diff --git a/mtp-configs/asn2net-vpnrtr.turnsys.net b/mtp-configs/asn2net-vpnrtr.turnsys.net
index 9a96fe1..e862df6 100644
--- a/mtp-configs/asn2net-vpnrtr.turnsys.net
+++ b/mtp-configs/asn2net-vpnrtr.turnsys.net
@@ -306,39 +306,6 @@
brendan@10.30.1.48
-
-
- 1448729688
- pass
- wan
- inet
-
-
-
-
-
-
-
- keep state
-
- tcp
-
-
-
- 1198
-
-
-
-
- brendan@108.90.6.147
-
-
-
- brendan@108.90.6.147
-
-
1496065921
@@ -405,39 +372,6 @@
admin@10.253.1.2
-
-
- 1496549172
- pass
- wan
- inet
-
-
-
-
-
-
-
- keep state
-
- tcp
-
-
-
- 1200
-
-
-
-
- admin@10.253.1.2
-
-
-
- admin@10.253.1.2
-
-
1496067458
@@ -536,39 +470,6 @@
charles@108.90.6.147
-
-
- 1446317032
- pass
- wan
- inet
-
-
-
-
-
-
-
- keep state
-
- udp
-
-
-
- 1196
-
-
-
-
- charles@72.182.34.126
-
-
-
- charles@72.182.34.126
-
-
1446903164
@@ -1234,44 +1135,6 @@
1
-
- 3
- p2p_shared_key
- UDP
- tun
-
- wan
- 1196
-
-
- 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
- AES-128-CBC
- SHA1
- none
- 192.168.196.0/30
-
-
-
-
-
-
-
-
-
-
-
- yes
-
- none
-
-
-
- 0
-
-
- 1
- subnet
-
4
p2p_shared_key
@@ -1310,52 +1173,10 @@
1
subnet
-
- 5
- p2p_tls
- TCP
- tun
-
- wan
- 1198
-
-
- 55f489fd77719
-
- 565eef8ab3359
- 1024
- 1
- BF-CBC
- SHA1
- none
- 192.168.203.0/30
-
-
-
-
-
-
-
-
-
- yes
-
- yes
-
- none
-
-
-
- 0
-
-
- 3
- subnet
-
6
p2p_shared_key
- TCP
+ UDP
tun
wan
@@ -1390,47 +1211,6 @@
3
-
- 7
- p2p_shared_key
- TCP
- tun
-
- wan
- 1200
-
- push route 10.251.0.0 255.255.0.0;
-push route 10.253.0.0 255.255.0.0;
-push route 10.40.0.0 255.255.0.0;
-push route 172.16.80.0 255.255.255.0;
- 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
- AES-128-CBC
- SHA1
- none
- 192.168.120.0/30
-
-
-
-
-
-
-
-
-
-
-
- yes
- subnet
-
- none
-
-
-
- 0
-
-
- 1
-
8
server_tls
@@ -1490,9 +1270,9 @@ push route 192.168.120.0 255.255.255.252
-
-
- admin@10.40.50.77
+
+
+ admin@10.251.100.101
@@ -1564,10 +1344,10 @@ push route 192.168.120.0 255.255.255.252
wan
158.69.183.166
WANGW
-
+ 1
inet
-
+
diff --git a/mtp-configs/ovh-core-rtr01.turnsys.net b/mtp-configs/ovh-core-rtr01.turnsys.net
index 88f8e5b..dfec20e 100644
--- a/mtp-configs/ovh-core-rtr01.turnsys.net
+++ b/mtp-configs/ovh-core-rtr01.turnsys.net
@@ -1,1256 +1,896 @@
-
- 15.8
-
-
- normal
- ovh-core-rtr01
- turnsys.net
-
- all
-
- system
- 1998
-
-
- admins
-
- system
- 1999
- 0
- page-all
-
-
- admin
-
- system
- admins
- $2b$10$7JpSzVedN7s.PnnMwkAy3.0J6sKliUJerfIL1HlY64kaPVSrZ8c9u
- 0
- user-shell-access
- 2
- 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
-
- pfSense.css
-
-
- 2000
- 2000
- pfv-ucs.turnsys.net ovh-ucs.turnsys.net satx-ucs.turnsys.net
-
- https
-
- 59344eda4e727
- 2
-
- 2
- pfSense.css
-
-
-
-
- hadp
- hadp
- hadp
-
- monthly
-
- America/Chicago
-
- enabled
-
- 115200
- serial
- enabled
-
-
-
-
-
- yes
-
-
- en_US
- none
- 10.253.3.201
-
-
-
-
-
- em0
-
-
-
- 00:50:56:00:d6:9d
- 158.69.183.161
- 29
- WANGW
-
-
-
- vtnet0
-
-
- 10.253.9.254
- 24
-
-
-
- vtnet1
-
-
- 10.253.3.254
- 24
-
-
-
- vtnet2
-
-
- 10.253.6.254
- 24
-
-
-
- vtnet3
-
-
- 10.253.7.254
- 24
-
-
-
- vtnet4
-
-
- 10.253.44.254
- 24
-
-
-
-
-
-
- 10.253.9.10
- 10.253.9.244
-
-
-
-
-
-
- ::1000
- ::2000
-
- assist
- medium
-
-
-
- OVH
- prodtechopsalerts@turnsys.com
- kn3lmgmt
-
-
-
-
-
-
-
-
-
- 161
-
- 162
-
- opt1
-
-
-
-
-
- 50
- 10.253.3.99
-
-
-
- ipv4
-
-
-
-
-
- automatic
-
-
-
-
-
- 158.69.183.165
- 443
-
- tcp
- 10.253.9.78
- 443
- wan
-
- nat_597cd1cc065ba8.01190462
-
-
- admin@10.251.100.101
-
-
-
- admin@10.251.100.101
-
-
-
-
-
- 158.69.183.163
- 443
-
- tcp
- 10.253.9.80
- 443
- wan
-
- nat_597cf3dd295c23.13339274
-
-
- admin@10.251.100.101
-
-
-
- admin@10.251.100.101
-
-
-
-
-
- 158.69.183.165
- 80
-
- tcp
- 10.253.9.78
- 80
- wan
-
- nat_597cd1ed051541.16634797
-
-
- admin@10.251.100.101
-
-
-
- admin@10.251.100.101
-
-
-
-
-
- wanip
- 80
-
- tcp
- 10.253.9.79
- 80
- wan
-
- nat_597cd453ac8360.78302498
-
-
- admin@10.251.100.101
-
-
-
- admin@10.251.100.101
-
-
-
-
-
- 158.69.183.163
- 80
-
- tcp
- 10.253.9.80
- 80
- wan
-
- nat_597cf3be0f90f7.84639417
-
-
- admin@10.251.100.101
-
-
-
- admin@10.251.100.101
-
-
-
-
-
- wanip
- 443
-
- tcp
- 10.253.9.79
- 443
- wan
-
- nat_597cd476a20e84.00129509
-
-
- admin@10.251.100.101
-
-
-
- admin@10.251.100.101
-
-
-
-
-
-
- wan
- tcp
-
- 10.253.9.78
- 443
-
-
- nat_597cd1cc065ba8.01190462
- 1501352396
-
-
- NAT Port Forward
-
-
-
-
- wan
- tcp
-
- 10.253.9.78
- 80
-
-
- nat_597cd1ed051541.16634797
- 1501352429
-
-
- NAT Port Forward
-
-
-
-
- 1501352532
- pass
- wan
- inet
-
-
-
-
-
-
-
- keep state
-
- tcp
-
-
- 158.69.183.165
- 443
-
-
-
-
- admin@10.251.100.101
-
-
-
- admin@10.251.100.101
-
-
-
-
- wan
- tcp
-
- 10.253.9.79
- 80
-
-
- nat_597cd453ac8360.78302498
- 1501353043
-
-
- NAT Port Forward
-
-
-
-
- wan
- tcp
-
- 10.253.9.79
- 443
-
-
- nat_597cd476a20e84.00129509
- 1501353078
-
-
- NAT Port Forward
-
-
-
-
- wan
- tcp
-
- 10.253.9.80
- 80
-
-
- nat_597cf3be0f90f7.84639417
- 1501361086
-
-
- NAT Port Forward
-
-
-
-
- wan
- tcp
-
- 10.253.9.80
- 443
-
-
- nat_597cf3dd295c23.13339274
- 1501361117
-
-
- NAT Port Forward
-
-
-
- pass
- inet
-
- lan
- 0100000101
-
-
-
-
-
-
- pass
- inet6
-
- lan
- 0100000102
-
-
-
-
-
-
-
- 1496615387
- pass
- openvpn
- inet
-
-
-
-
-
-
-
- keep state
-
-
-
-
-
-
-
-
- admin@10.253.9.2
-
-
-
- admin@172.16.80.2
-
-
-
-
- 1498336605
- pass
- openvpn
- inet
-
-
-
-
-
-
-
- keep state
-
-
-
-
-
-
-
-
- admin@172.16.80.2
-
-
-
- admin@172.16.80.2
-
-
-
-
- 1496615599
- pass
- openvpn
- inet
-
-
-
-
-
-
-
- keep state
-
-
-
-
-
-
-
-
- admin@172.16.80.2
-
-
-
- admin@172.16.80.2
-
-
-
-
- 1498339856
- pass
- openvpn
- inet
-
-
-
-
-
-
-
- keep state
-
-
-
-
-
-
-
-
- admin@172.16.80.2
-
-
-
- admin@172.16.80.2
-
-
-
-
- 1505584953
- pass
- openvpn
- inet
-
-
-
-
-
-
-
- keep state
-
-
-
-
-
-
-
-
- admin@10.251.100.101
-
-
-
- admin@10.251.100.101
-
-
-
-
- 1508046007
- pass
- openvpn
- inet
-
-
-
-
-
-
-
- keep state
-
-
-
-
-
-
-
-
- admin@10.40.50.17
-
-
-
- admin@10.40.50.17
-
-
-
-
- 1505665799
- pass
- openvpn
- inet
-
-
-
-
-
-
-
- keep state
-
-
-
-
-
-
-
-
- admin@10.251.100.101
-
-
-
- admin@10.251.100.101
-
-
-
-
- 1505666009
- pass
- openvpn
- inet
-
-
-
-
-
-
-
- keep state
-
-
-
-
-
-
-
-
- admin@10.251.100.101
-
-
-
- admin@10.251.100.101
-
-
-
-
- 1496707746
- pass
- opt1
- inet
-
-
-
-
-
-
-
- keep state
-
-
-
-
-
-
-
-
- admin@172.16.80.2
-
-
-
- admin@172.16.80.2
-
-
-
-
- 1496707927
- pass
- opt2
- inet
-
-
-
-
-
-
-
- keep state
-
-
-
-
-
-
-
-
- admin@172.16.80.2
-
-
-
- admin@172.16.80.2
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -
- 1,31
- 0-5
- *
- *
- *
- root
- /usr/bin/nice -n20 adjkerntz -a
-
- -
- 1
- 3
- 1
- *
- *
- root
- /usr/bin/nice -n20 /etc/rc.update_bogons.sh
-
- -
- */60
- *
- *
- *
- *
- root
- /usr/bin/nice -n20 /usr/local/sbin/expiretable -v -t 3600 sshlockout
-
- -
- */60
- *
- *
- *
- *
- root
- /usr/bin/nice -n20 /usr/local/sbin/expiretable -v -t 3600 webConfiguratorlockout
-
- -
- 1
- 1
- *
- *
- *
- root
- /usr/bin/nice -n20 /etc/rc.dyndns.update
-
- -
- */60
- *
- *
- *
- *
- root
- /usr/bin/nice -n20 /usr/local/sbin/expiretable -v -t 3600 virusprot
-
- -
- 30
- 12
- *
- *
- *
- root
- /usr/bin/nice -n20 /etc/rc.update_urltables
-
-
-
-
-
-
-
-
- ICMP
- icmp
-
-
-
-
- TCP
- tcp
-
-
-
-
- HTTP
- http
-
-
- /
-
- 200
-
-
-
- HTTPS
- https
-
-
- /
-
- 200
-
-
-
- SMTP
- send
-
-
-
- 220 *
-
-
-
-
- system_information:col1:show,interfaces:col2:show
- 10
-
-
-
-
-
- 1
- UDP
- tun
-
- wan
-
- 158.69.183.162
- 1194
-
-
-
- none
-
-
-
- p2p_shared_key
- subnet
-
- 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
- AES-128-CBC
- SHA1
- none
- 192.168.194.0/30
-
-
-
-
-
-
-
-
-
- 1
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- admin@10.40.50.77
-
-
- 59344eda4e727
-
- server
- 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
- LS0tLS1CRUdJTiBQUklWQVRFIEtFWS0tLS0tCk1JSUV2UUlCQURBTkJna3Foa2lHOXcwQkFRRUZBQVNDQktjd2dnU2pBZ0VBQW9JQkFRQzZ2NWM5Q1dwQ2RZb2gKRFlDOUc2QTZpcDFlSXhDQ3Zka3hFbUtBNisxWFRHSzdBQkhOYlV0SEZZZ2hueldIdVo1dlIvbEVNemIzSVdjSAo0VUF2NzQvVkJKRTZFbFRPOFB0UGwyUk83S2dpZTBpemZNTkhhcm12TUtrNlRxeEVkUDdKTEpXYkMwclNhd0s4CnJ6VHVrVkVvVEhGMlRaSWo3NjVsMWp0U3pKbzArNWZ5L3JhWlZ2alpXeXEweTNGSHZweFNyUDNqQkxldHMya2cKMU42a09tZkVqOThydzArQWNBSnZXK2JtdFNvZkNvN0lYOTdwZWtXbk9HTlR6YzNsMFJPNEJjUCtlY2wzSExoaQpSUUsveXVnV1Q2WFBDRmUxMkk3ZGMwd1NGQkQyS0NxcUhGWmtkVm9PU1ZrM21XUlkyMkU0Y1pKN3pvdzdVRkYvClphL0NyRnFIQWdNQkFBRUNnZ0VBYzlER05yQlVHZ3RUTXRSdzl0YmZNKzhyVVdwbG51K21kdXh6OG9oZWxUbG0KTVpzRmIyVk12alQ0VEFHMDdRdU0ybTdFaEN0TzkwemIzT014TDRsZXBqbEM1OFRlbThpUDB2aU0yUFdrQUY1OAo0L09JR0E1MFFkWG4zYVZVNk0rMkE0V0c4clM2SG0wSE1ZVm5TbDBNKy9VTW1OWGF3RGF3N2E5QzgwSzRrQW80CjVVczNCL0Z5RUdHNDNEalFsUUMwTjFxaXdtb1l3Qm14UmlsUElXQlNJWnFlNllRWEJ2cFVoSFRXMWUzWEU5ZnYKYk5TSFRhcG9naDlBMHNuWVoyM0J6OHplT09hSnEwNWZ5c2psUGJyQmRMbHhZcXZuR3g2RTlyc1pDdFE2MDl2bgpZNjQ5VDRYVTBDZjdBS0c3bHZrYjhUTXdVMEF6NlVFUmxWQzZkUWl4b1FLQmdRRGttV0FPL2w4L3E3ci9USWs4CmY1WVRVVjN2amtYWUYreFM4VnYzeVo1WnhQMlkxMXdPVG5EcEVicDYxTWQ0MUlpWXZoN3BCdnNUTW91UTI4VjIKRlNJU2h4WVZUZlU1VDR5anhHUldrQWp2UUJET1l1QnJ3d3JXMVhjUU03YmZuVVJYY2NRMzhzSk9mVmtZN1lLMgpqenB0ZW1BSUQwSXNkd0doL2dUZEJrNmR4UUtCZ1FEUklnUGJ3MU4zOXJRS1E3RG51ZDF5d2hRREkxdjNMYWkrCmRhWER5cW8rQWJWS3FZcVpWTUdUM2xDYVlwSkg4Vm5iTkFhOFJzOWdpRzNSVW9CWlVaMWl6ejJsYnByRXNzbGcKMG9lUFdRQTdnU1ZVM1ZJcFUvNUVsU3lWVWxuVTI2NlJwRXExa3ZZY1NGK3FldFhHMmdBcklWMXhGcHRsTEtnQgp4bkpWcjE4SDJ3S0JnUUMyNEpCOVRqaEt5b3E5cExBQmF4eFhkZmVOSnFkdmVhd0Fxci9sV2pGSkpaT3ZTMUtFCnkzSCtzc1VaY05Ibk16Zlg0ZmorZVN3eExuV0N2SjZhbWN0NVFRS0VwcW93WUJobUJ6NHlGZVpmNkVQSnFFWmIKVDF5RGc2Qk5vT0dDd09Da2lBbnVyRkdQMHkyTkNLMVNlUURJQm1kKzZ4NElUbWhLL05sTkxMZUY5UUtCZ0FjSApxSytMZWxQUEJEQlFKRE0xNlQ3QlRXRHBvRjdIdHlObjJ3R2czMllrTW83bThoVERaNXByMzdQQTJuLzJtZm1uClh3NlhKc05zOHB3VnRPREx3SW1ndzhhNjJCTUNtNGhZcTF2ak53SEpEcE15dVY5UVJuelJzdVQyRnJUMENZTTEKelprYTdwRDIwZGh1TnA5dmxvL2NtRUtENndkVW4vVW5VWktWeVpEL0FvR0FlWUF5WGR0dytRQ0ZXcnFJRWMydAozUWxvNGh3dldZM1lVWEthd1ZHRWZFVFFDamdzNkhvSlFPRnEzaURsaTF4TDlFTFR2UVNlVTdhWnJXWXFoeC84Cm5BeGZyY0E5UXhrbTh3YWdpcWNxOXMzZkRqSEpmVWljd25EWlhydmc5dEZCVk1ZampjWGtPTzNWV3NEV3lSQ3cKcFVzRXh1RUtqL3NZUGZZdXc2SVptdzg9Ci0tLS0tRU5EIFBSSVZBVEUgS0VZLS0tLS0K
-
-
-
-
- wan
- 158.69.183.166
- WANGW
- 1
-
-
-
-
-
-
- OpenBGPD
-
- 0.11_9
- https://doc.pfsense.org/index.php/OpenBGPD_package
- openbgpd.xml
-
-
- iperf
- http://www.freshports.org/benchmarks/iperf/
-
- 2.0.5.5_3
- https://doc.pfsense.org/index.php/Iperf_package
- iperf.xml
-
-
- nmap
-
- 1.4.4_1
- https://doc.pfsense.org/index.php/Nmap_package
- nmap.xml
-
-
- mtr-nox11
-
- http://www.bitwizard.nl/mtr/
- 0.85.6_1
- mtr-nox11.xml
-
-
- ntopng
- http://www.ntop.org/
-
- 0.8.6_1
- ntopng.xml
- true
-
-
- softflowd
- http://code.google.com/p/softflowd/
-
- 1.2.2
- softflowd.xml
-
-
-
-
-
-
-
-
-
-
- bgpd
- bgpd.sh
- bgpd
-
-
-
- iperf
- iperf
-
- mwexec("/usr/bin/killall iperf");
-
-
- ntopng
- ntopng.sh
- ntopng
-
-
-
- softflowd
- softflowd.sh
- softflowd
-
-
-
-
-
-
-
- 64522
-
- yes
- 192.168.194.2
- 192.168.194.2
- none
-
- 10.253.0.0/24
-
-
- 10.253.1.0/24
-
-
- 10.253.2.0/24
-
-
- 10.253.3.0/24
-
-
- 10.253.5.0/24
-
-
- 10.253.6.0/24
-
-
- 10.253.7.0/24
-
-
- 10.253.8.0/24
-
-
- 10.253.9.0/24
-
-
-
-
-
-
- 192.168.194.1
-
-
-
-
- remote-as
- 64517
-
-
-
-
-
- enabled
- lan,opt1,opt2,opt3,opt4,wan
- 10.253.3.99
- 9996
-
-
- 9
- full
- 300
- 100
- 300
- 100
- 10
- 10
- 100
-
-
-
-
-
-
- ipalias
- wan
- 5935fb59669c7
-
- single
- 29
- 158.69.183.164
-
-
- ipalias
- wan
- 5935fba3df38c
-
- single
- 29
- 158.69.183.165
-
-
- ipalias
- wan
- 597ce7c0c0655
-
- single
- 29
- 158.69.183.163
-
-
-
-
-
-
- PHP-Growl
- pfSense growl alert
-
-
- tsys-cloud-www.turnsys.net
- 25
- prodtechopsalerts@turnsys.com
-
-
- PLAIN
- ovh-core-rtr01@turnsys.net
-
-
-
- lan
- yes
- yes
-
-
-
- 128
-
-
-
-
+
+ opnsense
+
+ -
+ Disable the pf ftp proxy handler.
+ debug.pfftpproxy
+ default
+
+ -
+ Increase UFS read-ahead speeds to match current state of hard drives and NCQ. More information here: http://ivoras.sharanet.org/blog/tree/2010-11-19.ufs-read-ahead.html
+ vfs.read_max
+ default
+
+ -
+ Set the ephemeral port range to be lower.
+ net.inet.ip.portrange.first
+ default
+
+ -
+ Drop packets to closed TCP ports without returning a RST
+ net.inet.tcp.blackhole
+ default
+
+ -
+ Do not send ICMP port unreachable messages for closed UDP ports
+ net.inet.udp.blackhole
+ default
+
+ -
+ Randomize the ID field in IP packets (default is 0: sequential IP IDs)
+ net.inet.ip.random_id
+ default
+
+ -
+
+ Source routing is another way for an attacker to try to reach non-routable addresses behind your box.
+ It can also be used to probe for information about your internal networks. These functions come enabled
+ as part of the standard FreeBSD core system.
+
+ net.inet.ip.sourceroute
+ default
+
+ -
+
+ Source routing is another way for an attacker to try to reach non-routable addresses behind your box.
+ It can also be used to probe for information about your internal networks. These functions come enabled
+ as part of the standard FreeBSD core system.
+
+ net.inet.ip.accept_sourceroute
+ default
+
+ -
+
+ Redirect attacks are the purposeful mass-issuing of ICMP type 5 packets. In a normal network, redirects
+ to the end stations should not be required. This option enables the NIC to drop all inbound ICMP redirect
+ packets without returning a response.
+
+ net.inet.icmp.drop_redirect
+ default
+
+ -
+
+ This option turns off the logging of redirect packets because there is no limit and this could fill
+ up your logs consuming your whole hard drive.
+
+ net.inet.icmp.log_redirect
+ default
+
+ -
+ Drop SYN-FIN packets (breaks RFC1379, but nobody uses it anyway)
+ net.inet.tcp.drop_synfin
+ default
+
+ -
+ Enable sending IPv4 redirects
+ net.inet.ip.redirect
+ default
+
+ -
+ Enable sending IPv6 redirects
+ net.inet6.ip6.redirect
+ default
+
+ -
+ Enable privacy settings for IPv6 (RFC 4941)
+ net.inet6.ip6.use_tempaddr
+ default
+
+ -
+ Prefer privacy addresses and use them over the normal addresses
+ net.inet6.ip6.prefer_tempaddr
+ default
+
+ -
+ Generate SYN cookies for outbound SYN-ACK packets
+ net.inet.tcp.syncookies
+ default
+
+ -
+ Maximum incoming/outgoing TCP datagram size (receive)
+ net.inet.tcp.recvspace
+ default
+
+ -
+ Maximum incoming/outgoing TCP datagram size (send)
+ net.inet.tcp.sendspace
+ default
+
+ -
+ Do not delay ACK to try and piggyback it onto a data packet
+ net.inet.tcp.delayed_ack
+ default
+
+ -
+ Maximum outgoing UDP datagram size
+ net.inet.udp.maxdgram
+ default
+
+ -
+ Handling of non-IP packets which are not passed to pfil (see if_bridge(4))
+ net.link.bridge.pfil_onlyip
+ default
+
+ -
+ Set to 1 to additionally filter on the physical interface for locally destined packets
+ net.link.bridge.pfil_local_phys
+ default
+
+ -
+ Set to 0 to disable filtering on the incoming and outgoing member interfaces.
+ net.link.bridge.pfil_member
+ default
+
+ -
+ Set to 1 to enable filtering on the bridge interface
+ net.link.bridge.pfil_bridge
+ default
+
+ -
+ Allow unprivileged access to tap(4) device nodes
+ net.link.tap.user_open
+ default
+
+ -
+ Randomize PID's (see src/sys/kern/kern_fork.c: sysctl_kern_randompid())
+ kern.randompid
+ default
+
+ -
+ Maximum size of the IP input queue
+ net.inet.ip.intr_queue_maxlen
+ default
+
+ -
+ Disable CTRL+ALT+Delete reboot from keyboard.
+ hw.syscons.kbd_reboot
+ default
+
+ -
+ Enable TCP extended debugging
+ net.inet.tcp.log_debug
+ default
+
+ -
+ Set ICMP Limits
+ net.inet.icmp.icmplim
+ default
+
+ -
+ TCP Offload Engine
+ net.inet.tcp.tso
+ default
+
+ -
+ UDP Checksums
+ net.inet.udp.checksum
+ default
+
+ -
+ Maximum socket buffer size
+ kern.ipc.maxsockbuf
+ default
+
+
+
+ normal
+ ovh-core-rtr01
+ turnsys.net
+
+ admins
+ System Administrators
+ system
+ 1999
+ 0
+ user-shell-access
+ page-all
+
+
+ root
+ System Administrator
+ system
+ admins
+ $2b$10$k7UpLMTFYZHVQqDpnlXr1.tMDVslyuzDVWfvMg9.MNwC1SydPyxoy
+ 0
+
+ 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
+
+
+
+ 2000
+ 2000
+ America/Chicago
+ 0.opnsense.pool.ntp.org 1.opnsense.pool.ntp.org 2.opnsense.pool.ntp.org 3.opnsense.pool.ntp.org
+
+ http
+ 5acd29581b4ba
+
+
+
+
+
+ yes
+ 1
+ 1
+ 1
+ 1
+ 1
+ 1
+ hadp
+ hadp
+ hadp
+
+ monthly
+
+ 1
+ 60
+ aesni
+ 1
+ 1
+ en_US
+ 10.253.3.201
+ 8.8.8.8
+ 8.8.4.4
+ 115200
+ video
+
+ 1
+ lan,opt1
+ enabled
+ 1
+
+ basic
+
+
+
+
+ none
+ none
+ none
+ none
+ none
+ none
+ none
+ none
+
+
+
+ em0
+ WAN
+ 1
+
+ 1
+ 1
+ 158.69.183.161
+ 29
+ GW_WAN
+
+
+
+
+
+ vtnet0
+ TSYS
+ 1
+
+ 10.253.9.252
+ 24
+
+
+
+
+
+
+ vtnet1
+ mgmt
+ 1
+
+ 10.253.3.252
+ 24
+
+
+
+
+
+
+ 1
+ 1
+ openvpn
+ OpenVPN
+ group
+ 1
+
+
+
+
+
+
+ 10.253.9.10
+ 10.253.9.244
+
+
+
+
+ on
+
+
+
+
+ public
+
+
+
+
+
+
+ automatic
+
+
+ tcp
+ wan
+ inet
+ Allow HTTP to tsys-cloud-www
+
+
+
+ pass
+ 10.253.9.80
+ 80
+
+
+ 158.69.183.163
+ 80
+
+
+ root@10.251.100.101
+
+ /firewall_nat_edit.php made changes
+
+
+ root@10.40.50.77
+
+ /firewall_nat_edit.php made changes
+
+
+
+ tcp
+ wan
+ inet
+ Allow HTTPS to tsys-cloud-www
+
+
+
+ pass
+ 10.253.9.80
+ 443
+
+
+ 158.69.183.163
+ 443
+
+
+ root@10.251.100.101
+
+ /firewall_nat_edit.php made changes
+
+
+ root@10.40.50.77
+
+ /firewall_nat_edit.php made changes
+
+
+
+
+
+ pass
+ wan
+ inet
+ keep state
+ tcp
+
+
+ 158.69.183.163
+ 443
+
+
+ root@10.251.100.101
+
+ /firewall_rules_edit.php made changes
+
+
+ root@10.251.100.101
+
+ /firewall_rules_edit.php made changes
+
+
+
+ pass
+ wan
+ inet
+ keep state
+ tcp
+
+
+ 158.69.183.163
+ 80
+
+
+ root@10.251.100.101
+
+ /firewall_rules_edit.php made changes
+
+
+ root@10.251.100.101
+
+ /firewall_rules_edit.php made changes
+
+
+
+ pass
+ inet
+ Default allow LAN to any rule
+ lan
+
+
+
+
+
+
+ pass
+ inet6
+ Default allow LAN IPv6 to any rule
+ lan
+
+
+
+
+
+
+ pass
+ openvpn
+ inet
+ keep state
+
+
+ 1
+
+
+ root@10.253.9.2
+
+ /firewall_rules_edit.php made changes
+
+
+ root@10.253.9.2
+
+ /firewall_rules_edit.php made changes
+
+
+
+ pass
+ opt1
+ inet6
+ keep state
+ Default allow LAN IPv6 to any rule
+
+
+ 1
+
+
+ root@10.40.50.77
+
+ /firewall_rules_edit.php made changes
+
+
+ root@10.40.50.77
+
+ /firewall_rules_edit.php made changes
+
+
+
+ pass
+ opt1
+ inet
+ keep state
+ Default allow LAN to any rule
+
+
+ 1
+
+
+ root@10.40.50.77
+
+ /firewall_rules_edit.php made changes
+
+
+ root@10.40.50.77
+
+ /firewall_rules_edit.php made changes
+
+
+
+ pass
+ opt1
+ inet
+ keep state
+ Allow traffic to management VLAN
+
+
+ 1
+
+
+ root@10.40.50.77
+
+ /firewall_rules_edit.php made changes
+
+
+ root@10.40.50.77
+
+ /firewall_rules_edit.php made changes
+
+
+
+
+
+
+
+
+ ICMP
+ icmp
+ ICMP
+
+
+
+ TCP
+ tcp
+ Generic TCP
+
+
+
+ HTTP
+ http
+ Generic HTTP
+
+ /
+
+ 200
+
+
+
+ HTTPS
+ https
+ Generic HTTPS
+
+ /
+
+ 200
+
+
+
+ SMTP
+ send
+ Generic SMTP
+
+
+ 220 *
+
+
+
+
+ 0.opnsense.pool.ntp.org
+
+
+ system_information-container:00000000-col3:show,services_status-container:00000001-col4:show,gateways-container:00000002-col4:show,interface_list-container:00000003-col4:show
+ 2
+
+
+ root@10.40.50.77
+
+ /firewall_virtual_ip_edit.php made changes
+
+
+
+
+
+
+
+
+
+
+
+
+ wan
+ v9
+
+
+
+ 0
+
+
+
+
+
+
+
+
+ 0
+ 0
+ 0
+ wan
+ 192.168.0.0/16,10.0.0.0/8,172.16.0.0/12
+
+
+ W0D23
+ 4
+ ac
+ 0
+ 0
+
+
+
+
+ 0
+
+
+
+ 1
+ 1
+
+
+
+
+
+ 0
+ on
+ strip
+ 1
+ 0
+ admin@localhost.local
+
+
+
+ 0
+ /var/squid/cache
+ 256
+
+ 100
+ 16
+ 256
+ 0
+ 0
+
+
+
+ 0
+ 2048
+ 1024
+ 1024
+ 256
+
+
+
+ lan
+ 3128
+ 3129
+ 0
+ 0
+
+
+ 4
+ 5
+
+ 2121
+ 0
+ 1
+ 0
+
+
+
+
+
+
+
+
+ 80:http,21:ftp,443:https,70:gopher,210:wais,1025-65535:unregistered ports,280:http-mgmt,488:gss-http,591:filemaker,777:multiling http
+ 443:https
+
+
+
+
+
+
+ 0
+ icap://[::1]:1344/avscan
+ icap://[::1]:1344/avscan
+ 1
+ 0
+ 0
+ X-Username
+ 1
+ 1024
+ 60
+
+
+
+
+ OPNsense proxy authentication
+ 2
+ 5
+
+
+
+
+
+
+
+
+
+
+ 1
+ 64522
+ 10.253.9.0/24,10.253.3.0/24,192.168.194.0/30
+
+
+
+ 1
+ 192.168.194.1
+ 64517
+ openvpn
+ 0
+ 0
+
+
+
+
+
+
+
+
+
+
+
+ 1
+ 0
+ notifications
+ 0
+ notifications
+
+
+
+
+ 5acd29581b4ba
+ Web GUI SSL certificate
+ LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUZiekNDQTFlZ0F3SUJBZ0lKQUlNTlZ4N1QzSWM3TUEwR0NTcUdTSWIzRFFFQkN3VUFNRTR4Q3pBSkJnTlYKQkFZVEFrNU1NUlV3RXdZRFZRUUlEQXhhZFdsa0xVaHZiR3hoYm1ReEZUQVRCZ05WQkFjTURFMXBaR1JsYkdoaApjbTVwY3pFUk1BOEdBMVVFQ2d3SVQxQk9jMlZ1YzJVd0hoY05NVGd3TkRFd01qRXhOVEEwV2hjTk1Ua3dOREV3Ck1qRXhOVEEwV2pCT01Rc3dDUVlEVlFRR0V3Sk9UREVWTUJNR0ExVUVDQXdNV25WcFpDMUliMnhzWVc1a01SVXcKRXdZRFZRUUhEQXhOYVdSa1pXeG9ZWEp1YVhNeEVUQVBCZ05WQkFvTUNFOVFUbk5sYm5ObE1JSUNJakFOQmdrcQpoa2lHOXcwQkFRRUZBQU9DQWc4QU1JSUNDZ0tDQWdFQTFiaDZkSEdTZkRSZU55YzhGbis2b0dEa3ltbmp6YWhCCkM4Z1JpWDMwWWR3SVBYcWhpYllLQmdkWVFZZDRoNGgzWERPelllMmxZZVRVYUVaZkRsVkxqV2FyL0hMYW5HODMKQW04eE9MdXdwQmdGc0lNTGZUR0FEcUJDd1BaMDlnU0UwT0t1dkdFUGoyNkg4eWhNeDNXT2VvVGJ2RENKMVdCYgpvQjFSTDJmVG1GbkdxMTZTSTJpVDc2VndBM3BUQXlFb1pmRllmeGRMSTBpbmp5dnU3aWNCQVBNU09pWXowbVJXClVZZDNHKzUrcmI0QkVkSXl3TGpDRzd2SjdYQTJlWXJlZTY3YlpTeTVqNVc0eXpjTFJNbkZzZGMrb1EwR3dJanIKVFowQzYvZWowUWpWbE5ERFNQaGM0dkJaZ2xWMTJlL3FtekN0MnNPYzVxS3Zyc1JtckNGL3RSelV5cU9ZaGt2eAp2c0huODVnTmswS05YbEkwUGNWM2NhTWo0RlJVNXI3clpEb0hnTi9UTFpFaUVmVUJXMFlJM25FSUZrY3VyVngyCm5KNWNxWjBZK1NiSk1BZzVPYUhWcTZxRWhsdEExa1BvQWllcXBhQjdzb2lDT0hQZ08rQ09YNUlCK1FMM2h2dmMKMHc0YUplNEErS0ROS21ReVRpQ21JYXdrU0l0V2Fka1lUMFNnVjVnMUJKYnRQdnJKZytOM1dpN3dKdkxqOXVnZQovVWx0V3VPeXM3eXQyWDRIbFdWQXdUSC9XMEN3enVaUXpsbk02ODJHdThacGxMWGt6OU1DVFRkbm5oQnErRXllCnJrM3lONk4zRWZSMTN2T2lyM1VWcEVVVkVvSm9sRERGNERpMDQxR3BWU25xVFVBeUs2aGQxQVpFYXVVd1RyeUkKSDZtMWwrVUIvdHNDQXdFQUFhTlFNRTR3SFFZRFZSME9CQllFRlA3OWZLUU5sM0VWaGdLdm8xOFNqd3NGWDBjcgpNQjhHQTFVZEl3UVlNQmFBRlA3OWZLUU5sM0VWaGdLdm8xOFNqd3NGWDBjck1Bd0dBMVVkRXdRRk1BTUJBZjh3CkRRWUpLb1pJaHZjTkFRRUxCUUFEZ2dJQkFGZ245NlYrMEhqRlFtaEd5RDZBM1lXenByaitiZkd1RWZCcmZhcUMKbVd2NTM4TVlTOEE2MWswMEhOZjZoZUZISUpWSzI1akN6dXZDMC8rZmJGRForZmtkcllNUFNjNzBOQm9oOFJnaApxTDNoOW9KenR4bEVCbkc2Z3lQdG1ISDVYbW1mZmYzWTU0U0ljT0x0c3BTWlNUVDlMbUpNcm4wNmhRbE5Cd3Z3Cm1XWXBqTklMRWJSN1BWN3ZtZjQ3MW1OTmVqczZSK2Y2Z2RpMDdCcVl6YVppWldsdGZFb2FsNk5qRFRUUUhTdEUKcVlVSGpXWHZGU0g5SVRjdzN3QVRjdGVZVW8rOFI1dWEvNmhMUEViMERUeUo3Y0FuZDFjNVpwK1lEUzRDcDd2dgowdVFybDliNWtKdWYrWDUzL3lMMmNMK1dDdFJsU0tKOW9kV1NzRlRqLzhLUTBWNUJOcGFqcnE2dnp2c2FVaTNqCkk2Z0dFVlphak9YQVdYdmxhWDdLQXduSi9EZzVmUmFXT0oxTmpuSFZibFNsbWRPdWh3cHVJM0cyc3hsaDIxa28KQkZiOVo0V3ZoODBEWXBxQnRScEFpRDRaMGVkOCtLelkzQ0NyQzBOS1pUVjhPbFRmRWZlSzdxNzRDbmMyQmJhSwp5UUI2SlVlRVU1VVd5K1paQkNrM2kzN3dBcmhyc0UwU1B4N2ZKUXJQZlNpbUQxZE0wcHcrdExZMDFQaUxudlZTCk9SaEw0S09NMDAydVhBUW1CbDZBMXlGRjBsMzhwR1cvbFNDNktId3lnQ0Znb2hHYnFsQmw3eDM1czR0Vkoyak4KdEpXRFdWYmt4eFZEbFFGbW5DTURzbzBEaFBBbGJNbVJ0OC8yeEx5cVRsV2F1SGpvZ3B5dStpdmhrOXcvc3VGUQpkSndXCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K
+ LS0tLS1CRUdJTiBQUklWQVRFIEtFWS0tLS0tCk1JSUpRZ0lCQURBTkJna3Foa2lHOXcwQkFRRUZBQVNDQ1N3d2dna29BZ0VBQW9JQ0FRRFZ1SHAwY1pKOE5GNDMKSnp3V2Y3cWdZT1RLYWVQTnFFRUx5QkdKZmZSaDNBZzllcUdKdGdvR0IxaEJoM2lIaUhkY003Tmg3YVZoNU5SbwpSbDhPVlV1TlpxdjhjdHFjYnpjQ2J6RTR1N0NrR0FXd2d3dDlNWUFPb0VMQTluVDJCSVRRNHE2OFlRK1Bib2Z6CktFekhkWTU2aE51OE1JblZZRnVnSFZFdlo5T1lXY2FyWHBJamFKUHZwWEFEZWxNRElTaGw4VmgvRjBzalNLZVAKSys3dUp3RUE4eEk2SmpQU1pGWlJoM2NiN242dHZnRVIwakxBdU1JYnU4bnRjRFo1aXQ1N3J0dGxMTG1QbGJqTApOd3RFeWNXeDF6NmhEUWJBaU90Tm5RTHI5NlBSQ05XVTBNTkkrRnppOEZtQ1ZYWFo3K3FiTUszYXc1em1vcSt1CnhHYXNJWCsxSE5US281aUdTL0crd2Vmem1BMlRRbzFlVWpROXhYZHhveVBnVkZUbXZ1dGtPZ2VBMzlNdGtTSVIKOVFGYlJnamVjUWdXUnk2dFhIYWNubHlwblJqNUpza3dDRGs1b2RXcnFvU0dXMERXUStnQ0o2cWxvSHV5aUlJNApjK0E3NEk1ZmtnSDVBdmVHKzl6VERob2w3Z0Q0b00wcVpESk9JS1lockNSSWkxWnAyUmhQUktCWG1EVUVsdTArCitzbUQ0M2RhTHZBbTh1UDI2Qjc5U1cxYTQ3S3p2SzNaZmdlVlpVREJNZjliUUxETzVsRE9XY3pyellhN3htbVUKdGVUUDB3Sk5OMmVlRUdyNFRKNnVUZkkzbzNjUjlIWGU4Nkt2ZFJXa1JSVVNnbWlVTU1YZ09MVGpVYWxWS2VwTgpRRElycUYzVUJrUnE1VEJPdklnZnFiV1g1UUgrMndJREFRQUJBb0lDQUJBdzhxNEJzS3hTTjFVTVZ1UUpkelVSClFpUUhrNmVQK0tXUTJhdEY3STdCWWFwdXNQQkM1MDEvbnZNUDlWU25SUXVxS3d2Zk9pbEpjY0lZbXJqMlEwd0sKSER0NjVBNzM2ZjM0T0kxb3dzQWJ4Y3FTa3Z0QUZjaUY0YWpHd3lPa1FmK2xQTUd1eE1RRUJxNm9QZkRhZWhuVQpHT1dQODlGRGhJMkR5eFBCVk9sMDI3VTk2K3BjME9CVjh6K0FNK3ZIeGt5NjFRNkQwRUJ6RDZhc0dHVFlkWjRCCnpENjFpRFdIUG5iY3dXeFBUQytUZG5kSUttb3BWU05PdmNTTVBNUkdmZ1oydjg1UmJobHZxVmxUNlRtajQ2Tk8KZ0VNcFBucTFwTVh6Z0RZcVE3SGhiblRndi9xMlBpcy9ORGpJaXE0aEcrLzM1eVBzcitWVksrUWNvdjZsWnd4SgpDRG9oRnFvQlZzNlBiK2YvSGZjUlBCRnBmY1FjeDNnQ2ZWTWh5a3dPN3dBak56cGh1SDNZSlZucGN0Lytnc2p3CkUzMVVLbkZ0eEhmM0NCemNhVDFiR21idzMxekFLalZRTUdOcjFJd2x5Q2o5RmdLdERURzFqcWVKS3pFZy9qMUQKakl6TUo2QUVJMVR1cjlxTi8rZmxQVE53YXVjRmpUMWRRMzVpeG92RFpyY3ZKMEhlTStkSUdTVnNqKzl1K0NTdApzb3ZvdGprWGpsWmdIUngvY1hId1dEbUQ3SFp3MlRuNnBBeGE0aEplRFc0MlJOQURrODRSM3dpSzZzVEl1VHZZClFGUGJJN0I3a3BlMWlzVTduamVjbkcweS8wcjJkbUZNUFpncUNPYXFtSTYwMTl4N09zVjFUNkxHSXBkMDRHY1YKUlYrN1ZuWmcrS0NHenhHaTEvWlJBb0lCQVFENVlhY1NCTGlmYnoxeHpjWEM2bEJ3cE5KNW5wT1M2SG16QlJocQpJcHI4WlVWcDBHTkw3SnBJYzE0cDY4RzRlWDB0NTh5eDRKMDRTdVZDVDMvOFMwamtaV01RckVmbTg0ZmM3RitsCk1vakxEcS9uWmQ2a1ZnUjdCSU5DZjJpaXc2ZEpkOFVTWWc3K2pLakpYK2J2cGsvbWdoYW9yRE1FYVZaN2UvQUoKM0VNenV5TVMrSWgvRGJRYTEyNUV2QkZzdm1CR3NveWNGYmJMMHFDc3BBNjBzcTd2UHNCdlIvVVN3d1ZyVGhmagoxV0ltSmtNdHlwVVNLSVBSZXJUaHZjMlhCL1R0Zk9ieXJnc0l6RnRMOTFtOWRDNXNRTzhSUzZWYTloc3hhMTZZCkVlSGZ2N3NuTTY3M2w1YVgzd2ZrclpWN3g5ZEJCNU5sek9Wa2lkNzZKSmlvb1JYREFvSUJBUURiWklueno4T1IKV013cXNsQWVqLzVXTk8wYzE1U0RoOTB1RkVneFJ1Qmw2dDNqRVZlV0g5U1VLRlRoUkQxWGxsRkpGY3k0YmdBTApIaEQvakE5QTVSdnowczhlVHduODcxM0o1YmdNMWFOb092MVJTS2dZeFN1UWwzdkRYSHFNQ3Rrd3JUOFhsL3lEClo3bU9LVXU4bHhnS1Q1UllXc1dtZ3FuQXJMSG1Ca1FKMU4zdVpiVHU0cWx0WGtoelhaL2swN1B5ZlZvOFMrb2UKU1hwVy85RkpDcEd0Z21PT05WSXcvbU1MNy9ZZ3hFTFRRUS9udmIrSkFKb2xQWWp6ZkVFYy9TYkQ1ckFob09XcwpCYmRKYXkyWGRmWC83ZVZZQnptblllZ2Zod2h4WDVTWGZ3b2lCc2c1VUtvekhaSVhpckVkeTQrdk1wUzl0eWs3Cks1bkN0Mk1QOUNrSkFvSUJBUURLRml4QkdicFMyTjQ5L3JZbmdhRzE1cHI1RzF3VFRIaHliY3FmRjNQbzNGZ24KcTBzTUY2dmUwajZZVWdnbDZhMWJLZUJpdE5ZeTY5NWtvZS9oRDFEK1pIcW01RFZRSGtFVzhpVi94VGU4OVNYdQpxa3FGZVg4Z0FVUXMrdnBjQzVqZ25FSUM1NXVuQTIwejRwZE4xTVFpMDRCeEp6b2dkUXd6L1BkRHhrNWUrV011CjJHQWtOWUtoemJuNTBUMTlsYmlIRWVHSUNzQ2E0eEI1Vm1qa1hYZ05RQmpKRk5Ld1pZRmF0Mm44b3NwcWg4OGcKcUcyc3pWQWt6UDhQZjdPK2xDQVM0NGh6V0Q1dzNzbU5BZUNpK2ljMGFscFE5YkFGeWpHM0ZuOE5WRkJwOVFGQQpmMDFtTGwxR3JPSEVtalhzbk1EK1habEFnWTNTcnpjV0ZkbnZyTG5wQW9JQkFERXlVbDBCOGZEZDRLcVNZYlQ0CnhTZS9wb3daSzR4ekl2MzZQbFlPZHJOai8yMnpyZGhVT3U4ZVBDcG5pdm5oRTBrNFFqZjVNcmxMZkxSUlMvcFoKWmZNL0NvTFpabnY1a1NaOUJOQ2I5NUNmNmI0WWRObFpIWFBIQkZIQ294aFVObS9iNlpINDJ2NzhlM2VOZXhaSApLM1RrYzNkOG8yVzdWeVdGbEQ3b21NazdtcWlpMWZmYmkvS2llY3lrNmYzK0d4UDlXQWE5WHpwN2I1dWlzZU9YCkl5T3RZWFc2THp3ZFQwaVYvck5LVDFIZi9Sa1NTNmtGSVl2SVNMV1EzMmtJdTNDaWdreUlML2hyTDdhZStoSkUKdVcweWc0TkIyNFBWU0tBSlA3TnNvMzExVjJoWjdQd3RRbjFEM0VhN0t3eHJZVVVBS3FxQU1CYThxRFlwdVdVUwpjMEVDZ2dFQWRudXFjWENTeFNicXFQbEc3VU5VZ0dyS28zMHJyWDJaSFlxVkNPc0c4TmZBZC9Id3dRc3pmMEpmCmJqc1JGQlVEYzFLdTk1dFRpWU5VWnArd211S2pxcEZIcjFhNmtQOEgxNWFTUllSTTNITHYwUDYxSGVqa29NeUMKZ3A4QlJibDRuUzh1N3o5YjNWV3FuOVJKOEIrWFRDTGh5Qy9DVTZRZEZCZC9ZUXpOTGNNQktEckppd0pNN3U4YgpFSUZ5MWpRZVlOTC9WcWNuSDY0dm9INEdDZzc5eFJLdlBmWnhBaUZTckhIUVdQWWVJRllDRnlVTUhwMmpTdE43CjVOZ01RWXArbkZZL2d5cWJId2JHQ0JtYWp0bWVYRU1WcnR5SzZ2QXE1RUM2djFrWS9tVFRDb1Jtdmk1djE2ZWoKbWx4azdLanhCWTAvd2tHREY5bkhEMGNEVHpYaHdBPT0KLS0tLS1FTkQgUFJJVkFURSBLRVktLS0tLQo=
+
+
+
+
+ vtnet0
+ 9
+ 0
+ tsys
+ vtnet0_vlan9
+
+
+ vtnet1
+ 3
+ 0
+ mgmt
+ vtnet1_vlan3
+
+
+
+
+ Interface WAN Gateway
+ 1
+ inet
+ wan
+ 158.69.183.166
+ 1
+ GW_WAN
+ 1
+ 1
+
+
+ Interface WAN Gateway
+ 1
+ inet
+ wan
+ 158.69.183.166
+ 1
+ GW_WAN
+ 1
+ 1
+
+
+
+
+ UDP
+ tun
+ 158.69.183.162
+ 1194
+ none
+ ASN2NET Backbone
+ p2p_shared_key
+ AES-128-CBC
+ SHA1
+ none
+ 192.168.194.0/30
+ 1
+ wan
+ 1
+
+ Iw0KIyAyMDQ4IGJpdCBPcGVuVlBOIHN0YXRpYyBrZXkNCiMNCi0tLS0tQkVHSU4gT3BlblZQTiBTdGF0aWMga2V5IFYxLS0tLS0NCjRhYjBlYzc3NGNlZmFjNDk0ZDkxMmRlOGRkMzkyN2JhDQowZGZjMzI2MGMwZmQwOGE2ZmI0NjVjMGNmZjQ1MzU1YQ0KMDBmODc5MzQwMDI0YjU1OTQ2MDAzNmUyOTJjNDhiNWQNCjkzMjg3ZjY3ZTIwOTI4ZDA2MzczMjM2NjliMjNmZjNiDQoxZjY3MDJlYzkwZWEzOGU3MWZjN2JjMDA5ZTI1YzdiYw0KZjVmNGE4YTNlMzdhMDUyOTkxMGEzNDVjMTQ4Mjk5OTkNCjU0OWE4NGIzYTAyZTg4M2Y1M2ZkZWYzNGZlYzlhNTg3DQpiMDBjMWM3ZjU4YjFlOTYyZTQ1ZjEyMjI0MGI0YTBlMQ0KMTgxZTU3NjY0Y2UwZmIxNTg5YTA1NmZjYWYyNDYwNGYNCmU3M2I4OTJmN2JmNzRlZjMxODEzYzc5ODJhZjkwNmNhDQo4YzAwYTY1OWEwMzI3MGQ3ZGFiNjE0YzkwM2RjYWRlZQ0KNmEwZjQ2MDFhMWE4ODAzMjQxZjY4MTY5M2UyZWFjN2ENCmUyZWNkMDBkYmU4Mjc1MDY2OWQ0MTkwNTZmYjE4OWE0DQpiYzY1YzAyOWY1ZjM2YzI1MTM0MzkzM2M3OTRkZjdhMg0KY2E3OWUyN2E1ZDNjNDhiNjgwNjg2Yjc5MmQ3ZGZiOGUNCmIwODZkMzAyNzNiN2U0ZmNjNTdiNGVjZTQyOTgyMjg2DQotLS0tLUVORCBPcGVuVlBOIFN0YXRpYyBrZXkgVjEtLS0tLQ==
+
+
+
+
+
+ single
+ 29
+ carp
+ wan
+ tsys-cloud-www
+ 158.69.183.163
+ 1
+ 0
+ 1
+ 123
+
+
+ single
+ 24
+ carp
+ lan
+ floating gw tsys
+ 10.253.9.254
+ 2
+ 0
+ 1
+ vip123
+
+
+ single
+ 24
+ carp
+ opt1
+ toolbox/ucs
+ 10.253.3.254
+ 3
+ 0
+ 1
+ c0l0rad0
+
+
+
diff --git a/mtp-configs/pfv-core-rtr02.pfv.turnsys.net b/mtp-configs/pfv-core-rtr02.pfv.turnsys.net
new file mode 100644
index 0000000..14430c4
--- /dev/null
+++ b/mtp-configs/pfv-core-rtr02.pfv.turnsys.net
@@ -0,0 +1,1011 @@
+
+
+ opnsense
+
+ -
+ Disable the pf ftp proxy handler.
+ debug.pfftpproxy
+ default
+
+ -
+ Increase UFS read-ahead speeds to match current state of hard drives and NCQ. More information here: http://ivoras.sharanet.org/blog/tree/2010-11-19.ufs-read-ahead.html
+ vfs.read_max
+ default
+
+ -
+ Set the ephemeral port range to be lower.
+ net.inet.ip.portrange.first
+ default
+
+ -
+ Drop packets to closed TCP ports without returning a RST
+ net.inet.tcp.blackhole
+ default
+
+ -
+ Do not send ICMP port unreachable messages for closed UDP ports
+ net.inet.udp.blackhole
+ default
+
+ -
+ Randomize the ID field in IP packets (default is 0: sequential IP IDs)
+ net.inet.ip.random_id
+ default
+
+ -
+
+ Source routing is another way for an attacker to try to reach non-routable addresses behind your box.
+ It can also be used to probe for information about your internal networks. These functions come enabled
+ as part of the standard FreeBSD core system.
+
+ net.inet.ip.sourceroute
+ default
+
+ -
+
+ Source routing is another way for an attacker to try to reach non-routable addresses behind your box.
+ It can also be used to probe for information about your internal networks. These functions come enabled
+ as part of the standard FreeBSD core system.
+
+ net.inet.ip.accept_sourceroute
+ default
+
+ -
+
+ Redirect attacks are the purposeful mass-issuing of ICMP type 5 packets. In a normal network, redirects
+ to the end stations should not be required. This option enables the NIC to drop all inbound ICMP redirect
+ packets without returning a response.
+
+ net.inet.icmp.drop_redirect
+ default
+
+ -
+
+ This option turns off the logging of redirect packets because there is no limit and this could fill
+ up your logs consuming your whole hard drive.
+
+ net.inet.icmp.log_redirect
+ default
+
+ -
+ Drop SYN-FIN packets (breaks RFC1379, but nobody uses it anyway)
+ net.inet.tcp.drop_synfin
+ default
+
+ -
+ Enable sending IPv4 redirects
+ net.inet.ip.redirect
+ default
+
+ -
+ Enable sending IPv6 redirects
+ net.inet6.ip6.redirect
+ default
+
+ -
+ Enable privacy settings for IPv6 (RFC 4941)
+ net.inet6.ip6.use_tempaddr
+ default
+
+ -
+ Prefer privacy addresses and use them over the normal addresses
+ net.inet6.ip6.prefer_tempaddr
+ default
+
+ -
+ Generate SYN cookies for outbound SYN-ACK packets
+ net.inet.tcp.syncookies
+ default
+
+ -
+ Maximum incoming/outgoing TCP datagram size (receive)
+ net.inet.tcp.recvspace
+ default
+
+ -
+ Maximum incoming/outgoing TCP datagram size (send)
+ net.inet.tcp.sendspace
+ default
+
+ -
+ Do not delay ACK to try and piggyback it onto a data packet
+ net.inet.tcp.delayed_ack
+ default
+
+ -
+ Maximum outgoing UDP datagram size
+ net.inet.udp.maxdgram
+ default
+
+ -
+ Handling of non-IP packets which are not passed to pfil (see if_bridge(4))
+ net.link.bridge.pfil_onlyip
+ default
+
+ -
+ Set to 1 to additionally filter on the physical interface for locally destined packets
+ net.link.bridge.pfil_local_phys
+ default
+
+ -
+ Set to 0 to disable filtering on the incoming and outgoing member interfaces.
+ net.link.bridge.pfil_member
+ default
+
+ -
+ Set to 1 to enable filtering on the bridge interface
+ net.link.bridge.pfil_bridge
+ default
+
+ -
+ Allow unprivileged access to tap(4) device nodes
+ net.link.tap.user_open
+ default
+
+ -
+ Randomize PID's (see src/sys/kern/kern_fork.c: sysctl_kern_randompid())
+ kern.randompid
+ default
+
+ -
+ Maximum size of the IP input queue
+ net.inet.ip.intr_queue_maxlen
+ default
+
+ -
+ Disable CTRL+ALT+Delete reboot from keyboard.
+ hw.syscons.kbd_reboot
+ default
+
+ -
+ Enable TCP extended debugging
+ net.inet.tcp.log_debug
+ default
+
+ -
+ Set ICMP Limits
+ net.inet.icmp.icmplim
+ default
+
+ -
+ TCP Offload Engine
+ net.inet.tcp.tso
+ default
+
+ -
+ UDP Checksums
+ net.inet.udp.checksum
+ default
+
+ -
+ Maximum socket buffer size
+ kern.ipc.maxsockbuf
+ default
+
+ -
+ Page Table Isolation (Meltdown mitigation, requires reboot.)
+ vm.pmap.pti
+ default
+
+ -
+ Disable Indirect Branch Restricted Speculation (Spectre V2 mitigation)
+ hw.ibrs_disable
+ default
+
+
+
+ normal
+ pfv-core-rtr02
+ pfv.turnsys.net
+
+ admins
+ System Administrators
+ system
+ 1999
+ 0
+ user-shell-access
+ page-all
+
+
+ root
+ System Administrator
+ system
+ admins
+ $2b$10$A6E8slPQ47ZeKAAWEZikquT4cKDePehCLY547YFCcOIlQGPcaTeSu
+ 0
+
+ c3NoLXJzYSBBQUFBQjNOemFDMXljMkVBQUFBREFRQUJBQUFCQVFDbzVUMEZFVUtvWWF4Umhqczl5V3pLdEV5WHVLSnZUV29scnlEMzk1ZXF5QkoweE94YmtYSis4RU13S3RXTTZOVzVxYXFXYlQySkovVnpPSWNvWW14QXUrK3F3U1dPZXNrVnIrRnhQcjJ5cGFXRDk4bkp5K0NwWjlSTjZQdzZLaWtIYWt5cXpTVVdLWGRvdldpVHBkenFSTytqMExtSm1nVWlUM05zaDQyZXlidnQvVDdKTWtWRzRXK2pvUlgrRENTNFVJUlJRZ01SRDRUcUJRL2pyOW03VnMwYUpuMWxmbGdzcHJzYWNnb2crc0hsRXppdHd3Y1JxTU5wcDVKbTBEZmhqNlBxQXZzZ0tKWVdPT01GVm93dkdzcW5ROXdxSm81QWxsbGJUR1YxUkhlSUJPM2ZSUlU4VWQ5VFBBM0FmeDE2L2FwZjFua0xoVjhRWDltSXhFV3A=
+
+
+
+ 2000
+ 2000
+ America/Chicago
+ 0.opnsense.pool.ntp.org 1.opnsense.pool.ntp.org 2.opnsense.pool.ntp.org 3.opnsense.pool.ntp.org
+
+ https
+ 5ab5ea42ad218
+
+
+
+
+
+ yes
+ 1
+ 1
+ 1
+ 1
+ 1
+
+ hadp
+ hadp
+ hadp
+
+ monthly
+
+
+ 60
+ aesni
+ 1
+ 1
+ 1
+ en_US
+ 10.251.30.71
+ 115200
+ video
+
+ 1
+
+ enabled
+ 1
+
+ none
+ none
+ none
+ none
+ none
+ none
+ none
+ none
+
+
+
+ 1
+ ue0
+ dhcp
+ dhcp6
+ 32
+
+ on
+
+
+ 0
+ WAN
+
+
+ 1
+ bge0_vlan100
+ 10.251.100.253
+ 24
+
+
+
+
+
+
+ LAN
+
+
+ 1
+ 1
+ openvpn
+ OpenVPN
+ group
+ 1
+
+
+ bge0_vlan30
+ ProductionManagement
+ 1
+
+ 10.251.30.253
+ 24
+
+
+ bge0_vlan22
+ HouseServices
+ 1
+
+ 10.251.22.253
+ 24
+
+
+ bge0_vlan200
+ Nerdbone
+ 1
+
+ 10.251.200.253
+ 24
+
+
+ bge0_vlan5
+ RRVOIP
+ 1
+
+ 10.251.5.253
+ 24
+
+
+ bge0_vlan3
+ RRAP
+ 1
+
+ 10.251.3.253
+ 24
+
+
+
+
+ 1
+
+
+ 10.251.100.10
+ 10.251.100.245
+
+ 10.251.30.71
+
+
+
+ on
+
+
+
+ 1
+ 1
+ 1
+ 1
+ 1
+ 1
+
+ 1
+ kn3lmgmt
+ 161
+
+
+
+ 162
+
+ opt1
+
+
+ 1
+ 50
+ 10.253.3.99
+
+
+
+ ipv4
+ 1
+ 1
+ 1
+ 1
+ 1
+ 1
+ 1
+ 1
+ 1
+ 1
+
+
+
+ automatic
+
+
+
+
+ pass
+ inet
+ Default allow LAN to any rule
+ lan
+
+
+
+
+
+
+ pass
+ inet6
+ Default allow LAN IPv6 to any rule
+ lan
+
+
+
+
+
+
+ pass
+ openvpn
+ inet
+ keep state
+ allow full transit across vpn
+
+
+ 1
+
+
+ root@10.251.100.101
+
+ /firewall_rules_edit.php made changes
+
+
+ root@10.251.100.101
+
+ /firewall_rules_edit.php made changes
+
+
+
+ pass
+ openvpn
+ inet
+ keep state
+ allow bgp
+ tcp
+
+
+ 192.168.198.2/30
+ 179
+
+
+ root@10.251.100.101
+
+ /firewall_rules_edit.php made changes
+
+
+ root@10.251.100.101
+
+ /firewall_rules_edit.php made changes
+
+
+
+ pass
+ opt1
+ inet
+ keep state
+
+
+ opt1
+
+
+ root@10.251.100.101
+
+ /firewall_rules_edit.php made changes
+
+
+ root@10.251.100.101
+
+ /firewall_rules_edit.php made changes
+
+
+
+ pass
+ opt1
+ inet
+ keep state
+
+
+ opt1
+
+
+ root@10.251.100.101
+
+ /firewall_rules_edit.php made changes
+
+
+ root@10.251.100.101
+
+ /firewall_rules_edit.php made changes
+
+
+
+ pass
+ opt1
+ inet
+ keep state
+
+
+ opt1
+
+
+ root@10.251.100.101
+
+ /firewall_rules_edit.php made changes
+
+
+ root@10.251.100.101
+
+ /firewall_rules_edit.php made changes
+
+
+
+ pass
+ opt2
+ inet
+ keep state
+
+
+ opt2
+
+
+ root@10.251.100.101
+
+ /firewall_rules_edit.php made changes
+
+
+ root@10.251.100.101
+
+ /firewall_rules_edit.php made changes
+
+
+
+ pass
+ opt3
+ inet
+ keep state
+
+
+ opt3
+
+
+ root@10.251.100.101
+
+ /firewall_rules_edit.php made changes
+
+
+ root@10.251.100.101
+
+ /firewall_rules_edit.php made changes
+
+
+
+
+
+
+
+
+ ICMP
+ icmp
+ ICMP
+
+
+
+ TCP
+ tcp
+ Generic TCP
+
+
+
+ HTTP
+ http
+ Generic HTTP
+
+ /
+
+ 200
+
+
+
+ HTTPS
+ https
+ Generic HTTPS
+
+ /
+
+ 200
+
+
+
+ SMTP
+ send
+ Generic SMTP
+
+
+ 220 *
+
+
+
+
+ 0.opnsense.pool.ntp.org
+
+
+ system_information-container:00000000-col3:show,services_status-container:00000001-col4:show,gateways-container:00000002-col4:show,interface_list-container:00000003-col4:show
+ 2
+
+
+ root@10.40.50.77
+
+ /services_snmp.php made changes
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ 0
+ 0
+ 0
+ wan
+ 192.168.0.0/16,10.0.0.0/8,172.16.0.0/12
+
+
+ W0D23
+ 4
+ ac
+ 0
+ 0
+
+
+
+
+ 0
+
+
+
+ 1
+ 1
+
+
+
+
+
+ 0
+ on
+ strip
+ 1
+ 0
+ admin@localhost.local
+
+
+
+ 0
+ /var/squid/cache
+ 256
+
+ 100
+ 16
+ 256
+ 0
+ 0
+
+
+
+ 0
+ 2048
+ 1024
+ 1024
+ 256
+
+
+
+ lan
+ 3128
+ 3129
+ 0
+ 0
+
+
+ 4
+ 5
+
+ 2121
+ 0
+ 1
+ 0
+
+
+
+
+
+
+
+
+ 80:http,21:ftp,443:https,70:gopher,210:wais,1025-65535:unregistered ports,280:http-mgmt,488:gss-http,591:filemaker,777:multiling http
+ 443:https
+
+
+
+
+
+
+ 0
+ icap://[::1]:1344/avscan
+ icap://[::1]:1344/avscan
+ 1
+ 0
+ 0
+ X-Username
+ 1
+ 1024
+ 60
+
+
+
+
+ OPNsense proxy authentication
+ 2
+ 5
+
+
+
+
+
+
+ wan
+ v9
+
+
+
+ 0
+
+
+
+
+ 1
+ 1
+ debugging
+ 0
+ notifications
+
+
+ 1
+ 64524
+ 10.251.0.0/16,192.168.198.0/30
+
+
+
+ 1
+ 192.168.198.1
+ 64517
+ openvpn
+ 0
+ 0
+
+
+
+
+
+
+
+
+
+
+
+
+
+ 0
+ 0
+ 1
+ 10
+ 100
+ 30
+ 20
+ 0
+ 0
+ 0
+ 1
+ 1
+ 0
+ 1
+ 0
+ 1
+ 1
+ 1
+ 1
+ 1
+ 1
+ 1
+ 0
+ 100M
+ 25M
+ 16
+ 10000
+ 0
+ database.clamav.net
+ 60
+
+
+
+
+
+ bge0
+ 100
+ bge0_vlan100
+
+
+ bge0
+ 100
+ bge0_vlan100
+
+
+ bge0
+ 30
+ 0
+ ProductionManagement
+ bge0_vlan30
+
+
+ bge0
+ 200
+ 0
+ Nerdbone
+ bge0_vlan200
+
+
+ bge0
+ 22
+ 0
+ LabManagement
+ bge0_vlan22
+
+
+ bge0
+ 3
+ 0
+ RR-AP
+ bge0_vlan3
+
+
+ bge0
+ 4
+ 0
+ RR-SW
+ bge0_vlan4
+
+
+ bge0
+ 5
+ 0
+ RR-VOIP
+ bge0_vlan5
+
+
+ bge0
+ 6
+ 0
+ RR-RTR-LAN1
+ bge0_vlan6
+
+
+ bge0
+ 7
+ 0
+ RR-IPTV
+ bge0_vlan7
+
+
+ bge0
+ 8
+ 0
+ RR-PeanutGallery1
+ bge0_vlan8
+
+
+ bge0
+ 9
+ 0
+ RR-MalZoo
+ bge0_vlan9
+
+
+ bge0
+ 10
+ 0
+ RR-Fstack1
+ bge0_vlan10
+
+
+ bge0
+ 11
+ 0
+ RR-RTRWAN-1
+ bge0_vlan11
+
+
+
+ 5ab5ea42ad218
+ Web GUI SSL certificate
+ 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
+ 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
+
+
+
+
+ UDP
+ tun
+ 158.69.183.162
+ 1199
+ none
+ asn2net
+ p2p_shared_key
+ AES-128-CBC
+ SHA1
+ none
+ 192.168.198.0/30
+ no
+ 5
+ wan
+ 1
+
+ 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
+
+
+
+
+ single
+ 24
+ carp
+ opt2
+ lan gw - vl22
+ 10.251.22.254
+ 1
+ 0
+ 1
+ vippw
+
+
+ single
+ 24
+ carp
+ opt1
+ langw - vl30
+ 10.251.30.254
+ 2
+ 0
+ 1
+ vippw
+
+
+ single
+ 24
+ carp
+ opt3
+ 10.251.200.254
+ 3
+ 0
+ 1
+ carpvip
+
+
+
+
diff --git a/rundeck/tsys-nodes b/rundeck/tsys-nodes
index 4fd92bd..5f647bf 100644
--- a/rundeck/tsys-nodes
+++ b/rundeck/tsys-nodes
@@ -37,4 +37,7 @@ ovh-ucs.turnsys.net:
hostname: ovh-ucs.turnsys.net
username: root
ssh-keypath: /var/lib/rundeck/ssh-keys/tsys_root.key
-
+rackrental-app.turnsys.net:
+ hostname: rackrental-app.turnsys.net
+ username: root
+ ssh-keypath: /var/lib/rundeck/ssh-keys/tsys_root.key
diff --git a/slack/prod/ovh/files/etc/issue b/slack/prod/ovh/files/etc/issue
new file mode 100644
index 0000000..a6e88dc
--- /dev/null
+++ b/slack/prod/ovh/files/etc/issue
@@ -0,0 +1,10 @@
+===============================================================================
+
+ This is a private computer system. These resources, including all
+ related equipment, networks, and devices, are provided for authorized
+ use only. The system may be monitored for all lawful purposes. Evidence
+ of unauthorized use collected during monitoring may be used for criminal
+ prosecution by staff, legal counsel, and law enforcement agencies.
+
+===============================================================================
+
diff --git a/slack/prod/ovh/files/etc/issue.net b/slack/prod/ovh/files/etc/issue.net
new file mode 100644
index 0000000..a6e88dc
--- /dev/null
+++ b/slack/prod/ovh/files/etc/issue.net
@@ -0,0 +1,10 @@
+===============================================================================
+
+ This is a private computer system. These resources, including all
+ related equipment, networks, and devices, are provided for authorized
+ use only. The system may be monitored for all lawful purposes. Evidence
+ of unauthorized use collected during monitoring may be used for criminal
+ prosecution by staff, legal counsel, and law enforcement agencies.
+
+===============================================================================
+
diff --git a/slack/prod/pfv/files/etc/issue b/slack/prod/pfv/files/etc/issue
new file mode 100644
index 0000000..a6e88dc
--- /dev/null
+++ b/slack/prod/pfv/files/etc/issue
@@ -0,0 +1,10 @@
+===============================================================================
+
+ This is a private computer system. These resources, including all
+ related equipment, networks, and devices, are provided for authorized
+ use only. The system may be monitored for all lawful purposes. Evidence
+ of unauthorized use collected during monitoring may be used for criminal
+ prosecution by staff, legal counsel, and law enforcement agencies.
+
+===============================================================================
+
diff --git a/slack/prod/pfv/files/etc/issue.net b/slack/prod/pfv/files/etc/issue.net
new file mode 100644
index 0000000..a6e88dc
--- /dev/null
+++ b/slack/prod/pfv/files/etc/issue.net
@@ -0,0 +1,10 @@
+===============================================================================
+
+ This is a private computer system. These resources, including all
+ related equipment, networks, and devices, are provided for authorized
+ use only. The system may be monitored for all lawful purposes. Evidence
+ of unauthorized use collected during monitoring may be used for criminal
+ prosecution by staff, legal counsel, and law enforcement agencies.
+
+===============================================================================
+
diff --git a/slack/prod/satx/files/etc/issue b/slack/prod/satx/files/etc/issue
new file mode 100644
index 0000000..a6e88dc
--- /dev/null
+++ b/slack/prod/satx/files/etc/issue
@@ -0,0 +1,10 @@
+===============================================================================
+
+ This is a private computer system. These resources, including all
+ related equipment, networks, and devices, are provided for authorized
+ use only. The system may be monitored for all lawful purposes. Evidence
+ of unauthorized use collected during monitoring may be used for criminal
+ prosecution by staff, legal counsel, and law enforcement agencies.
+
+===============================================================================
+
diff --git a/slack/prod/satx/files/etc/issue.net b/slack/prod/satx/files/etc/issue.net
new file mode 100644
index 0000000..a6e88dc
--- /dev/null
+++ b/slack/prod/satx/files/etc/issue.net
@@ -0,0 +1,10 @@
+===============================================================================
+
+ This is a private computer system. These resources, including all
+ related equipment, networks, and devices, are provided for authorized
+ use only. The system may be monitored for all lawful purposes. Evidence
+ of unauthorized use collected during monitoring may be used for criminal
+ prosecution by staff, legal counsel, and law enforcement agencies.
+
+===============================================================================
+