-md510.0.40.10010.0.40.19910.0.1.456:b5:94:ff:55:f110.0.40.21kidsphone16:e9:1e:ab:33:e210.0.40.31trading166:1f:7a:58:86:ba10.0.40.32trading21hmac-md510.0.30.2110.0.30.199c6:19:1e:a6:d6:fc10.0.30.11hassdss.mywire.org10.0.1.400:0a:f5:46:2a:9f10.0.30.12ticwatch5Dion's Mobvoi Ticwatch 5 pro endurob8:27:eb:a6:f8:ce10.0.30.15pi3Raspberry Pi 32c:3a:e8:1a:44:7210.0.30.18wifi-clockwifi-clock ESP-1A447270:89:76:0a:28:6310.0.30.19star-projectordc:a6:32:e0:85:2a10.0.30.203dprintRaspberry Pi 4 with OctoPrint1hmac-md510.0.50.20010.0.50.23010.0.1.48c:88:2b:00:10:8d10.0.50.11kidspcDesktop PC for the kids (WiFi)f4:60:e2:f8:e2:8010.0.50.12pocof1Phone for the kids94:be:46:ee:df:8110.0.50.142logan-tabLogan's tablet70:bc:10:2f:df:2910.0.50.143XBOXONELogan's Xbox94:be:46:ee:df:8910.0.50.152archie-tabArchie's tablet94:be:46:ee:df:8510.0.50.172harry-tabHarry's tabletpublic10100automatictcpwaninetHASS.ionat_603a219d254010.34486638hass81231wanip8123root@10.0.1.131/firewall_nat_edit.php made changesroot@10.0.1.201/firewall_nat_edit.php made changestcpwaninetdebian vmnat_603a31025c4875.51279624terminal221wanip22root@10.0.40.31/firewall_nat_edit.php made changesroot@10.0.1.201/firewall_nat_edit.php made changestcpwaninetdebian vmnat_6613bfc404c459.15645209terminal221wanip443root@10.0.20.30/firewall_nat_edit.php made changesroot@10.0.20.30/firewall_nat_edit.php made changes1tcpwaninetdebian2 vmnat_61fe6823a62ff9.3865350310.0.1.103221wanip22root@10.0.1.102/firewall_nat_edit.php made changesroot@10.0.1.100/firewall_nat_edit.php made changes1tcpwaninetforward 443 to allow remote access to admin pcnat_66092eb98c4e69.09006077adminpc33891wanip443root@10.0.20.30/firewall_nat_edit.php made changesroot@10.0.20.30/firewall_nat_edit.php made changes1tcpwaninetforward 443 to allow remote access to trading pcnat_6613be95782af6.11754769Trading133891wanip443root@10.0.20.22/firewall_nat_edit.php made changesroot@10.0.20.30/firewall_nat_edit.php made changes1tcpwaninetnginx reverse proxy sslnat_609ab30d1bcb08.88985266nginx4431wanip443root@10.0.1.131/firewall_nat_edit.php made changesroot@10.0.8.6/firewall_nat_edit.php made changestcpwaninetnginx reverse proxy servernat_61d69bc2d88db3.30171087nginx801wanip80root@10.0.1.131/firewall_nat_edit.php made changesroot@10.0.1.100/firewall_nat_edit.php made changestcpwaninetminecraft1 javanat_6189c4e0d85e51.54054052minecraft1255651wanip25565root@10.0.1.131/firewall_nat_edit.php made changesroot@10.0.1.201/firewall_nat_edit.php made changesudpwaninetminecraft1 bedrockpassminecraft1191321wanip19132root@10.0.1.131/firewall_nat_edit.php made changesroot@10.0.1.201/firewall_nat_edit.php made changestcpwaninetminecraft2 javAnat_61eca513f3ab54.12999814minecraft2255661wanip25566root@10.0.1.131/firewall_nat_edit.php made changesroot@10.0.1.201/firewall_nat_edit.php made changesudpwaninetminecraft2 bedrocknat_61eca544a8b730.21185118minecraft2191331wanip19133root@10.0.1.131/firewall_nat_edit.php made changesroot@10.0.1.201/firewall_nat_edit.php made changestcpwaninetminecraft3 javanat_61f372df8b6171.533618961minecraft3255671wanip25567root@10.0.1.131/firewall_nat_edit.php made changesroot@10.0.1.201/firewall_nat_edit.php made changesudpwaninetminecraft3 bedrocknat_61f3734f494c02.955586351minecraft3191341wanip19134root@10.0.1.131/firewall_nat_edit.php made changesroot@10.0.1.201/firewall_nat_edit.php made changestcpwaninetminecraft4 javanat_61f373074cc973.447193201minecraft4255681wanip25568root@10.0.1.131/firewall_nat_edit.php made changesroot@10.0.1.201/firewall_nat_edit.php made changesudpwaninetminecraft4 bedrocknat_61f3736fb310c2.906368781minecraft4191351wanip19135root@10.0.1.131/firewall_nat_edit.php made changesroot@10.0.1.201/firewall_nat_edit.php made changestcpwaninetJellyfin servicesnat_61f140996d6708.06843852jellyfin80961wanip8096root@10.0.1.131/firewall_nat_edit.php made changesroot@10.0.1.100/firewall_nat_edit.php made changestcpwaninetbitwardennat_62261aed26de09.5273262810.0.1.11180801wanip18080root@10.0.1.201/firewall_nat_edit.php made changesroot@10.0.1.201/firewall_nat_edit.php made changes1udpwaninetnat_62cc09e3b73e87.6124856710.0.1.10234781wanip3478root@10.0.1.102/firewall_nat_edit.php made changesroot@10.0.1.102/firewall_nat_edit.php made changes1udpwaninetnat_62cc0a1f5e00c2.7773029810.0.1.10243791wanip4379-4380root@10.0.1.102/firewall_nat_edit.php made changesroot@10.0.1.102/firewall_nat_edit.php made changes1tcp/udpwaninetdelugenat_62dfdf81c63009.2539120310.0.10.1368811wanip6881root@10.0.20.24/firewall_nat_edit.php made changesroot@10.0.1.102/firewall_nat_edit.php made changes1wankeep statetcpinet
hass
8123HASS.ionat_603a219d254010.34486638root@10.0.1.201/firewall_nat_edit.php made changes1wankeep statetcpinet
terminal
22debian vmnat_603a31025c4875.51279624root@10.0.1.201/firewall_nat_edit.php made changespasswaninetkeep stateAllow VPN Trafficin11udp111194root@10.0.1.100/firewall_rules_edit.php made changesroot@10.0.1.100/firewall_rules_edit.php made changes1wankeep statetcpinet
nginx
443nginx reverse proxy sslnat_609ab30d1bcb08.88985266root@10.0.8.6/firewall_nat_edit.php made changes1wankeep statetcpinet
nginx
80nginx reverse proxy servernat_61d69bc2d88db3.30171087root@10.0.1.100/firewall_nat_edit.php made changes1wankeep statetcpinet
minecraft1
25565minecraft1 javanat_6189c4e0d85e51.54054052root@10.0.1.201/firewall_nat_edit.php made changes1wankeep statetcpinet
minecraft2
25566minecraft2 javAnat_61eca513f3ab54.12999814root@10.0.1.201/firewall_nat_edit.php made changes1wankeep stateudpinet
minecraft2
19133minecraft2 bedrocknat_61eca544a8b730.21185118root@10.0.1.201/firewall_nat_edit.php made changes1wankeep statetcpinet
jellyfin
8096Jellyfin servicesnat_61f140996d6708.06843852root@10.0.1.100/firewall_nat_edit.php made changes1wankeep statetcpinet
minecraft3
25567minecraft3 javanat_61f372df8b6171.53361896root@10.0.1.201/firewall_nat_edit.php made changes11wankeep statetcpinet
minecraft4
25568minecraft4 javanat_61f373074cc973.44719320root@10.0.1.201/firewall_nat_edit.php made changes11wankeep stateudpinet
minecraft3
19134minecraft3 bedrocknat_61f3734f494c02.95558635root@10.0.1.201/firewall_nat_edit.php made changes11wankeep stateudpinet
minecraft4
19135minecraft4 bedrocknat_61f3736fb310c2.90636878root@10.0.1.201/firewall_nat_edit.php made changes11wankeep statetcpinet
10.0.1.103
22debian2 vmnat_61fe6823a62ff9.38653503root@10.0.1.100/firewall_nat_edit.php made changes1wankeep statetcpinet
10.0.1.11
18080bitwardennat_62261aed26de09.52732628root@10.0.1.201/firewall_nat_edit.php made changes11wankeep stateudpinet
10.0.1.102
3478nat_62cc09e3b73e87.61248567root@10.0.1.102/firewall_nat_edit.php made changes1wankeep stateudpinet
10.0.1.102
4379-4380nat_62cc0a1f5e00c2.77730298root@10.0.1.102/firewall_nat_edit.php made changes1wankeep statetcp/udpinet
10.0.10.13
6881delugenat_62dfdf81c63009.25391203root@10.0.1.102/firewall_nat_edit.php made changespasswaninetkeep stateAllow WireGuard VPN servicein1udp1wanip51820root@10.0.1.131/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changesnat_66092eb98c4e69.090060771wankeep statetcpinet
adminpc
3389forward 443 to allow remote access to admin pcroot@10.0.20.30/firewall_nat_edit.php made changes1nat_6613be95782af6.117547691wankeep statetcpinet
Trading1
3389forward 443 to allow remote access to trading pcroot@10.0.20.30/firewall_nat_edit.php made changes1nat_6613bfc404c459.156452091wankeep statetcpinet
terminal
22debian vmroot@10.0.20.30/firewall_nat_edit.php made changes1passinetDefault allow LAN to any rulelanlanpassinet6Default allow LAN IPv6 to any rulelanlanpasslaninetkeep stateAllow OpenVPN trafficin1openvpn1root@10.0.1.131/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changespasslaninetkeep statein1icmplan1root@10.0.1.131/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changespasslaninetkeep statein1tcp/udp
terminal
opt2root@10.0.1.131/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changespasslaninetkeep statein1
hass
opt3root@10.0.1.131/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changespasslaninetkeep statein1
terminal
adminpc
root@10.0.40.31/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changespasslaninet46keep statein1tcp/udp
nginx
docker
root@10.0.20.22/firewall_rules_edit.php made changesroot@10.0.20.22/firewall_rules_edit.php made changespasslaninet46keep statein1tcp/udp
nginx
OMV
root@10.0.20.22/firewall_rules_edit.php made changesroot@10.0.20.22/firewall_rules_edit.php made changesOpenVPN wizardin1anyip1194anyudppassonroot@10.0.1.100/wizard.php made changespassopenvpninetkeep stateOpenVPN wizardin1
10.0.8.0/24
1root@10.0.1.100/firewall_rules_edit.php made changesroot@10.0.1.100/wizard.php made changespassopt1inetkeep stateAllow DNS with PiHolein1tcp/udpopt1
PiHole
53root@10.0.1.131/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changespassopt1inetkeep statein1opt1opt1iproot@10.0.1.131/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changespassopt1inetkeep statein1opt1
OMV
root@10.0.1.131/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changespassopt1inetkeep statein1
docker
jellyfin
root@10.0.20.30/firewall_rules_edit.php made changesroot@10.0.20.30/firewall_rules_edit.php made changespassopt1inetkeep statein1
docker
kodi
root@10.0.20.30/firewall_rules_edit.php made changesroot@10.0.20.30/firewall_rules_edit.php made changespassopt1inetkeep statein1tcp
10.0.20.101
10.0.1.1
root@10.0.1.131/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changespassopt1inetkeep statetemporary allow shellinaboxin1tcp
10.0.10.21/24
10.0.1.100/24
22root@10.0.1.131/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changespassopt1inetkeep stateAllow internetin1opt1
PrivateNet
1root@10.0.1.131/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changespassopt2inet46keep stateAllow DNS with PiHolein1tcp/udpopt2
PiHole
53root@10.0.1.131/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changespassopt2inetkeep stateAllow ICMPv4 to all networksin1icmpopt21root@10.0.1.131/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changespassopt2inetkeep stateAllow laptop access to everythingin1
laptop
1root@10.0.20.30/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changespassopt2inetkeep stateAllow admin pc access to everythingin1
adminpc
1root@10.0.40.31/firewall_rules_edit.php made changesroot@10.0.40.31/firewall_rules_edit.php made changespassopt2inetkeep stateAllow access to Home Assistantin1tcpopt2
hass
8123root@10.0.20.22/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changespassopt2inetkeep stateAllow access to Kodiin1tcp/udpopt2
kodi
root@10.0.20.22/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changespassopt2inetkeep stateAllow access to *arr stackin1tcpopt2
docker
arrPortsroot@10.0.20.22/firewall_rules_edit.php made changesroot@10.0.20.22/firewall_rules_edit.php made changespassopt2inetkeep stateAllow access to Delugein1tcpopt2
docker
delugePortsroot@10.0.20.22/firewall_rules_edit.php made changesroot@10.0.20.22/firewall_rules_edit.php made changespassopt2inetkeep stateAllow Immich photo backupin1tcp/udpopt2
docker
2283root@10.0.20.22/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changespassopt2inetkeep stateAllow tvheadendin1tcp/udpopt2
docker
9981root@10.0.20.22/firewall_rules_edit.php made changesroot@10.0.20.22/firewall_rules_edit.php made changespassopt2inetkeep stateCalibre book libraryin1tcp/udpopt2
docker
8080-8081root@10.0.20.30/firewall_rules_edit.php made changesroot@10.0.20.30/firewall_rules_edit.php made changespassopt2inetkeep stateAllow Jellyfinin1tcp/udpopt2
jellyfin
8096root@10.0.20.30/firewall_rules_edit.php made changesroot@10.0.20.30/firewall_rules_edit.php made changespassopt2inetkeep stateAllow nginx accessin1tcp/udpopt2
nginx
root@10.0.1.131/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changespassopt2inetkeep stateAllow nextcloud accessin1tcp/udpopt2
10.0.10.27
root@10.0.20.22/firewall_rules_edit.php made changesroot@10.0.20.22/firewall_rules_edit.php made changespassopt2inetkeep stateAllow samba accessin1tcp/udpopt2
TrueNAS
445root@10.0.20.30/firewall_rules_edit.php made changesroot@10.0.20.30/firewall_rules_edit.php made changespassopt2inetkeep stateAllow samba accessin1tcp/udpopt2
_3dprint
445root@10.0.20.30/firewall_rules_edit.php made changesroot@10.0.20.30/firewall_rules_edit.php made changespassopt2inetkeep stateMinecraft1 serverin1tcp/udpopt2
minecraft1
MinecraftPortsroot@10.0.20.24/firewall_rules_edit.php made changesroot@10.0.20.24/firewall_rules_edit.php made changespassopt2inetkeep stateMinecraft2 serverin1tcp/udpopt2
minecraft2
MinecraftPortsroot@10.0.20.24/firewall_rules_edit.php made changesroot@10.0.20.24/firewall_rules_edit.php made changespassopt2inet46keep statein1
kodi
jellyfin
root@10.0.20.22/firewall_rules_edit.php made changesroot@10.0.20.22/firewall_rules_edit.php made changes1passopt2inetkeep statein1tcp
kodi
OMV
22root@10.0.20.22/firewall_rules_edit.php made changesroot@10.0.20.22/firewall_rules_edit.php made changes1passopt2inetkeep statein1tcp
kodi
OMV
445root@10.0.20.22/firewall_rules_edit.php made changesroot@10.0.20.22/firewall_rules_edit.php made changes1passopt2inetkeep statetvheadend htspin1tcp
kodi
docker
9982root@10.0.20.22/firewall_rules_edit.php made changesroot@10.0.20.22/firewall_rules_edit.php made changes1passopt2inetkeep statetvheadend htspin1tcp
dion_phone
docker
9982root@10.0.20.30/firewall_rules_edit.php made changesroot@10.0.20.30/firewall_rules_edit.php made changespassopt2inetkeep statein1
dion_phone
OMV
root@10.0.20.30/firewall_rules_edit.php made changesroot@10.0.20.30/firewall_rules_edit.php made changespassopt2inetkeep statein1tcp/udp
optiplex
Trading1
3389root@10.0.20.22/firewall_rules_edit.php made changesroot@10.0.20.22/firewall_rules_edit.php made changespassopt2inetkeep statein1tcp/udp
XPS131
Trading1
3389root@10.0.20.22/firewall_rules_edit.php made changesroot@10.0.20.22/firewall_rules_edit.php made changespassopt2inetkeep statein1tcp/udp
optiplex
Trading2
3389root@10.0.20.22/firewall_rules_edit.php made changesroot@10.0.20.22/firewall_rules_edit.php made changespassopt2inetkeep statein1tcp/udp
XPS131
Trading2
3389root@10.0.20.22/firewall_rules_edit.php made changesroot@10.0.20.22/firewall_rules_edit.php made changespassopt2inetkeep statein1tcp/udp
optiplex
adminpc
3389root@10.0.20.22/firewall_rules_edit.php made changesroot@10.0.20.22/firewall_rules_edit.php made changespassopt2inetkeep statein1tcp/udp
XPS131
adminpc
3389root@10.0.20.22/firewall_rules_edit.php made changesroot@10.0.20.22/firewall_rules_edit.php made changespassopt2inetkeep statein1tcp/udpopt2
_3dprint
80root@10.0.20.30/firewall_rules_edit.php made changesroot@10.0.20.30/firewall_rules_edit.php made changespassopt2inetkeep stateAllow SSH from 'debian' to 'TrueNAS'in1tcp
10.0.20.101/24
TrueNAS
22root@10.0.20.30/firewall_rules_edit.php made changesroot@10.0.20.30/firewall_rules_edit.php made changespassopt2inet46keep stateAllow only internetin1opt2
PrivateNet
1root@10.0.1.131/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changespassopt3inetkeep statein1
hass
PiHole
root@10.0.1.131/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changespassopt3inetkeep statestar projector temporary allow internetin1
10.0.30.19
PiHole
root@10.0.20.22/firewall_rules_edit.php made changesroot@10.0.20.22/firewall_rules_edit.php made changes1passopt3inetkeep statein1opt3
PiHole
root@10.0.20.22/firewall_rules_edit.php made changesroot@10.0.20.22/firewall_rules_edit.php made changes1passopt3inetkeep stateAllow HASS server internet accessin1
hass
1root@10.0.1.131/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changespassopt3inetkeep statein1
_3dprint
1root@10.0.20.30/firewall_rules_edit.php made changesroot@10.0.20.30/firewall_rules_edit.php made changespassopt3inetkeep stateAllow internet to Ticwatch watchin1
10.0.30.12/24
1root@10.0.20.30/firewall_rules_edit.php made changesroot@10.0.20.30/firewall_rules_edit.php made changesblockopt3inet46keep stateBlock everythingin1opt31root@10.0.1.131/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changes1passopt3inet46keep statePass everythingin1opt31root@10.0.1.131/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changes1passopt3inetkeep stateLounge wifi clock ntp access to 'fakentp'in1udp
10.0.30.18
10.0.10.52
123root@10.0.20.24/firewall_rules_edit.php made changesroot@10.0.20.24/firewall_rules_edit.php made changespassopt3inetkeep stateLounge wifi clock ntp access to 'fakentp2'in1udp
10.0.30.18/32
10.0.10.51/32
123root@10.0.20.24/firewall_rules_edit.php made changesroot@10.0.20.24/firewall_rules_edit.php made changesblockopt3inetkeep stateLounge wifi clock BLOCK ALLin1
10.0.30.18/24
1root@10.0.20.22/firewall_rules_edit.php made changesroot@10.0.20.22/firewall_rules_edit.php made changespassopt3inetkeep stateLounge wifi clock ntp accessin1tcp/udp
10.0.30.18/24
10.0.1.1/24
123root@10.0.20.22/firewall_rules_edit.php made changesroot@10.0.20.22/firewall_rules_edit.php made changes1passopt3inetkeep statein1opt3
PrivateNet
1root@10.0.1.131/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changes1blockopt4inetkeep stateblock everythingin111root@10.0.20.22/firewall_rules_edit.php made changesroot@10.0.20.22/firewall_rules_edit.php made changes1passopt4inet46keep stateAllow DNSin1tcp/udpopt4
PiHole
53root@10.0.1.131/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changespassopt4inetkeep stateAllow samba to TrueNASin1tcp/udp
Trading1
TrueNAS
445root@10.0.20.30/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changespassopt4inetkeep stateAllow samba to TrueNASin1tcp/udp
Trading2
TrueNAS
445root@10.0.20.30/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changespassopt4inetkeep statein1tcp
Trading2
10.0.1.15/24
root@10.0.20.22/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changespassopt4inetkeep statein1tcp
Trading1
10.0.1.1/24
8004root@10.0.40.32/firewall_rules_edit.php made changesroot@10.0.40.32/firewall_rules_edit.php made changes1passopt4inetkeep statein1tcp
Trading2
Proxmox_Dell
8006root@10.0.1.131/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changes1passopt4inetkeep statein1tcp
Trading1
Proxmox_Dell
8006root@10.0.40.31/firewall_rules_edit.php made changesroot@10.0.40.31/firewall_rules_edit.php made changes1passopt4inetkeep statein1tcp/udp
Trading1
docker
root@10.0.40.31/firewall_rules_edit.php made changesroot@10.0.40.31/firewall_rules_edit.php made changes1passopt4inetkeep statein1tcp/udp
Trading2
docker
root@10.0.20.22/firewall_rules_edit.php made changesroot@10.0.20.22/firewall_rules_edit.php made changes1passopt4inetkeep statetest access to fakentp2 server (+30min)in1udp
Trading1
10.0.10.51/32
123root@10.0.20.24/firewall_rules_edit.php made changesroot@10.0.20.24/firewall_rules_edit.php made changesblockopt4inetkeep stateblock internet on kids phonein1tcp/udp
10.0.40.21
180root@10.0.20.22/firewall_rules_edit.php made changesroot@10.0.20.22/firewall_rules_edit.php made changesblockopt4inetkeep stateblock internet on kids phonein1tcp/udp
10.0.40.21
1443root@10.0.20.22/firewall_rules_edit.php made changesroot@10.0.20.22/firewall_rules_edit.php made changespassopt4inet46keep statein1opt4
PrivateNet
1root@10.0.1.131/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changespassopt5inet46keep stateAllow DNSin1tcp/udpopt5opt5ip53root@10.0.1.131/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changespassopt5inetkeep stateAllow laptop everything through wireguardin1
10.0.8.11/24
1root@10.0.20.30/firewall_rules_edit.php made changesroot@10.0.20.30/firewall_rules_edit.php made changes1passopt5inetkeep statein1opt5
PiHole
root@10.0.1.131/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changespassopt5inetkeep statein1tcp/udpopt5
nginx
root@10.0.20.30/firewall_rules_edit.php made changesroot@10.0.20.30/firewall_rules_edit.php made changespassopt5inetkeep statein1opt5
hass
root@10.0.1.131/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changespassopt5inetkeep statein1opt5
jellyfin
root@10.0.1.131/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changespassopt5inetkeep stateAllow Immich photo backupin1tcp/udpopt5
docker
2283root@10.0.1.131/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changespassopt5inetkeep statein1tcpopt5
docker
arrPortsroot@10.0.20.22/firewall_rules_edit.php made changesroot@10.0.20.22/firewall_rules_edit.php made changespassopt5inetkeep statein1tcpopt5
OMV
arrPortsroot@10.0.20.22/firewall_rules_edit.php made changesroot@10.0.20.22/firewall_rules_edit.php made changespassopt5inetkeep statein1tcpopt5
Trading1
3389root@10.0.40.32/firewall_rules_edit.php made changesroot@10.0.40.32/firewall_rules_edit.php made changespassopt5inetkeep statein1tcpopt5
Trading2
3389root@10.0.40.32/firewall_rules_edit.php made changesroot@10.0.40.32/firewall_rules_edit.php made changespassopt5inetkeep stateconnect to optiplex micro PCin1tcpopt5
optiplex
3389root@10.0.20.30/firewall_rules_edit.php made changesroot@10.0.20.30/firewall_rules_edit.php made changespassopt5inetkeep stateallow wireguard phone access to adminpc remote desktopin1tcp/udpopt5
adminpc
3389root@10.0.40.31/firewall_rules_edit.php made changesroot@10.0.40.31/firewall_rules_edit.php made changespassopt5inetkeep statein1tcp/udpopt5
TrueNAS
445root@10.0.20.30/firewall_rules_edit.php made changesroot@10.0.20.30/firewall_rules_edit.php made changespassopt5inetkeep statein1opt5
kodi
root@10.0.40.31/firewall_rules_edit.php made changesroot@10.0.40.31/firewall_rules_edit.php made changes1passopt5inet46keep statein1opt5
PrivateNet
1root@10.0.1.131/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changesblockopt6inetkeep stateblock everythingin111root@10.0.20.22/firewall_rules_edit.php made changesroot@10.0.20.22/firewall_rules_edit.php made changes1passopt6inetkeep stateAllow DNS to piholein1tcp/udpopt6
PiHole
53root@10.0.1.131/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changesblockopt6inetkeep stateblock poco f1in1
10.0.50.12
1root@10.0.20.22/firewall_rules_edit.php made changesroot@10.0.20.22/firewall_rules_edit.php made changes1passopt6inetkeep stateAllow only internetin1opt6
PrivateNet
1root@10.0.1.131/firewall_rules_edit.php made changesroot@10.0.1.131/firewall_rules_edit.php made changesICMPicmpICMPTCPtcpGeneric TCPHTTPhttpGeneric HTTP/200HTTPShttpsGeneric HTTPS/200SMTPsendGeneric SMTP220 *0.opnsense.pool.ntp.orgsystem_information-container:00000000-col3:show,services_status-container:00000001-col4:show,gateways-container:00000002-col4:show,interface_list-container:00000003-col4:show2root@10.0.20.24/firewall_nat.php made changes1PrivateNetnetwork010.0.0.0/8
172.16.0.0/12
192.168.0.0/16All local networks1OMVhost010.0.1.11OMV Server1Proxmox_Dellhost010.0.1.6Dell R6301nginxhost010.0.1.15nginx instance1Trading1host010.0.40.31VM for trading1Trading2host010.0.40.32VM for trading1terminalhost010.0.20.101vm for shell access (debian)1minecraft1host010.0.10.311minecraft2host010.0.10.321minecraft3host010.0.10.331minecraft4host010.0.10.341PiHolehost010.0.1.41hasshost010.0.30.111jellyfinhost010.0.10.24jellyfin server1dockerhost010.0.10.131laptophost010.0.20.22
10.0.20.241dion_phonehost010.0.20.231kodihost010.0.20.151WebPortsport080
4431arrPortsport06969
7878
8686
8787
8989
8080
8081ports used by the *arr services1delugePortsport08112
588461adminpchost010.0.20.30Windows VM for admin1optiplexhost010.0.20.21Desktop Micro PC1XPS131host010.0.20.24Dell XPS 13 2-in-1 laptop1_3dprinthost010.0.30.201TrueNAShost010.0.10.121MinecraftPortsport019132
19133
19134
19135
25565
25566
25567
25568000wan192.168.0.0/16,10.0.0.0/8,172.16.0.0/12W0D234acmedium00000000001632410001101111111111111111110opnsense110onstrip110admin@localhost.local0/var/squid/cache256always1001625600020481024102425600usernamepasswordlan31283129004503401public212101080:http,21:ftp,443:https,70:gopher,210:wais,1025-65535:unregistered ports,280:http-mgmt,488:gss-http,591:filemaker,777:multiling http443:https0icap://[::1]:1344/avscanicap://[::1]:1344/avscan100X-Username1102460OPNsense proxy authentication2511101001530001dss.mywire.org10000transparent00000010000000100.0.0.0/8,10.0.0.0/8,100.64.0.0/10,169.254.0.0/16,172.16.0.0/12,192.0.2.0/24,192.168.0.0/16,198.18.0.0/15,198.51.100.0/24,203.0.113.0/24,233.252.0.0/24,::1/128,2001:db8::/32,fc00::/8,fd00::/8,fe80::/10allow1VPN Trafficallow10.0.8.0/24000120120127.0.0.1250auto1syslog facility log_daemon0rootX1LCuz2XumSZYuyw2a03ThQZXdp6VmK2812510root@localhost.local0101$HOSTsystem30030aef8bd79-3049-4a29-a09e-cc3902f89efe,ea1add8a-a8ff-4ee7-a4ad-b89ab2e940a1,d28ab101-663f-431e-a949-03511b5a3352,d6c3dd5a-e48f-4936-9d20-12a364043c731RootFsfilesystem/300306a40b9a4-82cc-49f9-918e-dc8d4dd2fe5e0carp_status_changecustom/usr/local/opnsense/scripts/OPNsense/Monit/carp_status3003079c074fb-3628-43b0-b220-1c6d1e98b59c0gateway_alertcustom/usr/local/opnsense/scripts/OPNsense/Monit/gateway_alert30030bdfd739e-1a4d-43e1-aeaf-8ebce8a03c5cPingNetworkPingfailed pingalertNetworkLinkNetworkInterfacefailed linkalertNetworkSaturationNetworkInterfacesaturation is greater than 75%alertMemoryUsageSystemResourcememory usage is greater than 75%alertCPUUsageSystemResourcecpu usage is greater than 75%alertLoadAvg1SystemResourceloadavg (1min) is greater than 6alertLoadAvg5SystemResourceloadavg (5min) is greater than 4.5alertLoadAvg15SystemResourceloadavg (15min) is greater than 3alertSpaceUsageSpaceUsagespace usage is greater than 75%alertChangedStatusProgramStatuschanged statusalertNonZeroStatusProgramStatusstatus != 0alert1gondor2.dss.mywire.org
PlainOpenVPN
11941100opt2,opt4,opt3,opt6,lan,wan,opt1,opt5wanv9127.0.0.1:2056118001500001010241024011ignore204816384163842000prefer-client-ciphersTLSv1.2ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA25630s30s30s3x-1last,libc127.0.0.1local0info088220004600000Zenarmor1*****rootzenarmor periodicalsZenarmor periodicals0043580435816000normal160749160892162.613366321Gondor2dionscarman@gmail.comletsencrypt_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2001618252788607493d4e63660.150400731gondor2.d1s.mywire.orgc98a5105-118e-4cd1-bb72-4cb55e6e31f2f3b8ea57-92f8-4f3a-b83d-60821988f6efkey_40960160none40016431174216074921152a415.690202331http_portfwd_on_wandns01opnsense1wan1acme1wandns_nsupdate12011cloudflarehttps://api.loopia.se/RPCSERVlocalhost4430sha1https://identity.xxxx.conoha.io/v2.060749378bb3d08.120679171nsupdate_internaldns01opnsense1wan1acme1wandns_nsupdate12011cloudflarehttps://api.loopia.se/RPCSERVgondor2.d1s.mywire.orgd1s.mywire.orgkey "rndc-key" {
algorithm hmac-md5;
secret "540682128f302207ad6d1f34f9f0bda1";
};localhost4430sha1https://identity.xxxx.conoha.io/v2.00001102406004030Python-urllib,Nmap,python-requests,libwww-perl,MJ12bot,Jorgee,fasthttp,libwww,Telesphoreo,A6-Indexer,ltx71,okhttp,ZmEu,sqlmap,LMAO/2.0,l9explore,l9tcpid,Masscan,zgrab,Ronin/2.0,Hakai/2.0,Indy\sLibrary,^Mozilla/[\d\.]+$,Morfeus\sFucking\sScanner,MSIE\s[0-6]\.\d+100300ddclient1dynutruman11DjSlS8752!dss.mywire.org0if101300wanDynu04G_gatewayopt7inet192.168.1.100008.8.4.4025511WireGuardVPN08k++HneXqiLm6hIjgY1cuv9MSm2Uv+xGSNHW6Otc1CU=yK8oCWrXxdyntZQLn45847qbGwTlybXufSbVqDXaoFI=5182010.0.1.410.0.8.10d13df78b-0ca7-48ea-8bea-18d0dd30da2b,9a75fa70-916f-4e33-937d-f2c9b2be79f2,9e2b8390-3664-41e6-9bd2-a78ab1d7e2bcwireguard.dss.mywire.org:5182010.0.8.111AndroidPhoneUcMvV5ln3DOMZcX172hLiBFyxGur7h1wNVEdzLtk0T8=10.0.8.12/321Dell_LaptopfQeYJLVL9av6+Ln04KPgGybRLLq+TVp9n4FQ5zMV6Hc=10.0.8.11/321DellXPS13nJTf1MoV63f2Wh+spqY2Wc0ZTL3Q82bomH43J94SSUE=10.0.8.10/32040001raw020127.0.0.180001INFO1d3false174186940340 1,9,18 * * *falsefalse100truetrue1,11,21,31,41,51 * * * *truetruefalse50false00000000000truefalseMN127.0.0.1b64:falsezenarmor_0000000000_6dbaff93-f916-4cdf-b122-01a8613d5195_2/var/db/mongodb60true3072/usr/local/datastore/backup100Mfalsefalsefalsefalse9127.0.0.19996truetruefalsefalseYESNOYESYES600003600000volume10falsefalsefalsefalsevolume45 0 * * *false127.0.0.125NOfalsesmtp-serverfalsefalsetruetrue0truetruefalse514UDPfalse9200dss.mywire.orgfalsefalsetruetruetrue127.0.0.1true0truetruetrueno0001065b4a0e1c3356OPNsense-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 Cert65b4a0e1c3356LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVsakNDQTM2Z0F3SUJBZ0lCQWpBTkJna3Foa2lHOXcwQkFRc0ZBREI0TVFzd0NRWURWUVFHRXdKQlZURUwKTUFrR0ExVUVDQXdDVTBFeEVUQVBCZ05WQkFjTUNFRmtaV3hoYVdSbE1SRXdEd1lEVlFRS0RBaFBVRTV6Wlc1egpaVEVnTUI0R0NTcUdTSWIzRFFFSkFSWVJjM0JoYlVCdmNHNXpaVzV6WlM1dmNtY3hGREFTQmdOVkJBTU1DMDlRClRuTmxibk5sTFVOQk1CNFhEVEkwTURFeU56QTJNalV3TkZvWERUSTFNREl5TnpBMk1qVXdORm93ZGpFTE1Ba0cKQTFVRUJoTUNRVlV4Q3pBSkJnTlZCQWdNQWxOQk1SRXdEd1lEVlFRSERBaEJaR1ZzWVdsa1pURVJNQThHQTFVRQpDZ3dJVDFCT2MyVnVjMlV4SURBZUJna3Foa2lHOXcwQkNRRVdFWE53WVcxQWIzQnVjMlZ1YzJVdWIzSm5NUkl3CkVBWURWUVFEREFsa2FXOXVMV05sY25Rd2dnRWlNQTBHQ1NxR1NJYjNEUUVCQVFVQUE0SUJEd0F3Z2dFS0FvSUIKQVFDamlvT1VCUFdqdFQ4bmJyYlM5bGU0VDZJMENvRjM2MVN5NWVwVTd3QyszVTZ6OUh6QWlrVzJ4K2RuUVluagp4NUhDQ0lpczUvQ2tKWFNtVmJCUEp4MVd3REFqNTIva0EvbEI4UDRpeUhzNTk3ajJSSThqNUsrczVaczRkWkYzCmVSM1I4YlpvNFJ5M2pkSWlhRE5hdUpVWUxlRHhjMTY4aW1RK0wvOXIybGZuWXVZZ0FhNEM3cnk1QUNHL1FpREMKRVFMRWpJeGJZb0dNWXM4T2JSQlBJUXV3a2JaVUxjUW5laHB0K1VjL3ZqZURYeWk2L3dFV0liRkFvb0JGWDN2ZwpzNlZGUTZzOEFUM01jTGc5OVZyaGFBdVpuT3RwZGxNRFgwdCtXV0p0OXJ6NGNZMzFmSC9yMkZudTJIZ2p1ZlZ1CnZ3NlJBbENnUklHMnd5bEpiT3diQzFIMUFnTUJBQUdqZ2dFck1JSUJKekFKQmdOVkhSTUVBakFBTUFzR0ExVWQKRHdRRUF3SUY0REEwQmdsZ2hrZ0JodmhDQVEwRUp4WWxUMUJPYzJWdWMyVWdSMlZ1WlhKaGRHVmtJRU5zYVdWdQpkQ0JEWlhKMGFXWnBZMkYwWlRBZEJnTlZIUTRFRmdRVWRBTHhkRDN6UjBTTndaQVA5YjRtdUl5RjF3d3dnYUlHCkExVWRJd1NCbWpDQmw0QVVka0piK1JWSHRCZFZmUDNPcnBXTlNhamFuOENoZktSNk1IZ3hDekFKQmdOVkJBWVQKQWtGVk1Rc3dDUVlEVlFRSURBSlRRVEVSTUE4R0ExVUVCd3dJUVdSbGJHRnBaR1V4RVRBUEJnTlZCQW9NQ0U5UQpUbk5sYm5ObE1TQXdIZ1lKS29aSWh2Y05BUWtCRmhGemNHRnRRRzl3Ym5ObGJuTmxMbTl5WnpFVU1CSUdBMVVFCkF3d0xUMUJPYzJWdWMyVXRRMEdDQVFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3SXdEUVlKS29aSWh2Y04KQVFFTEJRQURnZ0VCQUtZdk1yZ2xSOHltQnRZenlQUk5BZGtRblJCOVhFMXVDcld0NGpKRjJsYkh4L3REWkg0bApyV0hSZld0RnN6ZmFiQmdEOU9ROHBUZWdaMHJ6MjArSDZNclV1dUZUaE11ZzRKNmgydHpuTzdENnR6SDBCbVh6Ckl2VVNJeGNyZTExRUdlYWs3bjdld3k3NlhhQVowam9EZ0lpcG1PMVJtdVJtSy9mT2d5TjEwYUc5UFFYVElGMDQKdUdTQUlwUHdRZ2JIVG9HdCtpTlhhSnZjSUE1MnRQRWZCWWRieTgyd1VvVVpBYVFzUFdzSXZmYjR3Z0pnL1FhbQpBYldYUjRUaUFBU3psN21OakkrVTlXK0pQTjg5KzREY0kydklmTHVIeTBrSStveGhlNEpBYkd6RDN3MkFlMnZsCnVwZ0ViekJQWkw1MDBhQkN4eTNxZjJlQU0zUUllbHg3TS93PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==LS0tLS1CRUdJTiBQUklWQVRFIEtFWS0tLS0tCk1JSUV2UUlCQURBTkJna3Foa2lHOXcwQkFRRUZBQVNDQktjd2dnU2pBZ0VBQW9JQkFRQ2ppb09VQlBXanRUOG4KYnJiUzlsZTRUNkkwQ29GMzYxU3k1ZXBVN3dDKzNVNno5SHpBaWtXMngrZG5RWW5qeDVIQ0NJaXM1L0NrSlhTbQpWYkJQSngxV3dEQWo1Mi9rQS9sQjhQNGl5SHM1OTdqMlJJOGo1SytzNVpzNGRaRjNlUjNSOGJabzRSeTNqZElpCmFETmF1SlVZTGVEeGMxNjhpbVErTC85cjJsZm5ZdVlnQWE0QzdyeTVBQ0cvUWlEQ0VRTEVqSXhiWW9HTVlzOE8KYlJCUElRdXdrYlpVTGNRbmVocHQrVWMvdmplRFh5aTYvd0VXSWJGQW9vQkZYM3ZnczZWRlE2czhBVDNNY0xnOQo5VnJoYUF1Wm5PdHBkbE1EWDB0K1dXSnQ5cno0Y1kzMWZIL3IyRm51MkhnanVmVnV2dzZSQWxDZ1JJRzJ3eWxKCmJPd2JDMUgxQWdNQkFBRUNnZ0VCQUpoZWdXRHpqZmxNOE41SVpNWUJCcEdPZ0UyRVRFUHlXaU9qMnNQdk9mNmEKS3EyM2FGUHJnREJmNTlWb1ZwU0daK01rR0ZNZ2RqQTVSWW1ENUpTYW1OY3VrS3VqQWJpcml4eEk4RDV3RTM5YQpzbFdnWXN6S1VITUNLYkJjdVg5YXROSGFKbDFvLzF4MUlnYzBsa1E4SFkwOWtZcmtOcXZyTktKTURlbnFzR08vClg5dDUyMXpFZ3cwVURUUUtBbGtCbVZ4RFNWYWpxR0s0Tmx4MUJwd3QxQi85VlQrME9lMnV1d3RGZGN2TzZNMG8KSzR2S2plMUttVnM3RFpKZXk0MEdLOCtkZWpzN3E2aU5Zc0hjYzNJOG53YVN3VTcvMGhiSjliTlI0NDFESEd0MAo2RVRwa3JJVE5NK0RsUnJjOW9EeHpvdE1IWkZzVjlZVTZ3a3Q4NDVYWjRFQ2dZRUEwRExlakt5SFo3eXBrMjBxCndOb0pvTk5UZ3dDNHhJem1vU0NmR2RUWTFMWVEyMmVqOWhsc3dHUTByNHIwVHdxTWNIc3g0SEIySGJpV1hUSVQKWWsyRkV0ZHkwYTNYOHZIUnUvL1U5YzZBQVZQc0xmY3dhdngvbXNKdERielpaTEk0dXd5VGhIa0wvT1BKWlc5LwpVRHZaK2lPd1ZteG5RbE9XMkN2SnlNaHhiNjBDZ1lFQXlSYldoeWdFYThVZDhrRkthZWZZTnQ0OGF0MnJUVkJpCkI2T3FTOHprSlFLRGN3czQwRmdzclA0dGI4VkZZc3QvUUNQTmZVRCswRHVLQjJwQURQc3Erc2lhOVhWUS9oaFEKbnNTSEc2Uk9MdXM5ZnBFYjdPMzhmL1hkMkkrYzdVa0VYZ00zRVJtNUNDZ25ZelZhTjkxWkNFd2pJaytZTG81NAptY1hvUHVSWEZHa0NnWUFpOXNnRkc5eEpnWmVBMks1N1lLS0pUYlFTcGdaaGk4QVhneUQwOTVmS2NTRDNsN29qClZEVzlRWmJQZkNoM05iQk1HNFJPeXRRclBacVM0QnY5UUVOKzNJdTl4dElqVEpVS1czWnFLVm01MzF3a2hBU3YKa3VQakc0K3c1T3dsU3dEWCtNNjFTcGJHeTRKQTlLNk96TjVZY2JIbGNhTU5zbmY4cWEzamVEWUVxUUtCZ0dUcApTUTdhVGgybTliZzBlNXRaOVc3VFo0NVpYeldWT1J5TVRWRnNxTERKNmgwNWJIRmhUa29oNDd0TFM5NmdNR09ICmsvOWZOb0JZNEpPSUJreDlYcndySDFnK1h6NmtCUkVubm9XSWxwT0ZDWDhTWXVrckpLTXlSdm4rVjhuYjhvMGIKSCs4ODhWWGVrS1dBaUoyd1BwV2pYNTVBUXlaWjZMdUNUV0lDUkpEQkFvR0FBTGdXbXdJUmpFK05hUThkZDVxMAprck5hbURveWtxMVNkZjMvRGNyRU9Db05yTloyQ1pkY1ZOMkU2WFUySnE5cHQrZUlhQVdNWWFic0g1SzFQWDNZClNzaUNBL3FubXlSVHFWQmlzdGNmaXJnMlc3VEhlTml2RlJKTy9YQXRQUTNGUHVzZ1FObll0UFllcEJRL0dLdE0KWDRrOSt2N1ZVRWRmM2VLVERpZXFrOHM9Ci0tLS0tRU5EIFBSSVZBVEUgS0VZLS0tLS0K0pppoepppoe0vtnet2dionscarman@iinet.net.auRGpTIzMxMjg4MDA0IQ==vtnet1400Guestvlan04vtnet1100Serversvlan01vtnet1200Generalvlan02vtnet1300IOT networkvlan03vtnet1500Kidsvlan05dnsomatictruman11DjSlS8752!d1s.mywire.org11wanwan10lan00:26:6c:28:0a:a1Proxmoxlan00:1f:c6:9d:f7:a8Rohanlan18:c0:4d:db:2a:7cSimRigopt25c:80:b6:47:f6:7bOptiPlex Micro0014000