LegacyTechops/mtp-configs/ovh-core-rtr01.turnsys.net

1257 lines
40 KiB
Plaintext
Raw Normal View History

<?xml version="1.0"?>
<pfsense>
<version>15.8</version>
<lastchange></lastchange>
<system>
<optimization>normal</optimization>
<hostname>ovh-core-rtr01</hostname>
<domain>turnsys.net</domain>
<group>
<name>all</name>
<description><![CDATA[All Users]]></description>
<scope>system</scope>
<gid>1998</gid>
</group>
<group>
<name>admins</name>
<description><![CDATA[System Administrators]]></description>
<scope>system</scope>
<gid>1999</gid>
<member>0</member>
<priv>page-all</priv>
</group>
<user>
<name>admin</name>
<descr><![CDATA[System Administrator]]></descr>
<scope>system</scope>
<groupname>admins</groupname>
<bcrypt-hash>$2b$10$7JpSzVedN7s.PnnMwkAy3.0J6sKliUJerfIL1HlY64kaPVSrZ8c9u</bcrypt-hash>
<uid>0</uid>
<priv>user-shell-access</priv>
<dashboardcolumns>2</dashboardcolumns>
<authorizedkeys>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</authorizedkeys>
<ipsecpsk></ipsecpsk>
<webguicss>pfSense.css</webguicss>
<expires></expires>
</user>
<nextuid>2000</nextuid>
<nextgid>2000</nextgid>
<timeservers>pfv-ucs.turnsys.net ovh-ucs.turnsys.net satx-ucs.turnsys.net</timeservers>
<webgui>
<protocol>https</protocol>
<loginautocomplete></loginautocomplete>
<ssl-certref>59344eda4e727</ssl-certref>
<dashboardcolumns>2</dashboardcolumns>
<port></port>
<max_procs>2</max_procs>
<webguicss>pfSense.css</webguicss>
</webgui>
<disablesegmentationoffloading></disablesegmentationoffloading>
<disablelargereceiveoffloading></disablelargereceiveoffloading>
<ipv6allow></ipv6allow>
<powerd_ac_mode>hadp</powerd_ac_mode>
<powerd_battery_mode>hadp</powerd_battery_mode>
<powerd_normal_mode>hadp</powerd_normal_mode>
<bogons>
<interval>monthly</interval>
</bogons>
<timezone>America/Chicago</timezone>
<ssh>
<sshdkeyonly>enabled</sshdkeyonly>
</ssh>
<serialspeed>115200</serialspeed>
<primaryconsole>serial</primaryconsole>
<enablesshd>enabled</enablesshd>
<sshdkeyonly></sshdkeyonly>
<maximumstates></maximumstates>
<aliasesresolveinterval></aliasesresolveinterval>
<maximumtableentries></maximumtableentries>
<maximumfrags></maximumfrags>
<enablenatreflectionpurenat>yes</enablenatreflectionpurenat>
<reflectiontimeout></reflectiontimeout>
<disablechecksumoffloading></disablechecksumoffloading>
<language>en_US</language>
<dns1gw>none</dns1gw>
<dnsserver>10.253.3.201</dnsserver>
<dnslocalhost></dnslocalhost>
</system>
<interfaces>
<wan>
<enable></enable>
<if>em0</if>
<blockpriv></blockpriv>
<blockbogons></blockbogons>
<descr><![CDATA[WAN]]></descr>
<spoofmac>00:50:56:00:d6:9d</spoofmac>
<ipaddr>158.69.183.161</ipaddr>
<subnet>29</subnet>
<gateway>WANGW</gateway>
</wan>
<lan>
<enable></enable>
<if>vtnet0</if>
<descr><![CDATA[TSYS]]></descr>
<spoofmac></spoofmac>
<ipaddr>10.253.9.254</ipaddr>
<subnet>24</subnet>
</lan>
<opt1>
<descr><![CDATA[mgmt]]></descr>
<if>vtnet1</if>
<spoofmac></spoofmac>
<enable></enable>
<ipaddr>10.253.3.254</ipaddr>
<subnet>24</subnet>
</opt1>
<opt2>
<descr><![CDATA[rackrental]]></descr>
<if>vtnet2</if>
<spoofmac></spoofmac>
<enable></enable>
<ipaddr>10.253.6.254</ipaddr>
<subnet>24</subnet>
</opt2>
<opt3>
<descr><![CDATA[FNF]]></descr>
<if>vtnet3</if>
<spoofmac></spoofmac>
<enable></enable>
<ipaddr>10.253.7.254</ipaddr>
<subnet>24</subnet>
</opt3>
<opt4>
<descr><![CDATA[baremetal]]></descr>
<if>vtnet4</if>
<spoofmac></spoofmac>
<enable></enable>
<ipaddr>10.253.44.254</ipaddr>
<subnet>24</subnet>
</opt4>
</interfaces>
<staticroutes></staticroutes>
<dhcpd>
<lan>
<range>
<from>10.253.9.10</from>
<to>10.253.9.244</to>
</range>
</lan>
</dhcpd>
<dhcpdv6>
<lan>
<range>
<from>::1000</from>
<to>::2000</to>
</range>
<ramode>assist</ramode>
<rapriority>medium</rapriority>
</lan>
</dhcpdv6>
<snmpd>
<syslocation>OVH</syslocation>
<syscontact>prodtechopsalerts@turnsys.com</syscontact>
<rocommunity>kn3lmgmt</rocommunity>
<modules>
<mibii></mibii>
<netgraph></netgraph>
<pf></pf>
<hostres></hostres>
<ucd></ucd>
<regex></regex>
</modules>
<enable></enable>
<pollport>161</pollport>
<trapserver></trapserver>
<trapserverport>162</trapserverport>
<trapstring></trapstring>
<bindip>opt1</bindip>
</snmpd>
<diag>
<ipv6nat></ipv6nat>
</diag>
<syslog>
<nentries>50</nentries>
<remoteserver>10.253.3.99</remoteserver>
<remoteserver2></remoteserver2>
<remoteserver3></remoteserver3>
<sourceip></sourceip>
<ipproto>ipv4</ipproto>
<logall></logall>
<enable></enable>
</syslog>
<nat>
<outbound>
<mode>automatic</mode>
</outbound>
<separator></separator>
<rule>
<source>
<any></any>
</source>
<destination>
<address>158.69.183.165</address>
<port>443</port>
</destination>
<protocol>tcp</protocol>
<target>10.253.9.78</target>
<local-port>443</local-port>
<interface>wan</interface>
<descr><![CDATA[allow secure web traffic to tsys-cloud-sandstorm]]></descr>
<associated-rule-id>nat_597cd1cc065ba8.01190462</associated-rule-id>
<created>
<time>1501352396</time>
<username>admin@10.251.100.101</username>
</created>
<updated>
<time>1501357676</time>
<username>admin@10.251.100.101</username>
</updated>
</rule>
<rule>
<source>
<any></any>
</source>
<destination>
<address>158.69.183.163</address>
<port>443</port>
</destination>
<protocol>tcp</protocol>
<target>10.253.9.80</target>
<local-port>443</local-port>
<interface>wan</interface>
<descr><![CDATA[allow secure web traffic to tsys-cloud-www]]></descr>
<associated-rule-id>nat_597cf3dd295c23.13339274</associated-rule-id>
<updated>
<time>1501361117</time>
<username>admin@10.251.100.101</username>
</updated>
<created>
<time>1501361117</time>
<username>admin@10.251.100.101</username>
</created>
</rule>
<rule>
<source>
<any></any>
</source>
<destination>
<address>158.69.183.165</address>
<port>80</port>
</destination>
<protocol>tcp</protocol>
<target>10.253.9.78</target>
<local-port>80</local-port>
<interface>wan</interface>
<descr><![CDATA[allow non secure web traffic to tsys-cloud-sandstorm]]></descr>
<associated-rule-id>nat_597cd1ed051541.16634797</associated-rule-id>
<created>
<time>1501352429</time>
<username>admin@10.251.100.101</username>
</created>
<updated>
<time>1501357694</time>
<username>admin@10.251.100.101</username>
</updated>
</rule>
<rule>
<source>
<any></any>
</source>
<destination>
<network>wanip</network>
<port>80</port>
</destination>
<protocol>tcp</protocol>
<target>10.253.9.79</target>
<local-port>80</local-port>
<interface>wan</interface>
<descr><![CDATA[allow non secure web traffic to tsys-cloud-cloudron]]></descr>
<associated-rule-id>nat_597cd453ac8360.78302498</associated-rule-id>
<created>
<time>1501353043</time>
<username>admin@10.251.100.101</username>
</created>
<updated>
<time>1501357791</time>
<username>admin@10.251.100.101</username>
</updated>
</rule>
<rule>
<source>
<any></any>
</source>
<destination>
<address>158.69.183.163</address>
<port>80</port>
</destination>
<protocol>tcp</protocol>
<target>10.253.9.80</target>
<local-port>80</local-port>
<interface>wan</interface>
<descr><![CDATA[allow non secure web traffic to tsys-cloud-www]]></descr>
<associated-rule-id>nat_597cf3be0f90f7.84639417</associated-rule-id>
<updated>
<time>1501361086</time>
<username>admin@10.251.100.101</username>
</updated>
<created>
<time>1501361086</time>
<username>admin@10.251.100.101</username>
</created>
</rule>
<rule>
<source>
<any></any>
</source>
<destination>
<network>wanip</network>
<port>443</port>
</destination>
<protocol>tcp</protocol>
<target>10.253.9.79</target>
<local-port>443</local-port>
<interface>wan</interface>
<descr><![CDATA[allow secure web traffic to tsys-cloud-cloudron]]></descr>
<associated-rule-id>nat_597cd476a20e84.00129509</associated-rule-id>
<created>
<time>1501353078</time>
<username>admin@10.251.100.101</username>
</created>
<updated>
<time>1501360642</time>
<username>admin@10.251.100.101</username>
</updated>
</rule>
</nat>
<filter>
<rule>
<source>
<any></any>
</source>
<interface>wan</interface>
<protocol>tcp</protocol>
<destination>
<address>10.253.9.78</address>
<port>443</port>
</destination>
<descr><![CDATA[NAT allow secure web traffic to tsys-cloud-sandstorm]]></descr>
<associated-rule-id>nat_597cd1cc065ba8.01190462</associated-rule-id>
<tracker>1501352396</tracker>
<created>
<time>1501352396</time>
<username>NAT Port Forward</username>
</created>
</rule>
<rule>
<source>
<any></any>
</source>
<interface>wan</interface>
<protocol>tcp</protocol>
<destination>
<address>10.253.9.78</address>
<port>80</port>
</destination>
<descr><![CDATA[NAT allow non secure web traffic to tsys-cloud-sandstorm]]></descr>
<associated-rule-id>nat_597cd1ed051541.16634797</associated-rule-id>
<tracker>1501352429</tracker>
<created>
<time>1501352429</time>
<username>NAT Port Forward</username>
</created>
</rule>
<rule>
<id></id>
<tracker>1501352532</tracker>
<type>pass</type>
<interface>wan</interface>
<ipprotocol>inet</ipprotocol>
<tag></tag>
<tagged></tagged>
<max></max>
<max-src-nodes></max-src-nodes>
<max-src-conn></max-src-conn>
<max-src-states></max-src-states>
<statetimeout></statetimeout>
<statetype>keep state</statetype>
<os></os>
<protocol>tcp</protocol>
<source>
<any></any>
</source>
<destination>
<address>158.69.183.165</address>
<port>443</port>
</destination>
<descr></descr>
<updated>
<time>1501352532</time>
<username>admin@10.251.100.101</username>
</updated>
<created>
<time>1501352532</time>
<username>admin@10.251.100.101</username>
</created>
</rule>
<rule>
<source>
<any></any>
</source>
<interface>wan</interface>
<protocol>tcp</protocol>
<destination>
<address>10.253.9.79</address>
<port>80</port>
</destination>
<descr><![CDATA[NAT allow non secure web traffic to tsys-cloud-cloudron]]></descr>
<associated-rule-id>nat_597cd453ac8360.78302498</associated-rule-id>
<tracker>1501353043</tracker>
<created>
<time>1501353043</time>
<username>NAT Port Forward</username>
</created>
</rule>
<rule>
<source>
<any></any>
</source>
<interface>wan</interface>
<protocol>tcp</protocol>
<destination>
<address>10.253.9.79</address>
<port>443</port>
</destination>
<descr><![CDATA[NAT allow secure web traffic to tsys-cloud-cloudron]]></descr>
<associated-rule-id>nat_597cd476a20e84.00129509</associated-rule-id>
<tracker>1501353078</tracker>
<created>
<time>1501353078</time>
<username>NAT Port Forward</username>
</created>
</rule>
<rule>
<source>
<any></any>
</source>
<interface>wan</interface>
<protocol>tcp</protocol>
<destination>
<address>10.253.9.80</address>
<port>80</port>
</destination>
<descr><![CDATA[NAT allow non secure web traffic to tsys-cloud-www]]></descr>
<associated-rule-id>nat_597cf3be0f90f7.84639417</associated-rule-id>
<tracker>1501361086</tracker>
<created>
<time>1501361086</time>
<username>NAT Port Forward</username>
</created>
</rule>
<rule>
<source>
<any></any>
</source>
<interface>wan</interface>
<protocol>tcp</protocol>
<destination>
<address>10.253.9.80</address>
<port>443</port>
</destination>
<descr><![CDATA[NAT allow secure web traffic to tsys-cloud-www]]></descr>
<associated-rule-id>nat_597cf3dd295c23.13339274</associated-rule-id>
<tracker>1501361117</tracker>
<created>
<time>1501361117</time>
<username>NAT Port Forward</username>
</created>
</rule>
<rule>
<type>pass</type>
<ipprotocol>inet</ipprotocol>
<descr><![CDATA[Default allow LAN to any rule]]></descr>
<interface>lan</interface>
<tracker>0100000101</tracker>
<source>
<network>lan</network>
</source>
<destination>
<any></any>
</destination>
</rule>
<rule>
<type>pass</type>
<ipprotocol>inet6</ipprotocol>
<descr><![CDATA[Default allow LAN IPv6 to any rule]]></descr>
<interface>lan</interface>
<tracker>0100000102</tracker>
<source>
<network>lan</network>
</source>
<destination>
<any></any>
</destination>
</rule>
<rule>
<id></id>
<tracker>1496615387</tracker>
<type>pass</type>
<interface>openvpn</interface>
<ipprotocol>inet</ipprotocol>
<tag></tag>
<tagged></tagged>
<max></max>
<max-src-nodes></max-src-nodes>
<max-src-conn></max-src-conn>
<max-src-states></max-src-states>
<statetimeout></statetimeout>
<statetype>keep state</statetype>
<os></os>
<source>
<address>172.16.80.0/24</address>
</source>
<destination>
<any></any>
</destination>
<descr><![CDATA[allow road warrior - full access pass]]></descr>
<created>
<time>1496615387</time>
<username>admin@10.253.9.2</username>
</created>
<updated>
<time>1496615617</time>
<username>admin@172.16.80.2</username>
</updated>
</rule>
<rule>
<id></id>
<tracker>1498336605</tracker>
<type>pass</type>
<interface>openvpn</interface>
<ipprotocol>inet</ipprotocol>
<tag></tag>
<tagged></tagged>
<max></max>
<max-src-nodes></max-src-nodes>
<max-src-conn></max-src-conn>
<max-src-states></max-src-states>
<statetimeout></statetimeout>
<statetype>keep state</statetype>
<os></os>
<source>
<address>192.168.120.0/30</address>
</source>
<destination>
<any></any>
</destination>
<descr><![CDATA[allow windows server - full access pass]]></descr>
<updated>
<time>1498336605</time>
<username>admin@172.16.80.2</username>
</updated>
<created>
<time>1498336605</time>
<username>admin@172.16.80.2</username>
</created>
</rule>
<rule>
<id></id>
<tracker>1496615599</tracker>
<type>pass</type>
<interface>openvpn</interface>
<ipprotocol>inet</ipprotocol>
<tag></tag>
<tagged></tagged>
<max></max>
<max-src-nodes></max-src-nodes>
<max-src-conn></max-src-conn>
<max-src-states></max-src-states>
<statetimeout></statetimeout>
<statetype>keep state</statetype>
<os></os>
<source>
<address>10.251.100.0/24</address>
</source>
<destination>
<any></any>
</destination>
<descr><![CDATA[allow pfv thenerdery - full access pass]]></descr>
<created>
<time>1496615599</time>
<username>admin@172.16.80.2</username>
</created>
<updated>
<time>1496615639</time>
<username>admin@172.16.80.2</username>
</updated>
</rule>
<rule>
<id></id>
<tracker>1498339856</tracker>
<type>pass</type>
<interface>openvpn</interface>
<ipprotocol>inet</ipprotocol>
<tag></tag>
<tagged></tagged>
<max></max>
<max-src-nodes></max-src-nodes>
<max-src-conn></max-src-conn>
<max-src-states></max-src-states>
<statetimeout></statetimeout>
<statetype>keep state</statetype>
<os></os>
<source>
<address>192.168.197.0/30</address>
</source>
<destination>
<any></any>
</destination>
<descr><![CDATA[allow satx mgmt - full access pass]]></descr>
<created>
<time>1498339856</time>
<username>admin@172.16.80.2</username>
</created>
<updated>
<time>1498339949</time>
<username>admin@172.16.80.2</username>
</updated>
</rule>
<rule>
<id></id>
<tracker>1505584953</tracker>
<type>pass</type>
<interface>openvpn</interface>
<ipprotocol>inet</ipprotocol>
<tag></tag>
<tagged></tagged>
<max></max>
<max-src-nodes></max-src-nodes>
<max-src-conn></max-src-conn>
<max-src-states></max-src-states>
<statetimeout></statetimeout>
<statetype>keep state</statetype>
<os></os>
<source>
<address>10.40.50.0/24</address>
</source>
<destination>
<any></any>
</destination>
<descr><![CDATA[allow satx workstation - full access pass]]></descr>
<updated>
<time>1505584953</time>
<username>admin@10.251.100.101</username>
</updated>
<created>
<time>1505584953</time>
<username>admin@10.251.100.101</username>
</created>
</rule>
<rule>
<id></id>
<tracker>1508046007</tracker>
<type>pass</type>
<interface>openvpn</interface>
<ipprotocol>inet</ipprotocol>
<tag></tag>
<tagged></tagged>
<max></max>
<max-src-nodes></max-src-nodes>
<max-src-conn></max-src-conn>
<max-src-states></max-src-states>
<statetimeout></statetimeout>
<statetype>keep state</statetype>
<os></os>
<source>
<address>10.40.100.0/24</address>
</source>
<destination>
<any></any>
</destination>
<descr><![CDATA[allow satx svr mgmt - full access pass]]></descr>
<updated>
<time>1508046007</time>
<username>admin@10.40.50.17</username>
</updated>
<created>
<time>1508046007</time>
<username>admin@10.40.50.17</username>
</created>
</rule>
<rule>
<id></id>
<tracker>1505665799</tracker>
<type>pass</type>
<interface>openvpn</interface>
<ipprotocol>inet</ipprotocol>
<tag></tag>
<tagged></tagged>
<max></max>
<max-src-nodes></max-src-nodes>
<max-src-conn></max-src-conn>
<max-src-states></max-src-states>
<statetimeout></statetimeout>
<statetype>keep state</statetype>
<os></os>
<source>
<address>10.251.30.0/24</address>
</source>
<destination>
<any></any>
</destination>
<descr><![CDATA[allow pfv prod mgmt - full access pass]]></descr>
<updated>
<time>1505665799</time>
<username>admin@10.251.100.101</username>
</updated>
<created>
<time>1505665799</time>
<username>admin@10.251.100.101</username>
</created>
</rule>
<rule>
<id></id>
<tracker>1505666009</tracker>
<type>pass</type>
<interface>openvpn</interface>
<ipprotocol>inet</ipprotocol>
<tag></tag>
<tagged></tagged>
<max></max>
<max-src-nodes></max-src-nodes>
<max-src-conn></max-src-conn>
<max-src-states></max-src-states>
<statetimeout></statetimeout>
<statetype>keep state</statetype>
<os></os>
<source>
<address>10.251.22.0/24</address>
</source>
<destination>
<any></any>
</destination>
<descr><![CDATA[allow pfv lab mgmt - full access pass]]></descr>
<updated>
<time>1505666009</time>
<username>admin@10.251.100.101</username>
</updated>
<created>
<time>1505666009</time>
<username>admin@10.251.100.101</username>
</created>
</rule>
<rule>
<id></id>
<tracker>1496707746</tracker>
<type>pass</type>
<interface>opt1</interface>
<ipprotocol>inet</ipprotocol>
<tag></tag>
<tagged></tagged>
<max></max>
<max-src-nodes></max-src-nodes>
<max-src-conn></max-src-conn>
<max-src-states></max-src-states>
<statetimeout></statetimeout>
<statetype>keep state</statetype>
<os></os>
<source>
<network>opt1</network>
</source>
<destination>
<any></any>
</destination>
<descr><![CDATA[allow mgmt net out]]></descr>
<updated>
<time>1496707746</time>
<username>admin@172.16.80.2</username>
</updated>
<created>
<time>1496707746</time>
<username>admin@172.16.80.2</username>
</created>
</rule>
<rule>
<id></id>
<tracker>1496707927</tracker>
<type>pass</type>
<interface>opt2</interface>
<ipprotocol>inet</ipprotocol>
<tag></tag>
<tagged></tagged>
<max></max>
<max-src-nodes></max-src-nodes>
<max-src-conn></max-src-conn>
<max-src-states></max-src-states>
<statetimeout></statetimeout>
<statetype>keep state</statetype>
<os></os>
<source>
<network>opt2</network>
</source>
<destination>
<any></any>
</destination>
<descr><![CDATA[allow mgmt net out]]></descr>
<updated>
<time>1496707927</time>
<username>admin@172.16.80.2</username>
</updated>
<created>
<time>1496707927</time>
<username>admin@172.16.80.2</username>
</created>
</rule>
<separator>
<wan></wan>
<openvpn></openvpn>
<opt1></opt1>
<opt2></opt2>
</separator>
</filter>
<shaper></shaper>
<ipsec></ipsec>
<aliases></aliases>
<proxyarp></proxyarp>
<cron>
<item>
<minute>1,31</minute>
<hour>0-5</hour>
<mday>*</mday>
<month>*</month>
<wday>*</wday>
<who>root</who>
<command>/usr/bin/nice -n20 adjkerntz -a</command>
</item>
<item>
<minute>1</minute>
<hour>3</hour>
<mday>1</mday>
<month>*</month>
<wday>*</wday>
<who>root</who>
<command>/usr/bin/nice -n20 /etc/rc.update_bogons.sh</command>
</item>
<item>
<minute>*/60</minute>
<hour>*</hour>
<mday>*</mday>
<month>*</month>
<wday>*</wday>
<who>root</who>
<command>/usr/bin/nice -n20 /usr/local/sbin/expiretable -v -t 3600 sshlockout</command>
</item>
<item>
<minute>*/60</minute>
<hour>*</hour>
<mday>*</mday>
<month>*</month>
<wday>*</wday>
<who>root</who>
<command>/usr/bin/nice -n20 /usr/local/sbin/expiretable -v -t 3600 webConfiguratorlockout</command>
</item>
<item>
<minute>1</minute>
<hour>1</hour>
<mday>*</mday>
<month>*</month>
<wday>*</wday>
<who>root</who>
<command>/usr/bin/nice -n20 /etc/rc.dyndns.update</command>
</item>
<item>
<minute>*/60</minute>
<hour>*</hour>
<mday>*</mday>
<month>*</month>
<wday>*</wday>
<who>root</who>
<command>/usr/bin/nice -n20 /usr/local/sbin/expiretable -v -t 3600 virusprot</command>
</item>
<item>
<minute>30</minute>
<hour>12</hour>
<mday>*</mday>
<month>*</month>
<wday>*</wday>
<who>root</who>
<command>/usr/bin/nice -n20 /etc/rc.update_urltables</command>
</item>
</cron>
<wol></wol>
<rrd>
<enable></enable>
</rrd>
<load_balancer>
<monitor_type>
<name>ICMP</name>
<type>icmp</type>
<descr><![CDATA[ICMP]]></descr>
<options></options>
</monitor_type>
<monitor_type>
<name>TCP</name>
<type>tcp</type>
<descr><![CDATA[Generic TCP]]></descr>
<options></options>
</monitor_type>
<monitor_type>
<name>HTTP</name>
<type>http</type>
<descr><![CDATA[Generic HTTP]]></descr>
<options>
<path>/</path>
<host></host>
<code>200</code>
</options>
</monitor_type>
<monitor_type>
<name>HTTPS</name>
<type>https</type>
<descr><![CDATA[Generic HTTPS]]></descr>
<options>
<path>/</path>
<host></host>
<code>200</code>
</options>
</monitor_type>
<monitor_type>
<name>SMTP</name>
<type>send</type>
<descr><![CDATA[Generic SMTP]]></descr>
<options>
<send></send>
<expect>220 *</expect>
</options>
</monitor_type>
</load_balancer>
<widgets>
<sequence>system_information:col1:show,interfaces:col2:show</sequence>
<period>10</period>
</widgets>
<openvpn>
<openvpn-client>
<auth_user></auth_user>
<auth_pass></auth_pass>
<vpnid>1</vpnid>
<protocol>UDP</protocol>
<dev_mode>tun</dev_mode>
<ipaddr></ipaddr>
<interface>wan</interface>
<local_port></local_port>
<server_addr>158.69.183.162</server_addr>
<server_port>1194</server_port>
<resolve_retry></resolve_retry>
<proxy_addr></proxy_addr>
<proxy_port></proxy_port>
<proxy_authtype>none</proxy_authtype>
<proxy_user></proxy_user>
<proxy_passwd></proxy_passwd>
<description></description>
<mode>p2p_shared_key</mode>
<topology>subnet</topology>
<custom_options></custom_options>
<shared_key>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</shared_key>
<crypto>AES-128-CBC</crypto>
<digest>SHA1</digest>
<engine>none</engine>
<tunnel_network>192.168.194.0/30</tunnel_network>
<tunnel_networkv6></tunnel_networkv6>
<remote_network></remote_network>
<remote_networkv6></remote_networkv6>
<use_shaper></use_shaper>
<compression></compression>
<passtos></passtos>
<no_tun_ipv6></no_tun_ipv6>
<route_no_pull></route_no_pull>
<route_no_exec></route_no_exec>
<verbosity_level>1</verbosity_level>
</openvpn-client>
</openvpn>
<dnshaper></dnshaper>
<unbound>
<enable></enable>
<dnssec></dnssec>
<active_interface></active_interface>
<outgoing_interface></outgoing_interface>
<custom_options></custom_options>
<hideidentity></hideidentity>
<hideversion></hideversion>
<dnssecstripped></dnssecstripped>
</unbound>
<revision>
<time>1518204673</time>
<description><![CDATA[admin@10.40.50.77: Updated NTP ACL Settings]]></description>
<username>admin@10.40.50.77</username>
</revision>
<cert>
<refid>59344eda4e727</refid>
<descr><![CDATA[webConfigurator default (59344eda4e727)]]></descr>
<type>server</type>
<crt>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</crt>
<prv>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</prv>
</cert>
<ppps></ppps>
<gateways>
<gateway_item>
<interface>wan</interface>
<gateway>158.69.183.166</gateway>
<name>WANGW</name>
<weight>1</weight>
<descr><![CDATA[WAN Gateway]]></descr>
<defaultgw></defaultgw>
</gateway_item>
</gateways>
<installedpackages>
<package>
<name>OpenBGPD</name>
<descr><![CDATA[OpenBGPD is a free implementation of the Border Gateway Protocol, version 4.
It allows ordinary machines to be used as routers exchanging routes with other systems speaking the BGP protocol.
Conflicts with Quagga_OSPF; both packages cannot be installed at the same time.]]></descr>
<version>0.11_9</version>
<pkginfolink>https://doc.pfsense.org/index.php/OpenBGPD_package</pkginfolink>
<configurationfile>openbgpd.xml</configurationfile>
</package>
<package>
<name>iperf</name>
<website>http://www.freshports.org/benchmarks/iperf/</website>
<descr><![CDATA[Iperf is a tool for testing network throughput, loss, and jitter.]]></descr>
<version>2.0.5.5_3</version>
<pkginfolink>https://doc.pfsense.org/index.php/Iperf_package</pkginfolink>
<configurationfile>iperf.xml</configurationfile>
</package>
<package>
<name>nmap</name>
<descr><![CDATA[NMap is a utility for network exploration or security auditing.&lt;br/&gt;
It supports ping scanning (determine which hosts are up), many port scanning techniques (determine what services the hosts are offering), version detection (determine what application/service is running on a port), and TCP/IP fingerprinting (remote host OS or device identification).
It also offers flexible target and port specification, decoy/stealth scanning, SunRPC scanning, and more.]]></descr>
<version>1.4.4_1</version>
<pkginfolink>https://doc.pfsense.org/index.php/Nmap_package</pkginfolink>
<configurationfile>nmap.xml</configurationfile>
</package>
<package>
<name>mtr-nox11</name>
<descr><![CDATA[Enhanced traceroute replacement. mtr combines the functionality of the traceroute and ping programs in a single network diagnostic tool.]]></descr>
<website>http://www.bitwizard.nl/mtr/</website>
<version>0.85.6_1</version>
<configurationfile>mtr-nox11.xml</configurationfile>
</package>
<package>
<name>ntopng</name>
<website>http://www.ntop.org/</website>
<descr><![CDATA[ntopng (replaces ntop) is a network probe that shows network usage in a way similar to what top does for processes. In interactive mode, it displays the network status on the user's terminal. In Web mode it acts as a Web server, creating an HTML dump of the network status. It sports a NetFlow/sFlow emitter/collector, an HTTP-based client interface for creating ntop-centric monitoring applications, and RRD for persistently storing traffic statistics.]]></descr>
<version>0.8.6_1</version>
<configurationfile>ntopng.xml</configurationfile>
<noembedded>true</noembedded>
</package>
<package>
<name>softflowd</name>
<website>http://code.google.com/p/softflowd/</website>
<descr><![CDATA[Softflowd is flow-based network traffic analyser capable of Cisco NetFlow data export.&lt;br/&gt;
Softflowd semi-statefully tracks traffic flows recorded by listening on a network interface or by reading a packet capture file. These flows may be reported via NetFlow to a collecting host or summarised within softflowd itself.&lt;br/&gt;
Softflowd supports Netflow versions 1, 5 and 9 and is fully IPv6-capable - it can track IPv6 flows and send export datagrams via IPv6. It also supports export to multicast groups, allowing for redundant flow collectors.&lt;br/&gt;]]></descr>
<version>1.2.2</version>
<configurationfile>softflowd.xml</configurationfile>
</package>
<menu>
<name>OpenBGPD</name>
<section>Services</section>
<url>/pkg_edit.php?xml=openbgpd.xml&amp;id=0</url>
</menu>
<menu>
<name>iperf Client</name>
<tooltiptext>Run iperf in client mode.</tooltiptext>
<section>Diagnostics</section>
<url>/pkg_edit.php?xml=iperf.xml</url>
</menu>
<menu>
<name>iperf Server</name>
<tooltiptext>Run iperf in server mode.</tooltiptext>
<section>Diagnostics</section>
<url>/pkg_edit.php?xml=iperfserver.xml</url>
</menu>
<menu>
<name>NMap</name>
<section>Diagnostics</section>
<configfile>nmap.xml</configfile>
</menu>
<menu>
<name>mtr</name>
<section>Diagnostics</section>
<url>/pkg_edit.php?xml=mtr-nox11.xml</url>
</menu>
<menu>
<name>ntopng Settings</name>
<tooltiptext>Set ntopng settings such as password and port.</tooltiptext>
<section>Diagnostics</section>
<url>/pkg_edit.php?xml=ntopng.xml</url>
</menu>
<menu>
<name>ntopng</name>
<tooltiptext>Access ntopng</tooltiptext>
<section>Diagnostics</section>
<url>/ntopng_redirect.php</url>
</menu>
<menu>
<name>softflowd</name>
<tooltiptext>Modify softflowd settings.</tooltiptext>
<section>Services</section>
<configfile>softflowd.xml</configfile>
<url>/pkg_edit.php?xml=softflowd.xml</url>
</menu>
<service>
<name>bgpd</name>
<rcfile>bgpd.sh</rcfile>
<executable>bgpd</executable>
<description><![CDATA[OpenBSD BGP Daemon]]></description>
</service>
<service>
<name>iperf</name>
<executable>iperf</executable>
<description><![CDATA[iperf Network Performance Testing Daemon/Client]]></description>
<stopcmd>mwexec(&quot;/usr/bin/killall iperf&quot;);</stopcmd>
</service>
<service>
<name>ntopng</name>
<rcfile>ntopng.sh</rcfile>
<executable>ntopng</executable>
<description><![CDATA[ntopng Network Traffic Monitor]]></description>
</service>
<service>
<name>softflowd</name>
<rcfile>softflowd.sh</rcfile>
<executable>softflowd</executable>
<description><![CDATA[Netflow export daemon]]></description>
</service>
<ntopng>
<config></config>
</ntopng>
<openbgpd>
<config>
<asnum>64522</asnum>
<holdtime></holdtime>
<fibupdate>yes</fibupdate>
<listenip>192.168.194.2</listenip>
<routerid>192.168.194.2</routerid>
<carpstatusvid>none</carpstatusvid>
<row>
<networks>10.253.0.0/24</networks>
</row>
<row>
<networks>10.253.1.0/24</networks>
</row>
<row>
<networks>10.253.2.0/24</networks>
</row>
<row>
<networks>10.253.3.0/24</networks>
</row>
<row>
<networks>10.253.5.0/24</networks>
</row>
<row>
<networks>10.253.6.0/24</networks>
</row>
<row>
<networks>10.253.7.0/24</networks>
</row>
<row>
<networks>10.253.8.0/24</networks>
</row>
<row>
<networks>10.253.9.0/24</networks>
</row>
</config>
</openbgpd>
<openbgpdneighbors>
<config>
<descr><![CDATA[asn2net]]></descr>
<neighbor>192.168.194.1</neighbor>
<md5sigkey></md5sigkey>
<md5sigpass></md5sigpass>
<groupname></groupname>
<row>
<parameters>remote-as</parameters>
<parmvalue>64517</parmvalue>
</row>
</config>
</openbgpdneighbors>
<softflowd>
<config>
<enable>enabled</enable>
<interface>lan,opt1,opt2,opt3,opt4,wan</interface>
<host>10.253.3.99</host>
<port>9996</port>
<maxflows></maxflows>
<hoplimit></hoplimit>
<version>9</version>
<flowtracking>full</flowtracking>
<timeout-general>300</timeout-general>
<timeout-maxlife>100</timeout-maxlife>
<timeout-expint>300</timeout-expint>
<timeout-tcp>100</timeout-tcp>
<timeout-tcp-rst>10</timeout-tcp-rst>
<timeout-tcp-fin>10</timeout-tcp-fin>
<timeout-udp>100</timeout-udp>
</config>
</softflowd>
</installedpackages>
<dyndnses></dyndnses>
<virtualip>
<vip>
<mode>ipalias</mode>
<interface>wan</interface>
<uniqid>5935fb59669c7</uniqid>
<descr><![CDATA[rackrental-wan]]></descr>
<type>single</type>
<subnet_bits>29</subnet_bits>
<subnet>158.69.183.164</subnet>
</vip>
<vip>
<mode>ipalias</mode>
<interface>wan</interface>
<uniqid>5935fba3df38c</uniqid>
<descr><![CDATA[tsys-cloud-cloudron]]></descr>
<type>single</type>
<subnet_bits>29</subnet_bits>
<subnet>158.69.183.165</subnet>
</vip>
<vip>
<mode>ipalias</mode>
<interface>wan</interface>
<uniqid>597ce7c0c0655</uniqid>
<descr><![CDATA[tsys-cloud-www]]></descr>
<type>single</type>
<subnet_bits>29</subnet_bits>
<subnet>158.69.183.163</subnet>
</vip>
</virtualip>
<notifications>
<growl>
<ipaddress></ipaddress>
<password></password>
<name>PHP-Growl</name>
<notification_name>pfSense growl alert</notification_name>
</growl>
<smtp>
<ipaddress>tsys-cloud-www.turnsys.net</ipaddress>
<port>25</port>
<notifyemailaddress>prodtechopsalerts@turnsys.com</notifyemailaddress>
<username></username>
<password></password>
<authentication_mechanism>PLAIN</authentication_mechanism>
<fromaddress>ovh-core-rtr01@turnsys.net</fromaddress>
</smtp>
</notifications>
<ntpd>
<interface>lan</interface>
<noquery>yes</noquery>
<noserve>yes</noserve>
<restrictions>
<row>
<acl_network></acl_network>
<mask>128</mask>
</row>
</restrictions>
</ntpd>
</pfsense>