commit 8dfc2da813c684e9e0331545a18ec1375a92ae8b Author: (system) <(system)@rno1.home.arpa> Date: Fri May 16 00:00:03 2025 -0700 /usr/local/opnsense/scripts/OPNsense/AcmeClient/lecert.php made changes @ 2025-05-16T00:00:03.167700 ((system)) diff --git a/config.xml b/config.xml new file mode 100644 index 0000000..fddb909 --- /dev/null +++ b/config.xml @@ -0,0 +1,5929 @@ + + + opnsense-dark + + + vfs.read_max + + Increase UFS read-ahead speeds to match the state of hard drives and NCQ. + + + net.inet.ip.portrange.first + + Set the ephemeral port range to be lower. + + + net.inet.tcp.blackhole + + Drop packets to closed TCP ports without returning a RST + + + net.inet.udp.blackhole + + Do not send ICMP port unreachable messages for closed UDP ports + + + net.inet.ip.random_id + + Randomize the ID field in IP packets + + + net.inet.ip.sourceroute + + + Source routing is another way for an attacker to try to reach non-routable addresses behind your box. + It can also be used to probe for information about your internal networks. These functions come enabled + as part of the standard FreeBSD core system. + + + + net.inet.ip.accept_sourceroute + + + Source routing is another way for an attacker to try to reach non-routable addresses behind your box. + It can also be used to probe for information about your internal networks. These functions come enabled + as part of the standard FreeBSD core system. + + + + net.inet.icmp.log_redirect + + + This option turns off the logging of redirect packets because there is no limit and this could fill + up your logs consuming your whole hard drive. + + + + net.inet.tcp.drop_synfin + + Drop SYN-FIN packets (breaks RFC1379, but nobody uses it anyway) + + + net.inet6.ip6.redirect + + Enable sending IPv6 redirects + + + net.inet6.ip6.use_tempaddr + + Enable privacy settings for IPv6 (RFC 4941) + + + net.inet6.ip6.prefer_tempaddr + + Prefer privacy addresses and use them over the normal addresses + + + net.inet.tcp.syncookies + + Generate SYN cookies for outbound SYN-ACK packets + + + net.inet.tcp.recvspace + + Maximum incoming/outgoing TCP datagram size (receive) + + + net.inet.tcp.sendspace + + Maximum incoming/outgoing TCP datagram size (send) + + + net.inet.tcp.delayed_ack + + Do not delay ACK to try and piggyback it onto a data packet + + + net.inet.udp.maxdgram + + Maximum outgoing UDP datagram size + + + net.link.bridge.pfil_onlyip + + Handling of non-IP packets which are not passed to pfil (see if_bridge(4)) + + + net.link.bridge.pfil_local_phys + + Set to 1 to additionally filter on the physical interface for locally destined packets + + + net.link.bridge.pfil_member + + Set to 0 to disable filtering on the incoming and outgoing member interfaces. + + + net.link.bridge.pfil_bridge + + Set to 1 to enable filtering on the bridge interface + + + net.link.tap.user_open + + Allow unprivileged access to tap(4) device nodes + + + kern.randompid + + Randomize PID's (see src/sys/kern/kern_fork.c: sysctl_kern_randompid()) + + + hw.syscons.kbd_reboot + + Disable CTRL+ALT+Delete reboot from keyboard. + + + net.inet.tcp.log_debug + + Enable TCP extended debugging + + + net.inet.icmp.icmplim + + Set ICMP Limits + + + net.inet.tcp.tso + + TCP Offload Engine + + + net.inet.udp.checksum + + UDP Checksums + + + kern.ipc.maxsockbuf + + Maximum socket buffer size + + + vm.pmap.pti + 0 + Page Table Isolation (Meltdown mitigation, requires reboot.) + + + hw.ibrs_disable + 1 + Disable Indirect Branch Restricted Speculation (Spectre V2 mitigation) + + + security.bsd.see_other_gids + + Hide processes running as other groups + + + security.bsd.see_other_uids + + Hide processes running as other users + + + net.inet.ip.redirect + + Enable/disable sending of ICMP redirects in response to IP packets for which a better, + and for the sender directly reachable, route and next hop is known. + + + + net.local.dgram.maxdgram + + Maximum outgoing UDP datagram size + + + + conservative + rno1 + home.arpa + + 1999 + admins + system + System Administrators + page-all + 0,2000 + + + 0 + root + 0 + system + + c3NoLWVkMjU1MTkgQUFBQUMzTnphQzFsWkRJMU5URTVBQUFBSVB6eWRlMk1CTEhHVXBZUFpiMnl2V0dvNkV6VTBvei9WTklHVElNSXNDMWIga2Vu + + + $2y$11$r1zHIfGti8A0TV1wAj0Tq.6xeO2/iHv.vmQy3/AjUv1QkeWNZAv3C + + + + ken@blkdoor.com + + + + System Administrator + eyJvcHRpb25zIjpbXSwid2lkZ2V0cyI6W3siaWQiOiJzeXN0ZW1pbmZvcm1hdGlvbiIsIm1pblciOjIsIngiOjAsInkiOjAsImgiOjUxMiwid2lkZ2V0IjpbXSwidyI6Mn0seyJpZCI6Im1lbW9yeSIsIm1pblciOjEsIngiOjIsInkiOjAsImgiOjExMCwid2lkZ2V0IjpbXSwidyI6bnVsbH0seyJpZCI6ImRpc2siLCJtaW5XIjoxLCJ4IjozLCJ5IjowLCJoIjoxNjAsIndpZGdldCI6W10sInciOm51bGx9LHsiaWQiOiJpbnRlcmZhY2VzdGF0aXN0aWNzIiwibWluVyI6MiwieCI6NCwieSI6MCwidyI6NCwic2l6ZVRvQ29udGVudCI6NjUwLCJoIjoyODQsIndpZGdldCI6W119LHsiaWQiOiJ0cmFmZmljIiwibWluVyI6MiwieCI6OCwieSI6MCwidyI6NCwiaCI6NTk0LCJ3aWRnZXQiOnsiaW50ZXJmYWNlcyI6WyJsYW4iLCJ3YW4iXX19LHsiaWQiOiJnYXRld2F5cyIsIm1pblciOjIsIngiOjIsInkiOjE2MCwic2l6ZVRvQ29udGVudCI6NjUwLCJoIjoyOTYsIndpZGdldCI6eyJnYXRld2F5cyI6WyIwN2YyYjAwYy04OWFmLTQ1MmQtOGRiMy1hMzBlZDZlZmNhOTEiLCJMQU5fREhDUCIsIldBTl9ESENQNiJdfSwidyI6Mn0seyJpZCI6ImZpcmV3YWxsIiwibWluVyI6MiwieCI6NCwieSI6Mjg0LCJ3Ijo0LCJoIjoyODQsIndpZGdldCI6W119LHsiaWQiOiJjcHUiLCJtaW5XIjoyLCJ4IjowLCJ5Ijo1MTIsImgiOjE3OCwid2lkZ2V0Ijp7ImdyYXBocyI6WyJ0b3RhbCJdfSwidyI6Mn1dfQ== + + + 2000 + ken + 0 + user + + c3NoLWVkMjU1MTkgQUFBQUMzTnphQzFsWkRJMU5URTVBQUFBSVB6eWRlMk1CTEhHVXBZUFpiMnl2V0dvNkV6VTBvei9WTklHVElNSXNDMWIga2Vu + + /usr/local/bin/bash + $2y$11$pX.BHOUklN0PAGOyembxduWnMNGtEWLyYPiWNYYQ4/SfdQflhllZe + + + + ken@blkdoor.com + + + + Ken Johnson + eyJvcHRpb25zIjpbXSwid2lkZ2V0cyI6W3siaWQiOiJzeXN0ZW1pbmZvcm1hdGlvbiIsIm1pblciOjIsIngiOjAsInkiOjAsImgiOjUxMiwid2lkZ2V0IjpbXSwidyI6Mn0seyJpZCI6Im1lbW9yeSIsIm1pblciOjEsIngiOjIsInkiOjAsImgiOjExNywid2lkZ2V0IjpbXSwidyI6bnVsbH0seyJpZCI6ImRpc2siLCJtaW5XIjoxLCJ4IjozLCJ5IjowLCJoIjoxMTcsIndpZGdldCI6W10sInciOm51bGx9LHsiaWQiOiJpbnRlcmZhY2VzIiwibWluVyI6Miwic2l6ZVRvQ29udGVudCI6MzAyLCJ4Ijo0LCJ5IjowLCJ3Ijo0LCJoIjozMDIsIndpZGdldCI6W119LHsiaWQiOiJ0cmFmZmljIiwibWluVyI6MiwieCI6OCwieSI6MCwidyI6NCwiaCI6NDQ2LCJ3aWRnZXQiOnsiaW50ZXJmYWNlcyI6WyJsYW4iLCJvcHQzIiwib3B0NSIsIndhbiJdfX0seyJpZCI6ImdhdGV3YXlzIiwibWluVyI6MiwieCI6MiwieSI6MTE3LCJzaXplVG9Db250ZW50IjozMjgsImgiOjMyOCwid2lkZ2V0Ijp7ImdhdGV3YXlzIjpbImY0NzMyNzYyLTRiOTgtNDJmYS1hZGE4LTMzMTEzMjE4ODUzOSIsIjA3ZjJiMDBjLTg5YWYtNDUyZC04ZGIzLWEzMGVkNmVmY2E5MSIsImVjNzk4OTQ0LThhZGEtNGFiMC1iMzNiLWE5MTU4MGJmMjliNSJdfSwidyI6Mn0seyJpZCI6ImZpcmV3YWxsIiwibWluVyI6MiwieCI6NCwieSI6MzAyLCJ3Ijo0LCJoIjozMDIsIndpZGdldCI6W119LHsiaWQiOiJUYWlsc2NhbGUiLCJtaW5XIjoyLCJzaXplVG9Db250ZW50Ijo1MDksIngiOjIsInkiOjQ0NSwiaCI6NTA5LCJ3aWRnZXQiOltdLCJ3IjoyfSx7ImlkIjoiY3B1IiwibWluVyI6MiwieCI6MCwieSI6NTEyLCJoIjoxNzcsIndpZGdldCI6eyJncmFwaHMiOlsidG90YWwiXX0sInciOjJ9LHsiaWQiOiJXaXJlZ3VhcmQiLCJtaW5XIjoyLCJzaXplVG9Db250ZW50IjoxMjYsIngiOjQsInkiOjYwNCwiaCI6MTI2LCJ3aWRnZXQiOltdLCJ3IjoyfSx7ImlkIjoiaW50ZXJmYWNlc3RhdGlzdGljcyIsIm1pblciOjIsIngiOjYsInkiOjYwNCwic2l6ZVRvQ29udGVudCI6MTY4LCJoIjoxNjgsIndpZGdldCI6W10sInciOjJ9LHsiaWQiOiJ0aGVybWFsc2Vuc29ycyIsIm1pblciOjIsIngiOjAsInkiOjY4OSwiaCI6MTQ2LCJ3aWRnZXQiOnsic2Vuc29ycyI6W119LCJ3IjoyfV19 + + + 2001 + HomeAssistant + 0 + user + + + + + $2y$11$nAeFuOV8b7S4yZwOyFshy.LJvqqENW4MSHTr3gbsjdml3cxthcHWi + + + HomeAssistant Integation + + O7rmzwnJ55/R3d3IoePl8cC/CLVh83bTKz63cRwQ0GE26KkXdbLKSZ+FeoPZtQ6yUrR3Yqaqtn1OZlIz|$6$$.k6o..NDGhrS2R7UBk4OmfldJcy4f4GQJflJ.RQFfLFzIz6gQkMWzDzyrPOZtnZ50.l/vraPrYDC9xAQXCEzx1 + page-all,page-diagnostics-arptable,page-diagnostics-netflow + + Home Assistant + + + 2000 + 2000 + America/Los_Angeles + 0.us.pool.ntp.org 1.us.pool.ntp.org 2.us.pool.ntp.org 3.us.pool.ntp.org + + https + 67a9532677f13 + 10443 + + + 5 + 1 + Local Database + 1 + rno1.rail-city.net + 1 + + 1 + 1 + 1 + 1 + 1 + 1 + 1 + hadp + hadp + hadp + + weekly + + 1 + 1 + + admins + 1 + lan,opt3 + + + + + + + enabled + 1 + 1 + + -1 + -1 + + + 1 + ssh://gitea.coldsprings.dev:2222/kenjreno/OPNSenseBackup.git + main + -----BEGIN OPENSSH PRIVATE KEY----- +b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW +QyNTUxOQAAACC7cx3TjYZlayN5VeOZXD7Xhh0kl/3Hi6dJXc+PnssKLAAAAJgdsVzbHbFc +2wAAAAtzc2gtZWQyNTUxOQAAACC7cx3TjYZlayN5VeOZXD7Xhh0kl/3Hi6dJXc+PnssKLA +AAAECtYwZAx6u1ADbu+Vy3IQYHdDSQ2G2exBwQ2WPpOPpXsrtzHdONhmVrI3lV45lcPteG +HSSX/ceLp0ldz4+eywosAAAAFWdpdHVzZXJAb3Buc2VzZS5sb2NhbA== +-----END OPENSSH PRIVATE KEY----- + git + + + + 0 + https://railcloud.us + kenjreno + 6dEcp-dC5QR-JJJAd-pRbaf-2FbFi + + OPNsense-Backup + + + + https://mirror.sfo12.us.leaseweb.net/opnsense + + os-acme-client,os-dmidecode,os-frr,os-git-backup,os-haproxy,os-iperf,os-mdns-repeater,os-netdata,os-nextcloud-backup,os-node_exporter,os-qemu-guest-agent,os-rfc2136,os-tailscale + + + 0 + + en_US + 100.100.100.100 + 192.168.10.11 + + none + none + none + none + none + none + none + none + 115200 + video + 1 + admins + 10 + home.arpa + 1 + qat + 1 + 1 + + 67a9ff977c4fc + voucher + Captive Vouchers + + + + + yes + + + + + urgent + coretemp + + + + + + vtnet0 + Wan + 1 + 1 + + 71.83.99.150 + 29 + WAN_GW + dhcp6 + 0 + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + 1 + Loopback + 1 + lo0 + 127.0.0.1 + ::1 + 8 + 128 + none + 1 + + + vtnet2 + ETH3 + + + vtnet3 + ETH4 + + + vtnet1 + + 1 + 1 + + 9000 + 192.168.5.1 + 24 + fdcf:39d9:630d::1 + 48 + + + vlan00 + Servers + 1 + + 9000 + 192.168.10.1 + 24 + 2001:470:1f05:a::1 + 64 + + + vlan01 + Cameras + 1 + + 9000 + 192.168.3.1 + 24 + fd04:87b2:9345::1 + 48 + + + tailscale0 + Tailscale + 1 + + + + vlan02 + Phones + 1 + + 9000 + 192.168.2.1 + 24 + fd36:94be:70a6::1 + 48 + + + vlan03 + Christmas + 1 + + 9000 + 192.168.70.1 + 24 + fddb:45f0:de98::1 + 48 + + + 1 + 1 + + Trust + Trust + 1 + group + + + 1 + 1 + + Untrust + Untrust + 1 + group + + + gif0 + TunnelBroker + 1 + 1 + + + + Guest + vlan04 + + + IoT + vlan05 + + + vtnet4 + Kubernetes + 1 + + 9000 + 192.168.146.1 + 24 + fd00:146::1 + 64 + + + 1 + WireGuard (Group) + wireguard + 1 + 1 + group + + + + + + 1 + 7200 + 192.168.5.1 + home.arpa + home.arpa + hmac-md5 + + + 43 + string + "http://pbx.internal.rail-city.net:5000/provisioning/s6xyrhxwvxuzli9" + + + 66 + string + "http://pbx.internal.rail-city.net:5000/provisioning/s6xyrhxwvxuzli9" + + + 100 + text + PST8PDT,M3.2.0/2:00:00,M11.1.0/2:00:00 + + + 101 + text + America/Los_Angeles + + + 120 + ip-address + 192.168.5.48 + + + 160 + text + http://pbx.internal.rail-city.net:5000/provisioning/s6xyrhxwvxuzli9 + + + 2 + signed integer 32 + -28800 + + + + 192.168.5.50 + 192.168.5.229 + + + 192.168.5.1 + 192.168.5.1 + + 0c:c4:7a:36:5a:bc + gizmo-bnc + Supermicro IPMI - Gizmo + + + + + + 00:25:90:f3:5a:aa + 192.168.5.10 + zoey + Proxmox - Zoey + coldsprings.dev + coldsprings.dev + + + + + + 00:25:90:f2:19:68 + 192.168.5.12 + roxy + Proxmox - Roxy + coldsprings.dev + coldsprings.dev + + + + + + 0c:c4:7a:32:f9:20 + 192.168.5.14 + gizmo + Proxmox - Gizmo + coldsprings.dev + coldspring.dev + + + + + + 0c:c4:7a:95:c8:f6 + 192.168.5.16 + jonah + Proxmox - Jonah + coldsprings.dev + coldsprings.dev + + + + + + 0c:c4:7a:63:9a:b8 + 192.168.5.20 + lacey + Proxmox - Lacey/pve2 + coldsprings.dev + coldsprings.dev + + + + + + 00:0e:f3:2a:aa:50 + 192.168.5.21 + hub-2242 + Insteon Hub v1 + + + + + + a8:b8:e0:01:18:29 + 192.168.5.22 + foggy + Proxmox - Foggy + coldsprings.dev + coldsprings.dev + + + + + + 00:0e:f3:3c:a2:8f + 192.168.5.23 + hub-2245 + Insteon Hub v2 + + + + + + 0c:c4:7a:d3:54:2a + 192.168.5.24 + joe + Proxmox - Joe/pve1 + coldsprings.dev + coldsprings.dev + + + + + + d8:9e:f3:47:12:af + 192.168.5.26 + suzie + Proxmox - Suzie + coldsprings.dev + coldsprings.dev + + + + + + bc:24:11:9e:4b:e2 + 192.168.5.36 + pbs + Proxmox Backup Server + coldsprings.dev + coldsprings.dev + + + + + + bc:24:11:c1:27:60 + 192.168.5.48 + pbx + 3CX PBX + + + + + + bc:24:11:e9:44:9a + 192.168.5.49 + haos_5 + Home Assistant - Home Network + + + + + + bc:24:11:7a:a6:76 + 192.168.5.195 + ollama + + + + + + 0c:c4:7a:d5:6a:17 + 192.168.5.233 + joe_bnc + Supermicro IPMI - joe + + + + + + + 1 + xmascity.net + xmascity.net + hmac-md5 + + + + + 192.168.70.50 + 192.168.70.127 + + + + + + + 1 + hmac-md5 + + + + + 192.168.3.50 + 192.168.3.127 + + + + + + + 1 + hmac-md5 + + + + + 192.168.2.50 + 192.168.2.127 + + + + + + + 1 + coldsprings.dev + coldsprings.dev + hmac-md5 + + + + + 192.168.10.64 + 192.168.10.127 + + + 192.168.10.1 + 192.168.10.13 + + + bc:24:11:72:64:bb + 192.168.10.7 + filesvr + Truenas Scale File Server + + + + + + bc:24:11:2a:4e:d1 + 192.168.10.9 + dbsvr01 + Production MySQL Database + + + + + + bc:24:11:ae:d9:b4 + 192.168.10.11 + dc1 + Domain Controller 1 + + + + + + bc:24:11:28:ee:dc + 192.168.10.13 + dc2 + Domain Controller 2 + + + + + + bc:24:11:b1:9e:2b + 192.168.10.15 + lb1 + Load Balancer 1 + + + + + + bc:24:11:b1:9e:2c + 192.168.10.17 + lb2 + Load Balancer 2 + + + + + + bc:24:11:b1:9e:2d + 192.168.10.19 + lb3 + Load Balancer 3 + + + + + + bc:24:11:22:02:8b + 192.168.10.25 + mx + Mail Server + + + + + + 02:ff:60:27:9a:c0 + 192.168.10.26 + nextcloud + Railcloud/Nextcloud + coldsprings.dev + coldsprings.dev + + + + + + bc:24:11:5b:89:02 + 192.168.10.29 + dbnp01 + Non-Production MySQL Server + + + + + + bc:24:11:ae:ae:c9 + 192.168.10.30 + docker + Docker System + + + + + + bc:24:11:ee:08:22 + 192.168.10.31 + dbnp02 + NonProd MySQL Database 2 + + + + + + bc:24:11:27:a6:8d + 192.168.10.33 + dbnp03 + Non-Prod MySQL Database 3 + + + + + + bc:24:11:90:c3:e8 + 192.168.10.45 + emqx1 + Emqx MQTT Server 1 + + + + + + bc:24:11:b2:1a:9e + 192.168.10.57 + plexsvr + Plex Media Server + + + + + + bc:24:11:dc:35:76 + 192.168.10.130 + gitea + Gitea GIT Hosting + + + + + + bc:24:11:31:20:54 + 192.168.10.131 + pgsqlnp + Postgresql NonProd + + + + + + bc:24:11:7a:a6:76 + 192.168.10.195 + ollama + Ollama AI + + + + + + bc:24:11:48:28:01 + 192.168.10.241 + k8s-control-01 + Kubernetes Control 01 + + + + + + bc:24:11:48:28:02 + 192.168.10.242 + k8s-control-02 + Kubernetes Control 02 + + + + + + bc:24:11:48:28:03 + 192.168.10.243 + k8s-control-03 + Kubernetes Control 03 + + + + + + bc:24:11:48:29:01 + 192.168.10.244 + k8s-worker-01 + Kubernetes Worker 01 + + + + + + bc:24:11:48:29:02 + 192.168.10.245 + k8s-worker-02 + Kubernetes Worker 02 + + + + + + bc:24:11:48:29:03 + 192.168.10.246 + k8s-worker-03 + kubernetes Worker 03 + + + + + + bc:24:11:48:28:04 + 192.168.10.247 + talos-staging + Talos Staging System + + + + + + + + 1 + hmac-md5 + + + + + 192.168.146.50 + 192.168.146.240 + + + + + + bc:24:11:48:28:01 + 192.168.146.21 + k8s-control-01 + Kubernetes Controller 1 + + + + + + bc:24:11:48:28:02 + 192.168.146.23 + k8s-control-02 + Kubernetes Controller 2 + + + + + + bc:24:11:48:28:03 + 192.168.146.25 + k8s-control-03 + Kubernetes Controller 3 + + + + + + bc:24:11:48:29:01 + 192.168.146.51 + k8s-worker-01 + Kubernetes Worker 1 + + + + + + bc:24:11:48:29:02 + 192.168.146.53 + k8s-worker-02 + Kubernetes Worker 2 + + + + + + bc:24:11:48:29:03 + 192.168.146.55 + k8s-worker-03 + Kubernetes Worker 3 + + + + + + + + + + public + + + + hybrid + + + any + + +
192.168.7.0/24
+
+ Allow Lan -> Tailscale + + opt5 + + + + + inet + + kenjreno@192.168.5.122 + + /firewall_nat_out_edit.php made changes + + opt5ip + + + kenjreno@192.168.5.122 + + /firewall_nat_out_edit.php made changes + +
+ + + any + + +
100.64.0.0/10
+
+ Allow Server -> Tailscale + + opt5 + + + + + inet + + kenjreno@192.168.5.122 + + /firewall_nat_out_edit.php made changes + + opt5ip + + + kenjreno@192.168.5.122 + + /firewall_nat_out_edit.php made changes + +
+ + + 192.168.10.25/32 + + + 1 + + Forward Mailserver to .147 + + wan + + + + + inet + 71.83.99.147 + 1 + + + kenjreno@192.168.5.122 + + /firewall_nat_out_edit.php made changes + + + kenjreno@192.168.5.122 + + /firewall_nat_out_edit.php made changes + + + + + opt3 + + + 1 + + Redirect Servers Network to .146 + + wan + + + + + inet + + kenjreno@192.168.5.122 + + /firewall_nat_out_edit.php made changes + + 71.83.99.146 + 1 + + + kenjreno@192.168.5.122 + + /firewall_nat_out_edit.php made changes + + + + + any + + + 1 + + Allow Network Tailscale + + wan + + + + + inet + wanip + 1 + + udp + + kenjreno@192.168.5.122 + + /firewall_nat_out_edit.php made changes + + + kenjreno@192.168.5.122 + + /firewall_nat_out_edit.php made changes + + +
+ + tcp/udp + lan + + inet + Redirect DNS through Firewall + + + + nat_67ba16b66c8d54.75523749 + 127.0.0.1 + 53 + + 1 + + + lanip + 1 + 53 + + disable + + kenjreno@192.168.5.1 + + /firewall_nat_edit.php made changes + + + kenjreno@192.168.5.1 + + /firewall_nat_edit.php made changes + + + + tcp + wan + + inet + Allow Incoming eMail + + + + nat_67ad709fc3e844.04299527 + Host_Mailserver + Ports_eMail + + 1 + + +
71.83.99.147
+ Ports_eMail +
+ + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + + + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + +
+ + tcp/udp + wan + + inet + Allow Access to DNS + + + + nat_67ad70c9eb5df5.72660733 + Host_Docker + Ports_DNS + + 1 + + +
71.83.99.146
+ Ports_DNS +
+ + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + + + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + +
+ + tcp/udp + wan + + inet + Allow access to Websites + + + + nat_67ad70ef6b4af5.38110229 + Host_Docker + Ports_Websites + + 1 + + +
71.83.99.146
+ Ports_Websites +
+ + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + + + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + +
+ + tcp + wan + + inet + Allow access to MQTT + + + + nat_67ad71168ffc22.83998313 + Host_MQTT + Ports_MQTT + + 1 + + +
71.83.99.146
+ Ports_MQTT +
+ + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + + + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + +
+ + tcp + wan + + inet + Allow 3CX/PBX Admin + + + + nat_67ad718f3644f0.76381559 + 192.168.5.48 + 5001 + + 1 + + + wanip + 5001 + + + kenjreno@192.168.5.237 + + /firewall_nat_edit.php made changes + + + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + + + + udp + wan + + inet + Wireguard to HA + + + + nat_67ad71da0b9fd7.03700729 + 192.168.10.49 + 51830 + + 1 + + + wanip + 51830 + + + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + + + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + + + + tcp + wan + + inet + Allow SSH to Gitea + + + + nat_67ad720729fe94.53585994 + Host_Docker + 2222 + + 1 + + +
71.83.99.146
+ 2222 +
+ + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + + + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + +
+ + tcp + wan + + inet + Allow SSH to Filesvr + + + + nat_67ad72502b3fe2.67681864 + 192.168.10.7 + 22 + +
Net_AllowExternal
+ + +
71.83.99.146
+ 10007 +
+ + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + + + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + +
+ + tcp + wan + + inet + Allow SSH to Ansible + + + + nat_67ad728a17fd21.09599110 + 192.168.10.116 + 22 + +
Net_AllowExternal
+ + +
71.83.99.146
+ 10116 +
+ + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + + + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + +
+ + tcp + wan + + inet + Allow SSH to Ansible Too + + + + nat_67ad72c091c571.24304504 + 1 + 192.168.10.120 + 22 + +
Net_AllowExternal
+ + +
71.83.99.146
+ 10072 +
+ + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + + + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + +
+ + tcp + wan + + inet + Allow SSH to pve1 + + + + nat_67ad72fc43d419.05197582 + 1 + 192.168.10.122 + 22 + +
Net_AllowExternal
+ + +
71.83.99.146
+ 10122 +
+ + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + + + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + +
+ + tcp + wan + + inet + Allow Plex + + + + nat_67ad7333d67b29.89717724 + 192.168.10.57 + 32400 + + 1 + + +
71.83.99.146
+ 17758 +
+ + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + + + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + +
+ + tcp + wan + + inet + Allow Plex + + + + nat_67ad736c89baf8.57850463 + 192.168.5.102 + 32400 + + 1 + + + wanip + 26476 + + + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + + + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + + +
+ + + pass + wan + inet + keep state + Allow HE Tunnel Broker + in + 1 + igmp + +
66.220.2.74/32
+ + + 1 + + + kenjreno@192.168.5.122 + + /firewall_rules_edit.php made changes + + + kenjreno@192.168.5.122 + + /firewall_rules_edit.php made changes + +
+ + pass + nat_67ad709fc3e844.04299527 + + 1 + + wan + keep state + tcp + inet + +
Host_Mailserver
+ Ports_eMail +
+ Allow Incoming eMail + + + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + +
+ + pass + nat_67ad70c9eb5df5.72660733 + + 1 + + wan + keep state + tcp/udp + inet + +
Host_Docker
+ Ports_DNS +
+ Allow Access to DNS + + + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + +
+ + pass + nat_67ad71168ffc22.83998313 + + 1 + + wan + keep state + tcp + inet + +
Host_MQTT
+ Ports_MQTT +
+ Allow access to MQTT + + + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + +
+ + pass + nat_67ad70ef6b4af5.38110229 + + 1 + + wan + keep state + tcp/udp + inet + +
Host_Docker
+ Ports_Websites +
+ Allow access to Websites + + + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + +
+ + pass + wan + inet + keep state + Allow to HAProxy + in + 1 + tcp/udp + + 1 + + + wanip + Ports_Websites + + + ken@192.168.5.122 + + /firewall_rules_edit.php made changes + + + ken@192.168.5.122 + + /firewall_rules_edit.php made changes + + + + pass + wan + inet + keep state + Allow Wireguard Traffic + in + 1 + udp + + 1 + + + (self) + 51820-51821 + + + kenjreno@192.168.5.122 + + /firewall_rules_edit.php made changes + + + kenjreno@192.168.5.122 + + /firewall_rules_edit.php made changes + + + + pass + nat_67ad718f3644f0.76381559 + + 1 + + wan + keep state + tcp + inet + +
192.168.5.48
+ 5001 +
+ Allow 3CX/PBX Admin + + + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + +
+ + pass + nat_67ad71da0b9fd7.03700729 + + 1 + + wan + keep state + udp + inet + +
192.168.10.49
+ 51830 +
+ Wireguard to HA + + + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + +
+ + pass + nat_67ad720729fe94.53585994 + + 1 + + wan + keep state + tcp + inet + +
Host_Docker
+ 2222 +
+ Allow SSH to Gitea + + + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + +
+ + pass + nat_67ad72502b3fe2.67681864 + +
Net_AllowExternal
+ + wan + keep state + tcp + inet + +
192.168.10.7
+ 22 +
+ Allow SSH to Filesvr + + + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + +
+ + pass + nat_67ad728a17fd21.09599110 + +
Net_AllowExternal
+ + wan + keep state + tcp + inet + +
192.168.10.116
+ 22 +
+ Allow SSH to Ansible + + + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + +
+ + pass + nat_67ad72c091c571.24304504 + +
Net_AllowExternal
+ + wan + keep state + tcp + inet + +
192.168.10.120
+ 22 +
+ 1 + Allow SSH to Ansible Too + + + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + +
+ + pass + nat_67ad72fc43d419.05197582 + +
Net_AllowExternal
+ + wan + keep state + tcp + inet + +
192.168.10.122
+ 22 +
+ 1 + Allow SSH to pve1 + + + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + +
+ + pass + nat_67ad7333d67b29.89717724 + + 1 + + wan + keep state + tcp + inet + +
192.168.10.57
+ 32400 +
+ Allow Plex + + + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + +
+ + pass + nat_67ad736c89baf8.57850463 + + 1 + + wan + keep state + tcp + inet + +
192.168.5.102
+ 32400 +
+ Allow Plex + + + kenjreno@192.168.5.122 + + /firewall_nat_edit.php made changes + +
+ + pass + wan + inet + keep state + Allow Tailscale + in + 1 + udp + + 1 + + + 1 + + + ken@192.168.5.1 + + /firewall_rules_edit.php made changes + + + ken@192.168.5.1 + + /firewall_rules_edit.php made changes + + + + pass + inet + Default allow LAN to any rule + lan + + lan + + + + + + + pass + inet6 + Default allow LAN IPv6 to any rule + lan + + lan + + + + + + + pass + lan + inet + keep state + Allow to Server Network + in + 1 + + lan + + + opt3 + + + kenjreno@192.168.5.237 + + /firewall_rules_edit.php made changes + + + kenjreno@192.168.5.122 + + /firewall_rules_edit.php made changes + + + + pass + nat_67ba16b66c8d54.75523749 + + 1 + + lan + keep state + tcp/udp + inet + +
127.0.0.1
+ 53 +
+ Redirect DNS through Firewall + + + kenjreno@192.168.5.1 + + /firewall_nat_edit.php made changes + +
+ + pass + lan + inet + keep state + Allow MQTT Dashboard + in + 1 + tcp + + 1 + + + (self) + 18083 + + + ken@192.168.5.122 + + /firewall_rules_edit.php made changes + + + ken@192.168.5.122 + + /firewall_rules_edit.php made changes + + + + pass + opt3 + inet + keep state + Allow Servers -> LAN Network v4 + in + 1 + + opt3 + + + lan + + + kenjreno@192.168.5.122 + + /firewall_rules_edit.php made changes + + + kenjreno@192.168.5.122 + + /firewall_rules_edit.php made changes + + + + pass + opt3 + inet + keep state + Allow Servers to Any v4 + in + 1 + + opt3 + + + 1 + + + kenjreno@192.168.5.122 + + /firewall_rules_edit.php made changes + + + kenjreno@192.168.5.122 + + /firewall_rules_edit.php made changes + + + + pass + opt3 + inet6 + keep state + Allow IPv6 to Tunnel Broker + TUNNELBROKER_TUNNELV6 + in + 1 + + 1 + + + 1 + + + kenjreno@192.168.5.122 + + /firewall_rules_edit.php made changes + + + kenjreno@192.168.5.122 + + /firewall_rules_edit.php made changes + + + + pass + opt4 + inet + keep state + Allow DNS Access + in + 1 + tcp/udp + + opt4 + + + (self) + Ports_DNS + + + ken@192.168.5.122 + + /firewall_rules_edit.php made changes + + + ken@192.168.5.122 + + /firewall_rules_edit.php made changes + + + + pass + opt5 + inet + keep state + Allow Tailscale + in + 1 + + opt5 + + + 1 + + + kenjreno@192.168.5.223 + + /firewall_rules_edit.php made changes + + + kenjreno@192.168.5.223 + + /firewall_rules_edit.php made changes + + + + pass + opt7 + inet + keep state + Allow DNS Access + in + 1 + tcp/udp + + opt7 + + + (self) + Ports_DNS + + + ken@192.168.5.122 + + /firewall_rules_edit.php made changes + + + ken@192.168.5.122 + + /firewall_rules_edit.php made changes + + + + pass + opt8 + inet46 + keep state + Allow Tunnelbroker + in + 1 + + opt3 + + + 1 + + + kenjreno@192.168.5.122 + + /firewall_rules_edit.php made changes + + + kenjreno@192.168.5.122 + + /firewall_rules_edit.php made changes + + 1 + + + pass + opt11 + inet + keep state + Allow Servers to Any v4 + in + 1 + + opt11 + + + 1 + + + ken@192.168.5.122 + + /firewall_rules_edit.php made changes + + + ken@192.168.5.122 + + /firewall_rules_edit.php made changes + + + + block + opt11 + inet + keep state + Deny LAN/Server Access + in + 1 + + opt11 + + +
lan,opt3
+
+ + ken@192.168.5.122 + + /firewall_rules_edit.php made changes + + + ken@192.168.5.122 + + /firewall_rules_edit.php made changes + + 1 +
+ + pass + opt11 + inet + keep state + Allow Kubernetes to Any + in + 1 + + opt11 + + + 1 + + + ken@192.168.5.122 + + /firewall_rules_edit.php made changes + + + ken@192.168.5.122 + + /firewall_rules_edit.php made changes + + + + pass + opt11 + inet6 + keep state + Allow Kubernetes to Any + in + 1 + + opt11 + + + 1 + + + ken@192.168.5.122 + + /firewall_rules_edit.php made changes + + + ken@192.168.5.122 + + /firewall_rules_edit.php made changes + + +
+ + + + + 0.us.pool.ntp.org + on + + + (system) + /usr/local/opnsense/scripts/OPNsense/AcmeClient/lecert.php made changes + + + + + + 0 + WAN_GW + WAN Gateway + wan + inet + 71.83.99.145 + 1 + 0 + 0 + 0 + 1.1.1.1 + 0 + 255 + 1 + + + + + + + + + + + 0 + WAN_DHCP6 + Interface WAN_DHCP6 Gateway + wan + inet6 + + 1 + 0 + 0 + 0 + 2606:4700:4700::1111 + 0 + 254 + 1 + + + + + + + + + + + 0 + TailNet + + opt5 + inet + 100.124.217.85 + 0 + 0 + 1 + 0 + 100.100.100.100 + 0 + 255 + 1 + + + + + + + + + + + 0 + TUNNELBROKER_TUNNELV6 + Interface TUNNELBROKER_TUNNELV6 Gateway + opt8 + inet6 + + 0 + 0 + 0 + 0 + 2001:4860:4860::8888 + 0 + 250 + 1 + + + + + + + + + + + + + 0 + 0 + 0 + 1 + 0 + + + + + + + + + + + + 1 + 120 + 120 + smtp.rail-city.com + 587 + no-reply@coldsprings.dev + 91JVutYHdKsGMoT.q24c + 1 + auto + 1 + + + + + 0 + root + + 2812 + + + 5 + 1 + + + 1 + ken@blkdoor.com + 0 + + + + + + + 1 + $HOST + + system + + + + 300 + 30 +
+ + + + 25cdb1b0-d08d-466c-9dca-6e600270c781,bf58b664-8857-48b4-b90c-d6614d11902c,3f18dfca-35b0-46e3-916e-4d9f9514305d,0ba94dc4-6478-455c-b8b1-1b0450ef9354 + + + + + 1 + RootFs + + filesystem + + + / + 300 + 30 +
+ + + + 0e9ba43e-ec98-4077-b642-1fa069e54ea7 + + + + + 0 + carp_status_change + + custom + + + /usr/local/opnsense/scripts/OPNsense/Monit/carp_status + 300 + 30 +
+ + + + e2656eba-4fbd-426a-a6cb-a5f268a0521f + + + + + 0 + gateway_alert + + custom + + + /usr/local/opnsense/scripts/OPNsense/Monit/gateway_alert + 300 + 30 +
+ + + + 59ce17ee-a315-49de-8d6e-134fd9ba7913 + + + + + Ping + NetworkPing + failed ping + alert + + + + NetworkLink + NetworkInterface + failed link + alert + + + + NetworkSaturation + NetworkInterface + saturation is greater than 75% + alert + + + + MemoryUsage + SystemResource + memory usage is greater than 75% + alert + + + + CPUUsage + SystemResource + cpu usage is greater than 75% + alert + + + + LoadAvg1 + SystemResource + loadavg (1min) is greater than 4 + alert + + + + LoadAvg5 + SystemResource + loadavg (5min) is greater than 3 + alert + + + + LoadAvg15 + SystemResource + loadavg (15min) is greater than 2 + alert + + + + SpaceUsage + SpaceUsage + space usage is greater than 75% + alert + + + + ChangedStatus + ProgramStatus + changed status + alert + + + + NonZeroStatus + ProgramStatus + status != 0 + alert + + + + + + 1 + 127.0.0.1 + 19999 + + + + + lan,opt1,opt2,wan + + v9 + + + + 0 + + 1800 + 15 + + + + + + + + https://download.maxmind.com/app/geoip_download?edition_id=GeoLite2-Country-CSV&license_key=2I5sILOXRtFxiGIG&suffix=zip + + + + 1 + Host_Docker + host + + + + 0 + + 192.168.10.30 + + + + + Docker Host + + + 1 + Host_Mailserver + host + + + + 0 + + 192.168.10.25 +2001:470:1f05:a::19 + + + + + Mail Server + + + 1 + Host_MQTT + host + + + + 0 + + 192.168.5.45 + + + + + MQTT Host + + + 1 + Net_AllowExternal + network + + + + 0 + + 71.83.99.145/29 +167.154.0.0/16 + + + + + Allow External Networks + + + 1 + RFC1918 + network + + + + 0 + + 192.168.0.0/16 +172.16.0.0/12 +10.0.0.0/8 + + + + + Local Subnets + + + 1 + Ports_eMail + port + + + + 0 + + 25 +465 +587 +143 +995 +110 +993 +4190 + + + + + Mail Ports + + + 1 + Ports_MQTT + port + + + + 0 + + 8883 +8084 + + + + + MQTT Secure Ports + + + 1 + Ports_Websites + port + + + + 0 + + 80 +443 + + + + + Allow access Websites + + + 1 + Ports_DNS + port + + + + 0 + + 53 +853 + + + + + Allow Access to DNS + + + + + + + + + + + + + + + + 0 + + + + + + + + + + + 1 + TravelRouter + vita5XJUJiADjeUy2tL8nXoJaYtBy22D4FFEGTUQaAY= + + 192.168.5.0/24,192.168.10.0/24 + + + 25 + + + + + 1 + + + + + 1 + roadwarrior + 0 + 6B5oRTErX9I7n1U/wtI5vuT/XD7wEb6tE11ga0EFUBM= + qDqz9Up+GrkdyA7Z/gN9OFkd2NYBAaCRCt2WBI8kj0s= + 51820 + + + + 0 + + + b4a304b1-860c-4888-a69d-94f3156e3247 + + + + + + + + 0 + 0 + lan + + + + + 1 + lan,opt3,opt5 + + + + + + + + + abuse.ch.sslblacklist.rules + 1 + + + abuse.ch.sslipblacklist.rules + 1 + + + abuse.ch.urlhaus.rules + 1 + + + + + 0 + 0 + 0 + wan + 192.168.0.0/16,10.0.0.0/8,172.16.0.0/12 + + + W0D23 + 4 + + + + + + + 0 + 0 + 0 + + + + 0 + 0 + + + + 0 + 0 + 0 + + + + + + + + + 0 + 127.0.0.1 + 8000 + + + + + 0 + opt4,lan + 4000 + 1 + raw + + + 0 + + 2 + + + + 192.168.5.0/24 + + 1 + + 192.168.5.159 + home.arpa + 192.168.5.159 + 192.168.5.1 + home.arpa + 192.168.5.159 + 192.168.5.1 + + + + 1 + 192.168.5.50 - 192.168.5.229 + Home + + + 192.168.3.0/24 + + 1 + + + camera + + + camera + + 192.168.3.1 + + + + 1 + 192.168.3.50 - 192.168.3.100 + Cameras + + + + + 4ac08e5c-0a9c-487e-8ef1-0ea444448e77 + 192.168.5.10 + 00:25:90:f3:5a:aa + zoey + Proxmox - Zoey + + + 4ac08e5c-0a9c-487e-8ef1-0ea444448e77 + 192.168.5.12 + 00:25:90:F2:19:68 + roxy + Proxmox - Roxy + + + 4ac08e5c-0a9c-487e-8ef1-0ea444448e77 + 192.168.5.14 + 0C:C4:7A:32:F9:20 + gizmo + Proxmox - Gizmo + + + 4ac08e5c-0a9c-487e-8ef1-0ea444448e77 + 192.168.5.49 + BC:24:11:E9:44:9A + haos_5 + Home Assistant - Home Net + + + 4ac08e5c-0a9c-487e-8ef1-0ea444448e77 + 192.168.5.48 + BC:24:11:C1:27:60 + pbx + 3CX PBX + + + 4ac08e5c-0a9c-487e-8ef1-0ea444448e77 + 192.168.5.16 + 0C:C4:7A:95:C8:F6 + jonah + Proxmox - Jonah + + + 4ac08e5c-0a9c-487e-8ef1-0ea444448e77 + 192.168.5.24 + 1C:87:2C:41:19:5F + joe + Proxmox - Joe/pve1 + + + 4ac08e5c-0a9c-487e-8ef1-0ea444448e77 + 192.168.5.26 + D8:9E:F3:47:12:AF + suzie + Proxmox - Suzie + + + 4ac08e5c-0a9c-487e-8ef1-0ea444448e77 + 192.168.5.20 + 0C:C4:7A:63:9A:B8 + lacey + Proxmox - Lacey/pve2 + + + + + + + 0 + 0 + + 4000 + 1 + + + 0 + + 2 + + + + + + + + + + 1 + 1 + 31 + + + + + + + + + + + + + + + + + 0 + 0 + + + + + + + 16 + 32 + 4 + 1000 + 1 + 0 + 0 + + + + + + + + + 1 + 0 + 1 + 1 + 1 + 1 + 1 + 1 + 1 + 1 + 1 + 1 + 1 + 1 + 1 + 1 + 1 + 1 + 1 + 1 + + + + + + + + + + + 0 + + + + + + + 0 + 0 + + + ipsec + 0 + 1 + + + + + + + + + 0 + + + + + 1 + 10 + 41641 + 1 + 1 + + 1 + 0 + 0 + + + 192.168.5.0/24 + Home + + + 192.168.10.0/24 + Coldsprings + + + + + https://headscale.rail-city.net + a9a6571c76c60a47c3613ea57be273536691de956beaa64d + + + + + + + + + + + AcmeClient + 1 + 0 + 0 + * + * + * + root + acmeclient cron-auto-renew + + AcmeClient Cronjob for Certificate AutoRenewal + + + cron + 1 + 0 + */2 + * + * + * + root + system remote backup + + Backup Configurations Remotely + + + cron + 1 + 0 + 3 + * + * + 4 + root + zfs scrub + zroot + Scrub ZFS + + + cron + 1 + 42 + 2 + * + * + 3 + root + syslog archive + + Rotate Logs + + + cron + 1 + 24 + 1 + * + * + * + root + firmware poll + + Firmwarwe Check + + + cron + 1 + 0 + 0 + 3 + * + * + root + ids update + + Update Intrusion Rules + + + cron + 1 + 32 + 5 + * + * + * + root + zfs trim + zroot + Daily ZFS Trim + + + + + + + + + + 1 + 0 + + + + + + 1 + 53 + 1 + opt4,opt7,opt11,lan,opt3 + 1 + 0 + + 0 + 1 + home.arpa + 1 + 0 + 0 + 0 + 0 + transparent + + 0 + + + 1 + 1 + 0 + 0 + 1 + 1 + 0 + + + 0 + + 0 + 0 + 0 + 0 + 0 + 0 + 0 + 1 + 0 + + 0.0.0.0/8,10.0.0.0/8,100.64.0.0/10,169.254.0.0/16,172.16.0.0/12,192.0.2.0/24,192.168.0.0/16,198.18.0.0/15,198.51.100.0/24,203.0.113.0/24,233.252.0.0/24,::1/128,2001:db8::/32,fc00::/8,fd00::/8,fe80::/10 + + + + + + + + + + + + + + 0 + + + + + allow + + + 0 + + + + + + +
+ + + + + + + + + 0 + + mariruth.com + A + + + + 192.168.10.30 + Mariruth's Site + + + 1 + filesvr + coldsprings.dev + A + + + + 192.168.10.7 + TrueNAS Scale File Server + + + 1 + pbs + coldsprings.dev + A + + + + 192.168.5.36 + Proxmox Backup Server + + + 1 + zoey + coldsprings.dev + A + + + + 192.168.5.10 + + + + 1 + roxy + coldsprings.dev + A + + + + 192.168.5.12 + + + + 1 + gizmo + coldsprings.dev + A + + + + 192.168.5.14 + + + + 1 + jonah + coldasprings.dev + A + + + + 192.168.5.16 + + + + 1 + lacey + coldsprings.dev + A + + + + 192.168.5.20 + + + + 1 + pve1 + coldsprings.dev + A + + + + 192.168.5.24 + + + + 1 + foggy + coldsprings.dev + A + + + + 192.168.5.22 + + + + 1 + susie + coldsprings.dev + A + + + + 192.168.5.26 + + + + 1 + rooney + coldsprings.dev + A + + + + 192.168.7.28 + + + + 1 + misty + coldsprings.dev + A + + + + 192.168.7.30 + + + + 1 + mqtt + coldsprings.dev + A + + + + 192.168.10.49 + + + + 1 + docker + coldsprings.dev + A + + + + 192.168.10.30 + Docker Server + + + 1 + fw + coldsprings.dev + A + + + + 192.168.10.1 + Main Firewall + + + 1 + dbnp + coldsprings.dev + A + + + + 192.168.10.29 + NonProd MySQL Server + + + 1 + dbsvr + coldsprings.dev + A + + + + 192.168.10.9 + Production MySQL Server + + + 1 + kube + coldsprings.dev + A + + + + 192.168.10.240 + KubeCtl Channel + + + 1 + office + coldsprings.dev + A + + + + 192.168.10.30 + Collabora Office + + + 1 + haos + coldsprings.dev + A + + + + 192.168.10.49 + Home Assistant + + + + + 1 + 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 + adminer + coldsprings.dev + + + + 1 + 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 + ca + coldsprings.dev + Smallstep-ca + + + 1 + 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 + frigate + coldsprings.dev + Frigate + + + 1 + 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 + gitlab + coldsprings.dev + + + + 1 + 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 + graylog + coldsprings.dev + + + + 1 + 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 + heimdall + coldsprings.dev + + + + 1 + 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 + homarr + coldsprings.dev + + + + 1 + 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 + jellyfin + coldsprings.dev + + + + 1 + 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 + portainer + coldsprings.dev + + + + 1 + 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 + postfixadmin + coldsprings.dev + + + + 1 + 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 + pwm + coldsprings.dev + + + + 1 + 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 + signallapi + coldsprings.dev + + + + 1 + 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 + sonarr + coldsprings.dev + + + + 1 + 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 + tautulli + coldsprings.dev + + + + 1 + 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 + traefik + coldsprings.dev + + + + 1 + 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 + unifi + coldsprings.dev + + + + + + + + + + + + + + + + + + + + 1 + 1 + b4879549-d595-47bb-bcff-7ec158b94b84 + + 43580 + 43581 + 600 + 0 + + + + + normal + 0 + + + + 67a951a8c761b1.57922271 + 1 + LEProduction + Let's Encrypt Production + letsencrypt@blkdoor.com + letsencrypt + + + + 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 + 200 + 1739149868 + + + 67a95223cb8428.09564898 + 1 + LEStaging + Let's Encrypt Staging/Dev + letsencrypt@blkdoor.com + letsencrypt_test + + + + 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 + 200 + 1739149871 + + + + + 67a95302cb4297.16727540 + 1 + rno1.rail-city.net + Firewall Certificate + rno1.rail-city.net + 5f44d980-1238-4f71-b092-29340ef2a5be + 8200f583-9c30-40ab-ac16-8bc3afdcf99b + key_ec384 + 0 + 9fabe4b7-2d20-437d-94f3-c10d74eabcf1 + 1 + 60 + none + + + 67a9532677f13 + 1739150118 + 400 + 1747378803 + + + + + 67a952c254adc9.13558747 + 1 + PowerDNS + PowerDNS + dns01 + opnsense + 1 + + + 1 + + acme + 1 + + + dns_pdns + 0 + + + + + + + + + + + + + + + + + + + + + + + + + + + + 1 + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + 1 + + + + + + + + + + cloudflare + + + + + + https://api.loopia.se/RPCSERV + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + localhost + 443 + + + 0 + + + + + + + + http://192.168.10.30L8081 + localhost + 61beccca-d8ea-4e90-817e-8d00e39ca10c + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + plain + + + + + + + + + + + + + + + + + + + + + + + https://identity.xxxx.conoha.io/v2.0 + + + + + + + + + + + + + + + + + + 67a9517633ce87.60895539 + 1 + Restart UI + Restart Main GUI + configd_restart_gui + + + 22 + + + + + + + + + + + + + 22 + + + + + + + 5000 + http + + + 1 + + + + + + + + + + root + + 8006 + + pam + acme + + + localhost + http + /usr/local/share/java/unifi/data/keystore + + acme + + 1 + + + 67ab79845c74d1.92930317 + 1 + Truenas + Truenas Certificate + acme_truenas + + + 22 + + + + + + + + + + + + + 22 + + + + + + + 5000 + http + + + 1 + + + + + + + + + + root + + 8006 + + pam + acme + + 4-iDLtqiAJ9FCcRiAUcP8rQEUZN3C7HMbhn3GNXHvRfyWdtL33j2s5CHNlpdP7Zedg + filesvr.coldsprings.dev + https + /usr/local/share/java/unifi/data/keystore + + acme + + 1 + + + 67c9c18f4b8be4.95405282 + 1 + Restart HAProxy + Restart HA Proxy Service + configd_restart_haproxy + + + 22 + + + + + + + + + + + + + 22 + + + + + + + 5000 + http + + + 1 + + + + + + + + + + root + + 8006 + + pam + acme + + + localhost + http + /usr/local/share/java/unifi/data/keystore + + acme + + 1 + + + + + + 1 + 0 + 60s + + 0 + 0 + 1 + + 0 + + + 1024 + + + 1024 + + + 0 + 10000 + 2 + ipv4 + ignore + 4096 + 16384 + 2 + 0 + 0 + + 1 + 300 + 3600 + 0 + prefer-client-ciphers + TLSv1.2 + + ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256 + TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256 + + + + + + + + + 5000 + + 30s + 30s + + 30s + 3 + x-1 + last,libc + + + + 127.0.0.1 + local0 + info + + + + 0 + 8822 + 0 + + 0 + + + + + 0 + *:8404 + /metrics + + + 0 + 4 + 60 + + 0 + 10 + + + + + 67c9c7cfae0537.22699204 + 1 + mqtt_dash + MQTT Dashboard + :::10883 + v4v6 + tcp + b56fd730-8f4a-4933-99f7-5ece70443734 + 0 + + + + 0 + prefer-client-ciphers + TLSv1.2 + + ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256 + TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256 + 1 + 0 + 0 + 15768000 + 0 + required + + + 0 + + + + + + + + + 0 + 0 + 0 + 1 + 0 + + + 30m + 50k + 1 + src + + 10s + 10s + 10s + 10s + 1m + 1m + 1 + 0 + h2,http11 + 0 + 0 + /metrics + http-keep-alive + + + + + + 67c9cd163cb977.31510049 + 1 + 0_SNI_frontend + + 0.0.0.0:80,0.0.0.0:443,:::80,:::443 + + tcp + bf4d621e-f303-4b1e-b660-71f07898730c + 0 + + + + 0 + prefer-client-ciphers + TLSv1.2 + + ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256 + TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256 + 1 + 0 + 0 + 15768000 + 0 + required + + + 0 + + + + + + + + + 0 + 0 + 0 + 0 + 0 + + + 30m + 50k + 1 + src + + 10s + 10s + 10s + 10s + 1m + 1m + 1 + 0 + h2,http11 + 0 + 0 + /metrics + http-keep-alive + + + + + + 67c9cdea2935c6.74211283 + 1 + 1_HTTP_Frontend + Listening on 127.4.4.3:80 + 127.4.4.3:80 + accept-proxy + http + + 0 + + + + 0 + prefer-client-ciphers + TLSv1.2 + + ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256 + TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256 + 1 + 0 + 0 + 15768000 + 0 + required + + + 0 + + + + + + + + + 0 + 0 + 0 + 1 + 0 + + + 30m + 50k + 1 + src + + 10s + 10s + 10s + 10s + 1m + 1m + 1 + 0 + h2,http11 + 1 + 0 + /metrics + http-keep-alive + + + + + + 67c9cea5a4e142.46234307 + 1 + 2_HTTPS_Frontend + Listening on 127.4.4.3:443 + 127.4.4.3:443 + + ssl + + 0 + + + + 0 + prefer-client-ciphers + TLSv1.2 + + ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256 + TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256 + 1 + 0 + 0 + 15768000 + 0 + required + + + 0 + + + + + + + + + 0 + 0 + 0 + 0 + 0 + + + 30m + 50k + 1 + src + + 10s + 10s + 10s + 10s + 1m + 1m + 1 + 0 + h2,http11 + 0 + 0 + /metrics + http-keep-alive + + + + + + + + 67c9c596bad770.68727244 + 1 + SSL_Backend + + tcp + source + 2 + v2 + 65308d3f-beec-408d-a75e-e8a86c02cc6a + + + + + + 1 + + 0 + + + + + + 1 + 0 + h2,http11 + 0 + 0 + + sticktable + piggyback + SRVCOOKIE + 1 + sourceipv4 + + 30m + 50k + + + 10s + 10s + 10s + 10s + 1m + 1m + 0 + + + + + + + + + 0 + safe + 0 + + + + + 67c9c943394440.48769844 + 1 + mqtt_dash + MQTT Dashboard + tcp + roundrobin + 2 + v2 + cb1b28f0-517c-4d04-99f5-c9f49efc627d,64bb4436-e2dd-4b89-93de-140ac4f35a99 + + + + + + 1 + + 0 + + + + + + 1 + 0 + h2,http11 + 0 + 0 + + + piggyback + SRVCOOKIE + 1 + + + 30m + 50k + + + 10s + 10s + 10s + 10s + 1m + 1m + 0 + + + + + + + + + 0 + safe + 0 + + + + + + + 67c9c457c79ad0.65486417 + 1 + SSL_Server + HAProxy SSL Server +
127.4.4.3
+ + + active + unspecified + static + + + + + + 0 + + 1 + + + + + + + + + + +
+ + 67c9c4c3beb918.76884432 + 1 + Plex + Plex Media Server +
192.168.10.62
+ 32400 + + active + unspecified + static + + + + + + 1 + + 0 + + + + + + + + + + +
+ + 67c9c8fbb7bed8.88824111 + 1 + emqx1 + Emqx MQTT Server 1 +
emqx1.coldsprings.dev
+ + + active + unspecified + static + + + + + + 0 + + 0 + + + + + + + + + + +
+ + 67c9c90ee8d4a5.84419299 + 1 + emqx2 + Emqx MQTT Server 2 +
emqx1.coldsprings.dev
+ + + active + unspecified + static + + + + + + 0 + + 0 + + + + + + + + + + +
+
+ + + + 67c9c5e274c9e8.61708609 + NoSSL_Condition + Traffic is not SSL encrypted + ssl_fc + 1 + 0 + + + + + + + + + + + + + + + + + + + + + + + + + + x1 + + gt + + gt + + gt + + gt + + gt + + gt + + gt + + gt + + gt + + gt + + gt + + gt + + gt + + gt + + + + + + + + + + + + + + + + + + + + HTTPtoHTTPS + Upgrade HTTP to HTTPS + if + 32e47da6-cd80-4475-ae74-4cf0987e0063 + and + use_backend + bf4d621e-f303-4b1e-b660-71f07898730c + + + + + + + + + + + + + + + + + + txn + + + + + + + + + + + + + + + txn + + + + + + + + + + + + + + + + + + + + + + + + 67c9c659adf036.29665209 + Public_Subdomain_Mapfile + Public subdomains to Backend Mapping + # public access subdomains +plex PLEX_backend + + + + + + + + + + 0 + + 0 + + 0 + + 0 + + + +
+ + 0 + 0.0.0.0 + 9100 + 1 + 1 + 1 + 1 + 1 + 1 + + 1 + 0 + 1 + 1 + + + + 0 + + + + 0 + 0 + + 0 + 0 + + + + + + + + 1 + Migrated route redistribution (bgp) + connected + + + + + + 0 + + + 1 + Metallb +
192.168.10.240
+ 0 +
+
+
+ + 0 + 0 + + + 0 + 0 + 0 + + + + + + + + + 1 + Migrated route redistribution (bgp) + connected + + + + + + 0 + 64512 + + + 0 + 1 + 1 + 192.168.10.0/24 + + + 1 + MetalLB +
192.168.10.230
+ + 64513 + + + + opt3 + + 1 + 0 + 0 + 0 + 0 + 0 + 1 + + + + 0 + 0 + + 0 + + + + + + +
+ + 1 + k8s-Control-01 +
192.168.10.241
+ + 64513 + + + + opt3 + + 1 + 0 + 0 + 0 + 0 + 0 + 1 + + + + 0 + 0 + + 0 + + + + + + +
+ + 1 + k8s-Control-02 +
192.168.10.242
+ + 64513 + + + + opt3 + + 1 + 0 + 0 + 0 + 0 + 0 + 1 + + + + 0 + 0 + + 0 + + + + + + +
+ + 1 + k8s-Control-03 +
192.168.10.243
+ + 64513 + + + + opt3 + + 1 + 0 + 0 + 0 + 0 + 0 + 1 + + + + 0 + 0 + + 0 + + + + + + +
+ + 1 + k8s-Worker-01 +
192.168.10.244
+ + 64513 + + + + opt3 + + 1 + 0 + 0 + 0 + 0 + 0 + 1 + + + + 0 + 0 + + 0 + + + + + + +
+ + 1 + k8s-Worker-02 +
192.168.10.245
+ + 64513 + + + + opt3 + + 1 + 0 + 0 + 0 + 0 + 0 + 1 + + + + 0 + 0 + + 0 + + + + + + +
+ + 1 + k8s-Worker-03 +
192.168.10.246
+ + 64513 + + + + opt3 + + 1 + 0 + 0 + 0 + 0 + 0 + 1 + + + + 0 + 0 + + 0 + + + + + + +
+
+ + + + + + + + 1 + Migrated route redistribution (bgp) + connected + + + +
+ + 0 + 2 + + + + + + + 1 + traditional + 0 + 1 + 0 + notifications + 1 + +
+ + + + + + 1 + ag + + + + + + + + 1 + coldsprings.dev + 192.168.10.11 + + + + + + + + 0 + 0.0.0.0:5353 + 1 + 250 + 1 + 0 + 1 + 1 + 0 + 1 + 0 + 0 + + 2500 + 30 + 240 + 0 + 0 + 1.1.1.1:53 + 0 + 1 + 512 + 600 + 86400 + 60 + 600 + + 1 + + + + + + + + + + + vtnet1 + 10 + 0 + + Servers + vlan00 + + + vtnet1 + 3 + 4 + + Cameras + vlan01 + + + vtnet1 + 2 + 5 + + Phones + vlan02 + + + vtnet1 + 70 + 0 + + Christmas + vlan03 + + + vtnet1 + 30 + 0 + + Guest + vlan04 + + + vtnet1 + 40 + 0 + + IoT + vlan05 + + + vtnet1 + 146 + 0 + + Kubernetes Cluster + vlan06 + + + + + wan + ipalias + 71.83.99.148 + 29 + + 0 + 0 + + + 1 + 0 + + + 0 + 71-83-99-148-Spectrum + + + wan + ipalias + 71.83.99.149 + 29 + + 0 + 0 + + + 1 + 0 + + + 0 + 71-83-99-149-Spectrum + + + wan + ipalias + 71.83.99.146 + 29 + + 0 + 0 + + + 1 + 0 + + + 0 + 71-83-99-146-Spectrum + + + wan + ipalias + 71.83.99.147 + 29 + + 0 + 0 + + + 1 + 0 + + + 0 + 71-83-99-147-Spectrum + + + lo0 + ipalias + 127.4.4.3 + 32 + + 0 + 0 + + + 1 + 0 + + + 0 + HAProxy SSL Server + + + + + + + + wan + + gif0 + 72.52.104.74 + 2001:470:1f04:a::2 + 2001:470:1f04:a::1 + 64 + Tunnel Broker + 0 + 0 + + + + + Trust + lan,opt3 + 0 + 0 + Zone for Trusted Networks + + + Untrust + wan,opt4 + 0 + 0 + Zone for Untrusted Networks + + + + + + + + 0 + 0 + + + 1400 + + 0 + + + + + + + + + + + + + + + 67a9532676509 + E6 (ACME Client) + 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 + + + + + + 67a9feb38e684 + Dynaip Root CA + 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 + + + + + + 67a9fee03f391 + Dynaip Intermediate CA + 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 + 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 + + 67a9feb38e684 + + + + hmac-md5 + + fdcf:39d9:630d:284b::0 + fdcf:39d9:630d:284b:ffff:ffff:ffff:ffff + + + + + 48 + + + + + + + + + hmac-md5 + + fd36:94be:70a6:32a4::0 + fd36:94be:70a6:32a4:ffff:ffff:ffff:ffff + + + + + 48 + + + + + + + + + hmac-md5 + + fd93:1100:2856:1234::1000:0 + fd93:1100:2856:1234::1fff:ffff + + + + + 64 + + + + + + + assist + medium + 200 + 600 + + + + + + 67a9532677f13 + rno1.rail-city.net (ACME Client) + 67a9532676509 + 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 + + LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1JR2tBZ0VCQkRCYWFXN011MmpOTCtjQndXZnArbXNKMW1QVzNQaVpldHFBYlE1NVdLeklnMU1LR2NETDJiUm4KNjB2SFhkT2FJYXlnQndZRks0RUVBQ0toWkFOaUFBVG84cmtGdGRXRDVnTU9ZQ0xIbm90SmVlR08rc3JTV1VIVwpycysrNy9iaEptSnFLTnhoblhGRW85TzJMM3ZxakorR3E4bmdzOVFJaTM3eXNJcFJ5UVo4M09aUEhabnUxZW9zCi9zbWtESmVxdDBqL0w1OHNpS0VsdldISkYwOERIa3M9Ci0tLS0tRU5EIEVDIFBSSVZBVEUgS0VZLS0tLS0K + + + + 0 + 1 + 1 + 1 + 1 + 0 + 1 + 0 + 0 + 0 + 1 + + lan + + + + + + 0 + 0 + + + 0 + + + 0 + 1 + + 0 + 0 + + 1 + +