opnsense Disable the pf ftp proxy handler. debug.pfftpproxy default Increase UFS read-ahead speeds to match current state of hard drives and NCQ. More information here: http://ivoras.sharanet.org/blog/tree/2010-11-19.ufs-read-ahead.html vfs.read_max default Set the ephemeral port range to be lower. net.inet.ip.portrange.first default Drop packets to closed TCP ports without returning a RST net.inet.tcp.blackhole default Do not send ICMP port unreachable messages for closed UDP ports net.inet.udp.blackhole default Randomize the ID field in IP packets (default is 0: sequential IP IDs) net.inet.ip.random_id default Source routing is another way for an attacker to try to reach non-routable addresses behind your box. It can also be used to probe for information about your internal networks. These functions come enabled as part of the standard FreeBSD core system. net.inet.ip.sourceroute default Source routing is another way for an attacker to try to reach non-routable addresses behind your box. It can also be used to probe for information about your internal networks. These functions come enabled as part of the standard FreeBSD core system. net.inet.ip.accept_sourceroute default Redirect attacks are the purposeful mass-issuing of ICMP type 5 packets. In a normal network, redirects to the end stations should not be required. This option enables the NIC to drop all inbound ICMP redirect packets without returning a response. net.inet.icmp.drop_redirect default This option turns off the logging of redirect packets because there is no limit and this could fill up your logs consuming your whole hard drive. net.inet.icmp.log_redirect default Drop SYN-FIN packets (breaks RFC1379, but nobody uses it anyway) net.inet.tcp.drop_synfin default Enable sending IPv4 redirects net.inet.ip.redirect default Enable sending IPv6 redirects net.inet6.ip6.redirect default Enable privacy settings for IPv6 (RFC 4941) net.inet6.ip6.use_tempaddr default Prefer privacy addresses and use them over the normal addresses net.inet6.ip6.prefer_tempaddr default Generate SYN cookies for outbound SYN-ACK packets net.inet.tcp.syncookies default Maximum incoming/outgoing TCP datagram size (receive) net.inet.tcp.recvspace default Maximum incoming/outgoing TCP datagram size (send) net.inet.tcp.sendspace default Do not delay ACK to try and piggyback it onto a data packet net.inet.tcp.delayed_ack default Maximum outgoing UDP datagram size net.inet.udp.maxdgram default Handling of non-IP packets which are not passed to pfil (see if_bridge(4)) net.link.bridge.pfil_onlyip default Set to 0 to disable filtering on the incoming and outgoing member interfaces. net.link.bridge.pfil_member default Set to 1 to enable filtering on the bridge interface net.link.bridge.pfil_bridge default Allow unprivileged access to tap(4) device nodes net.link.tap.user_open default Randomize PID's (see src/sys/kern/kern_fork.c: sysctl_kern_randompid()) kern.randompid default Maximum size of the IP input queue net.inet.ip.intr_queue_maxlen default Disable CTRL+ALT+Delete reboot from keyboard. hw.syscons.kbd_reboot default Enable TCP extended debugging net.inet.tcp.log_debug default Set ICMP Limits net.inet.icmp.icmplim default TCP Offload Engine net.inet.tcp.tso default UDP Checksums net.inet.udp.checksum default Maximum socket buffer size kern.ipc.maxsockbuf default normal pfv-core-rtr01 pfv.turnsys.net admins System Administrators system 1999 0 user-shell-access page-all root System Administrator system admins $2b$10$aGhrQyAdjqqWt4Rz/2nzi.EVhxDEgehnX5uVUbmC87.DGogM0Op6O 0 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 2000 2000 America/Chicago 300 0.nl.pool.ntp.org https 5a16ea4a3fdf7 yes 1 1 1 1 1 hadp hadp hadp monthly 60 aesni en_US 8.8.8.8 2 115200 video 1 enabled 1 1 none none none none none none none none em0_vlan30 ProductionManagement 1 10.251.30.252 24 ue0 1 dhcp dhcp6 on 32 em0_vlan200 Nerdbone 1 10.251.200.252 24 em0_vlan100 TheNerdery 1 10.251.100.252 24 1 1 openvpn OpenVPN group 1 em0_vlan22 LabManagement 1 10.251.22.252 24 em0_vlan3 RRAP 1 10.251.3.252 24 em0_vlan4 RRSW 1 10.251.4.252 24 em0_vlan5 RRVOIP 1 10.251.5.252 24 em0_vlan6 RRRTRLan 1 10.251.6.252 24 em0_vlan7 RRIPTV 1 10.251.7.252 24 1 10.251.30.10 10.251.30.245 1 10.251.100.100 10.251.100.200 10.251.30.71 1 1 1 1 1 1 1 1 kn3lmgmt 161 PFV 162 lan 1 50 10.253.3.99 ipv4 1 1 automatic pass opt1 inet keep state Allow TheNerdery full access out yes yes opt1 1 root@10.251.100.101 /firewall_rules_edit.php made changes root@10.251.100.101 /firewall_rules_edit.php made changes pass inet Default allow LAN to any rule lan lan pass inet6 Default allow LAN IPv6 to any rule lan lan pass openvpn inet keep state tcp
192.168.198.1/30
192.168.198.2/30
179
root@10.251.100.100 /firewall_rules_edit.php made changes root@10.251.100.100 /firewall_rules_edit.php made changes
pass openvpn inet keep state allow road warrior full access pass
172.16.80.0/24
1 root@10.251.100.101 /firewall_rules_edit.php made changes root@10.251.100.101 /firewall_rules_edit.php made changes
pass openvpn inet keep state allow toolbox full access (librenms etc)
10.253.3.99
1 root@10.251.100.101 /firewall_rules_edit.php made changes root@10.251.100.101 /firewall_rules_edit.php made changes
pass openvpn inet keep state allow satx workstation net access
10.40.50.0/24
1 root@10.251.100.101 /firewall_rules_edit.php made changes root@10.251.100.101 /firewall_rules_edit.php made changes
pass opt1 inet keep state Default allow LAN to any rule opt1 1 root@10.251.30.10 /firewall_rules_edit.php made changes root@10.251.30.10 /firewall_rules_edit.php made changes pass opt3 inet keep state allow pfv-consrv outbound access
10.251.22.3
1 root@10.251.100.101 /firewall_rules_edit.php made changes root@10.251.100.101 /firewall_rules_edit.php made changes
pass opt3 inet keep state allow pfv-octopi outbound access
10.251.22.23
1 root@10.251.100.101 /firewall_rules_edit.php made changes root@10.251.100.101 /firewall_rules_edit.php made changes
ICMP icmp ICMP TCP tcp Generic TCP HTTP http Generic HTTP / 200 HTTPS https Generic HTTPS / 200 SMTP send Generic SMTP 220 * system_information-container:00000000-col3:show,services_status-container:00000001-col4:show,gateways-container:00000002-col4:show,interface_list-container:00000003-col4:show 2 root@10.40.50.77 /system_usermanager.php made changes 0 0 0 wan 192.168.0.0/16,10.0.0.0/8,172.16.0.0/12 W0D23 4 ac 0 0 1 1 0 on strip 1 0 admin@localhost.local localhost 0 /var/squid/cache 256 100 16 256 0 2048 1024 1024 256 lan 3128 3129 0 0 4 5 2121 0 1 0 80:http,21:ftp,443:https,70:gopher,210:wais,1025-65535:unregistered ports,280:http-mgmt,488:gss-http,591:filemaker,777:multiling http 443:https 0 icap://[::1]:1344/avscan icap://[::1]:1344/avscan 1 0 0 X-Username 1 1024 60 OPNsense proxy authentication 2 5 1 64524 10.251.0.0/16,192.168.198.0/30 1
192.168.198.1
64517 openvpn 0 0
1 0 debugging 0 notifications
0 0 1 10 100 30 20 0 0 0 1 1 0 1 0 1 1 1 1 1 1 1 0 100M 25M 16 10000 0 database.clamav.net 60 lan,wan,opt2,opt1,openvpn,opt3,opt4,opt5,opt6,opt7,opt8 wan v9 0
5a16ea4a3fdf7 Web GUI SSL certificate LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUZiekNDQTFlZ0F3SUJBZ0lKQUlMTmRkUi9XWUp6TUEwR0NTcUdTSWIzRFFFQkN3VUFNRTR4Q3pBSkJnTlYKQkFZVEFrNU1NUlV3RXdZRFZRUUlEQXhhZFdsa0xVaHZiR3hoYm1ReEZUQVRCZ05WQkFjTURFMXBaR1JsYkdoaApjbTVwY3pFUk1BOEdBMVVFQ2d3SVQxQk9jMlZ1YzJVd0hoY05NVGN4TVRJek1UVXpNek0zV2hjTk1UZ3hNVEl6Ck1UVXpNek0zV2pCT01Rc3dDUVlEVlFRR0V3Sk9UREVWTUJNR0ExVUVDQXdNV25WcFpDMUliMnhzWVc1a01SVXcKRXdZRFZRUUhEQXhOYVdSa1pXeG9ZWEp1YVhNeEVUQVBCZ05WQkFvTUNFOVFUbk5sYm5ObE1JSUNJakFOQmdrcQpoa2lHOXcwQkFRRUZBQU9DQWc4QU1JSUNDZ0tDQWdFQXpFOXUzblNNSkkyemxuL2dVS3dRY2JmQTQ3RjlvU28wClRFbDhMQ2EyVEtuUC9QQXZScnkxMCtsYXQzOXJVNHV5MnB4MmhpNklNU1lkNnp1dG9yVkpMM2tjajU0NC9OVXEKVyszNE5LRnpBNjQ3a3RPN0pTanByRnVwTHZoMjNPc0hkTUkyalV3UDRQaVQva08wdHBOT3JCTlBkSkhpVXdmQgpCdzNVbXl6Tk1xOFZseS9MVXRoWFphVUxnbCs1U2FsWHFQaGpJdktRcTZHODJPaWZFNWRYSGdJQ1UrWFZ0OXgvCmFjQ1BDaUwveVlmUlgvR2tDdk1qSjljdDlOY3FSRURZU0hDS2FHVnNtaFMrUzlIM1J3Y0djMDAxQi9KaldaeHEKZnJRQ1RVV1RrVHVNNitTQW9ZY0xsUFpUZ3lvc0xaL0RvRHV3bHpDL1hJVG5sQ01SNnQ1Uy9sV0lYREw5Zmc4VQptMnZqRkpPK0NLWlRjc3lxaHY5TTFXT0lpbEl0a2ZlQzZzNzgvN3JMaC9GaEsxMzZGM3V6dktoTnlldEJBRXZUCnpiNDlQUC9MZG0zbU5ubkViSS91V2ttMmE2Z2hHZWhNQVA5V1ZLZGtBK2w4ZWlveVAweWNSV3R5bVExYk1sZUkKRWxGMVJlcHhLMWFkQ0xxSTJyVEJRam90T3JFeVJYSGsrbnByU1dyTWRXcHRGa3o5c0Z4TE0ySEVRbXcxTThCZgppeEVIUlhwNFhrR2MyUmhaNlZqNXB0dGJBdlFQcmEzUG1PZWhka2UzQjBsMDhTZVhiNHF3M3NHUERYRHZqYzdTCnhYWHdiMVc4RDJXVUU5b0xrcS90b2xjV3NLZHdhWlJFU2xlTDlsNEEwWkp3a3ErNEsvK0c2aVZRQ1VJSjRRdE4KOE9MT2pCT1JVdjhDQXdFQUFhTlFNRTR3SFFZRFZSME9CQllFRkswVzdoZ1l6aG1IWG15eDhUNGVxaVQ3L1FGdwpNQjhHQTFVZEl3UVlNQmFBRkswVzdoZ1l6aG1IWG15eDhUNGVxaVQ3L1FGd01Bd0dBMVVkRXdRRk1BTUJBZjh3CkRRWUpLb1pJaHZjTkFRRUxCUUFEZ2dJQkFGM3g0UW1LamZNbXArWm1OZXo5S3ZEb1ZSMlpnNTd0WkJha2RRdFMKcUN0V3kyRGV1M1Qya00wbWNtSzRwZ1VsaG9FT2t6dmlqVkZ5SGI5UDlQc0pHUG1pUUp5QTRjelR0Q0lmakNIbApic2RyWjRudEdnWmVWZmZEdFNiYU9LdkpubFZtZUQxcGJ0UmtNSHdKTmRCWTZtbUZFTUJkOGxMZ09IMndlNXNQCjZMZnRaLzBMTDdSdXg5aEI1d1dzaitqdjgvdWhGMnJUZ0dZRi9oMjQ1OFl1bzdyVk5wYjNZSEo4enpyZ09aOWUKeWo5bGh2Zk5YUXk4clBQaXJmNWxscWk3RFBKVStGVzdCL2Y3NmlsbmxLdkEvZDdOUHRDL3lNUlk2eDJoN3krdgptUVhtYUUzUzRUcEFtcmh5M3NabFBubWpSQ1hId1lSRHlGT3ZWZUt0UzFUbExyNDlieTYrNWdzcjJvWXlmTUwrCjVkeFdBQ2ppb280dk8xcWI4NjVOUmhjMU9lWm1GZVZtYmRRQmFOc24wNkJUWjNVczBBbU15UStVSkdIc0xxeTIKQ2I5YmlWTmJWZG10M3ZTa3lVdzN5c3N5RU1jQmdMTXdkU0NaeHo3bDVlbjZBLzhoTjBreHR1OGh0clpWRkRTNAo2dHd5WXdOc2hZUStwTFpialMrVUpOeWY1YlNrMVZQeWlaOCtiSUNqMFZPbEVNSk9acG91UFVrS0ZOa0JzY0oxCk81bG1CNGtFUVNORlUzWHJlanA2bGFncDIxUTgxWE5ZZUFYZ21yNnVmSlNRZ3Y3TXJBem0xYnIvY2dvQkM1UVkKUzNEZXhsOUdGZklIWlRHS05Ubm9ka21SaFhOemNtN2Q5QlF1ZnpRZ21QbjdqZE9FNXpGY0s2ckordk1Hb3l3cgphTnIvCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K 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 em0 30 0 Production Management em0_vlan30 em0 100 0 TheNerdery em0_vlan100 em0 22 0 Lab Management em0_vlan22 em0 200 0 Nerdbone em0_vlan200 em0 3 0 RR-AP em0_vlan3 em0 4 0 RR-Sw em0_vlan4 em0 5 0 RR-Voip em0_vlan5 em0 6 0 RR-RtrLan em0_vlan6 em0 7 0 RR-IPTV em0_vlan7 em0 8 0 RR-PeanutGallery1 em0_vlan8 em0 9 0 RR-Malzoo em0_vlan9 em0 10 0 RR-Fstack1 em0_vlan10 em0 11 0 RR-RtrWan em0_vlan11 TCP tun 158.69.183.162 1199 none tsys corp vpn - ovh p2p_shared_key AES-128-CBC SHA1 none 192.168.198.0/30 no 1 wan 1 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 single 24 carp lan .30 float 10.251.30.254 1 0 1 carpyo single 24 carp opt1 .100 float 10.251.100.254 2 0 1 carpyo single 24 carp opt3 .22 float 10.251.22.254 3 0 1 carpyo single 24 carp opt2 nerdbone float 10.251.200.254 4 0 1 123