commit 65325530393f6fc26f9b6588386ec76f19ac9633 Author: System Administrator Date: Thu Feb 6 21:32:41 2025 +0100 /diag_backup.php machte Änderungen @ 2025-02-06T21:32:40.966800 (root@192.168.50.82) diff --git a/config.xml b/config.xml new file mode 100644 index 0000000..4c02905 --- /dev/null +++ b/config.xml @@ -0,0 +1,1800 @@ + + + opnsense + + + Increase UFS read-ahead speeds to match the state of hard drives and NCQ. + vfs.read_max + default + + + Set the ephemeral port range to be lower. + net.inet.ip.portrange.first + default + + + Drop packets to closed TCP ports without returning a RST + net.inet.tcp.blackhole + default + + + Do not send ICMP port unreachable messages for closed UDP ports + net.inet.udp.blackhole + default + + + Randomize the ID field in IP packets + net.inet.ip.random_id + default + + + + Source routing is another way for an attacker to try to reach non-routable addresses behind your box. + It can also be used to probe for information about your internal networks. These functions come enabled + as part of the standard FreeBSD core system. + + net.inet.ip.sourceroute + default + + + + Source routing is another way for an attacker to try to reach non-routable addresses behind your box. + It can also be used to probe for information about your internal networks. These functions come enabled + as part of the standard FreeBSD core system. + + net.inet.ip.accept_sourceroute + default + + + + This option turns off the logging of redirect packets because there is no limit and this could fill + up your logs consuming your whole hard drive. + + net.inet.icmp.log_redirect + default + + + Drop SYN-FIN packets (breaks RFC1379, but nobody uses it anyway) + net.inet.tcp.drop_synfin + default + + + Enable sending IPv6 redirects + net.inet6.ip6.redirect + default + + + Enable privacy settings for IPv6 (RFC 4941) + net.inet6.ip6.use_tempaddr + default + + + Prefer privacy addresses and use them over the normal addresses + net.inet6.ip6.prefer_tempaddr + default + + + Generate SYN cookies for outbound SYN-ACK packets + net.inet.tcp.syncookies + default + + + Maximum incoming/outgoing TCP datagram size (receive) + net.inet.tcp.recvspace + default + + + Maximum incoming/outgoing TCP datagram size (send) + net.inet.tcp.sendspace + default + + + Do not delay ACK to try and piggyback it onto a data packet + net.inet.tcp.delayed_ack + default + + + Maximum outgoing UDP datagram size + net.inet.udp.maxdgram + default + + + Handling of non-IP packets which are not passed to pfil (see if_bridge(4)) + net.link.bridge.pfil_onlyip + default + + + Set to 1 to additionally filter on the physical interface for locally destined packets + net.link.bridge.pfil_local_phys + default + + + Set to 0 to disable filtering on the incoming and outgoing member interfaces. + net.link.bridge.pfil_member + default + + + Set to 1 to enable filtering on the bridge interface + net.link.bridge.pfil_bridge + default + + + Allow unprivileged access to tap(4) device nodes + net.link.tap.user_open + default + + + Randomize PID's (see src/sys/kern/kern_fork.c: sysctl_kern_randompid()) + kern.randompid + default + + + Disable CTRL+ALT+Delete reboot from keyboard. + hw.syscons.kbd_reboot + default + + + Enable TCP extended debugging + net.inet.tcp.log_debug + default + + + Set ICMP Limits + net.inet.icmp.icmplim + default + + + TCP Offload Engine + net.inet.tcp.tso + default + + + UDP Checksums + net.inet.udp.checksum + default + + + Maximum socket buffer size + kern.ipc.maxsockbuf + default + + + Page Table Isolation (Meltdown mitigation, requires reboot.) + vm.pmap.pti + default + + + Disable Indirect Branch Restricted Speculation (Spectre V2 mitigation) + hw.ibrs_disable + default + + + Hide processes running as other groups + security.bsd.see_other_gids + default + + + Hide processes running as other users + security.bsd.see_other_uids + default + + + Enable/disable sending of ICMP redirects in response to IP packets for which a better, + and for the sender directly reachable, route and next hop is known. + + net.inet.ip.redirect + default + + + + Redirect attacks are the purposeful mass-issuing of ICMP type 5 packets. In a normal network, redirects + to the end stations should not be required. This option enables the NIC to drop all inbound ICMP redirect + packets without returning a response. + + net.inet.icmp.drop_redirect + 1 + + + Maximum outgoing UDP datagram size + net.local.dgram.maxdgram + default + + + + normal + OPNsense + localdomain + 1 + + admins + System Administrators + system + 1999 + 0 + page-all + + + root + System Administrator + system + admins + $2y$11$F5yOtLTn8aI21fKZTdsnueJjedH0PXTTPpD89Ha6ps3VfC/Ixgojq + 0 + + 2000 + 2000 + Europe/Berlin + 0.opnsense.pool.ntp.org 1.opnsense.pool.ntp.org 2.opnsense.pool.ntp.org 3.opnsense.pool.ntp.org + + https + 65fda728512c3 + + + + + + yes + 1 + 1 + 1 + 1 + 1 + 1 + hadp + hadp + hadp + + monthly + + 1 + 1 + + admins + 1 + + + + + + + + -1 + -1 + + + + os-git-backup + + + + + de_DE + 115200 + serial + video + + + + + urgent + 1 + + + none + none + none + none + none + none + none + none + + 1 + + + 1 + https://git.steini12.ddnss.de/steini/Opnsense.git + main + + steini + $teini1972@git + + + + + + igc0 + WAN + 1 + + dhcp + + + 32 + + + + + + + + SavedCfg + + + + + + + + + + 1 + igc3 + 192.168.1.1 + 24 + track6 + 64 + + + wan + 0 + LAN + + + 1 + Loopback + 1 + lo0 + 127.0.0.1 + ::1 + 8 + 128 + none + 1 + + + igc1 + WAN2 + 1 + + dhcp + + + 32 + + + + + + + + SavedCfg + + + + + + + + + + igc2 + LAN2 + 1 + + 192.168.201.1 + 24 + + + vlan0.10 + Buero + 1 + 1 + + 192.168.10.1 + 24 + + + vlan0.50 + Steini + 1 + + 192.168.50.1 + 24 + + + vlan0.2 + Bruecke + 1 + + 10.10.10.1 + 24 + + + wg0 + MobileClients + 1 + + 1300 + + + 1 + WireGuard (Gruppe) + wireguard + 1 + 1 + group + + + + + + + + 192.168.1.10 + 192.168.1.245 + + + + 1 + hmac-md5 + + + + + 192.168.10.10 + 192.168.10.200 + + + + + + + 1 + hmac-md5 + + + + + 192.168.50.20 + 192.168.50.200 + + + + + + + 1 + hmac-md5 + + + + + 10.10.10.2 + 10.10.10.100 + + + + + + 00:f4:21:68:3f:71 + 10.10.10.6 + OPNsense + + + + + + + 1 + hmac-md5 + + + + + 192.168.201.10 + 192.168.201.100 + + + + + + + + + + public + + + + hybrid + + + any + + + 1 + + + + opt5 + + + + + inet + + 0 + + + root@192.168.50.82 + + /firewall_nat_out_edit.php made changes + + + root@192.168.50.82 + + /firewall_nat_out_edit.php made changes + + 1 + + + + wireguard + + + 1 + + + + wan + + + + + inet + + 0 + + + root@192.168.50.82 + + /firewall_nat_out_edit.php made changes + + + root@192.168.50.82 + + /firewall_nat_out_edit.php made changes + + 1 + + + + tcp + wan + + inet + + + + + nat_66096249452fb6.41739810 + 192.168.50.101 + Server_Keller + + 1 + + + wanip + Server_Keller + + + root@192.168.50.82 + + /firewall_nat_edit.php made changes + + + root@192.168.50.82 + + /firewall_nat_edit.php made changes + + + + udp + wan + + inet + + + + + nat_66201a35577007.13363244 + 192.168.50.101 + WG_UDP + + 1 + + + wanip + WG_UDP + + + root@192.168.50.82 + + /firewall_nat_edit.php made changes + + + root@192.168.50.82 + + /firewall_nat_edit.php made changes + + + + + + nat_66096249452fb6.41739810 + + 1 + + wan + keep state + tcp + inet + +
192.168.50.101
+ Server_Keller +
+ + + + root@192.168.50.82 + + /firewall_nat_edit.php made changes + +
+ + pass + wan + inet + keep state + in + 1 + + 1 + + + 1 + + + root@192.168.1.100 + + /firewall_rules_edit.php made changes + + + root@192.168.1.100 + + /firewall_rules_edit.php made changes + + 1 + + + pass + wan + inet + keep state + in + 1 + udp + + 1 + + + wanip + 51888 + + + root@192.168.50.82 + + /firewall_rules_edit.php made changes + + + root@192.168.50.82 + + /firewall_rules_edit.php made changes + + 1 + + + nat_66201a35577007.13363244 + + 1 + + wan + keep state + udp + inet + +
192.168.50.101
+ WG_UDP +
+ + + + root@192.168.50.82 + + /firewall_nat_edit.php made changes + +
+ + pass + inet + Default allow LAN to any rule + lan + + lan + + + + + + + pass + inet6 + Default allow LAN IPv6 to any rule + lan + + lan + + + + + + + pass + opt2 + inet + keep state + in + 1 + + 1 + + + 1 + + + root@192.168.1.100 + + /firewall_rules_edit.php made changes + + + root@192.168.1.100 + + /firewall_rules_edit.php made changes + + + + pass + opt3 + inet + keep state + in + 1 + + 1 + + + 1 + + + root@192.168.1.100 + + /firewall_rules_edit.php made changes + + + root@192.168.1.100 + + /firewall_rules_edit.php made changes + + 1 + + + pass + opt4 + inet + keep state + in + 1 + + opt4 + + + (self) + + + root@192.168.50.82 + + /firewall_rules_edit.php made changes + + + root@192.168.50.82 + + /firewall_rules_edit.php made changes + + 1 + + + pass + opt4 + inet + keep state + WAN2_DHCP + in + 1 + +
192.168.50.82
+ + +
RF
+ 1 +
+ + root@192.168.50.82 + + /firewall_rules_edit.php made changes + + + root@192.168.50.82 + + /firewall_rules_edit.php made changes + +
+ + pass + opt4 + inet + keep state + in + 1 + + 1 + + + 1 + + + root@192.168.1.100 + + /firewall_rules_edit.php made changes + + + root@192.168.1.100 + + /firewall_rules_edit.php made changes + + 1 + + + reject + opt5 + inet + keep state + in + 1 + + opt3 + + + 1 + + + root@10.10.10.6 + + /firewall_rules_edit.php made changes + + + root@10.10.10.6 + + /firewall_rules_edit.php made changes + + + + pass + opt5 + inet + keep state + in + 1 + + 1 + + + 1 + + + root@192.168.50.82 + + /firewall_rules_edit.php made changes + + + root@192.168.50.82 + + /firewall_rules_edit.php made changes + + + + pass + opt6 + inet + keep state + in + 1 + + 1 + + + 1 + + + root@192.168.50.82 + + /firewall_rules_edit.php made changes + + + root@192.168.50.82 + + /firewall_rules_edit.php made changes + + 1 + +
+ + + + + + ICMP + icmp + ICMP + + + + TCP + tcp + Generic TCP + + + + HTTP + http + Generic HTTP + + / + + 200 + + + + HTTPS + https + Generic HTTPS + + / + + 200 + + + + SMTP + send + Generic SMTP + + + 220 * + + + + + 0.opnsense.pool.ntp.org + + + traffic_graphs-container:00000000-col3:show,system_information-container:00000001-col3:show,services_status-container:00000002-col4:hide,gateways-container:00000003-col4:show,interface_list-container:00000004-col4:show,thermal_sensors-container:00000005-col4:show,wireguard-container:00000006-col4:show,interface_statistics-container:00000007-col4:show + 2 + wan,opt1 + opt2 + + + root@192.168.50.82 + /diag_backup.php machte Änderungen + + + + + + + + 1 + Iphone + KtQnq1p3Q/cpILxq7NRBosj0de8wORBCDElewYoNc18= + + 10.9.0.2/32 + + + 25 + + + 1 + Sven + CL1zITckQCuVysIx7aC/xnF5Q3Q6nVbm1xy+klx102g= + + 10.9.0.3/32 + + + + + + 1 + sven + WSxVOBWE29aKCqrmkSz5bK3OGjn+vfrZ+Dfzw8Ub/DM= + + 10.9.0.4/32 + + + + + + + + 1 + + + + + 1 + MobileClients + 0 + TT+xJplbhdJ+p+QcyOxhnSBNgxm8gCIoT8NTeMt0EwU= + MOQxv6uu6PJOoDHXgQD7Jfgs1XTn8QUJ6u8KKtw6dlQ= + 51888 + + + 10.9.0.1/24 + 0 + + + de8b1c52-da7f-4997-b560-ba1e41def08f,f2cec977-08ca-4d6d-ab6a-abb636da2777,552f0a94-2027-4b89-9560-e10b4f041f23 + steini12.ddnss.de:51888 + 192.168.50.1 + + + + + + + + 0 + 0 + + + + + 16 + 32 + 4 + 1000 + 1 + + + + + + + + 1 + 0 + 1 + 1 + 1 + 1 + 1 + 1 + 1 + 1 + 1 + 1 + 1 + 1 + 1 + 1 + 1 + 1 + 1 + 1 + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + cron + 1 + 0 + 2 + * + * + * + root + firmware poll + + Firmware Update check + + + cron + 1 + 15 + 2 + * + * + 6 + root + firmware auto-update + + Firmwareupdate + + + + + + + + + + + + + + 1 + Server_Keller + port + + + 0 + + 80 +443 + + Server_Keller + + + 1 + WG_UDP + port + + + 0 + + 51820 + + WG_UDP + + + 1 + RF + network + + + 0 + + 192.168.50.0/24 +192.168.10.0/24 +192.168.0.0/24 + + + + + + + + + + + + + + + + + + + + v9 + + + + 0 + + 1800 + 15 + + + + + + + + + 0 + 0 + 0 + wan + 192.168.0.0/16,10.0.0.0/8,172.16.0.0/12 + + + W0D23 + 4 + + + + + + + 0 + 0 + 0 + + + + 0 + 0 + + + + 0 + 0 + 0 + + + + + + + + + + + + + + 0 + 127.0.0.1 + 8000 + + + + + 0 + + 4000 + 1 + raw + + + 0 + + 2 + + + + + + + + + 0 + 120 + 120 + 127.0.0.1 + 25 + + + 0 + auto + 1 + + + + + 0 + root + Es1qpnWtrF33up9r7pewpRdSj + 2812 + + + 5 + 1 + + + 0 + root@localhost.local + 0 + + + + + + + 1 + $HOST + + system + + + + 300 + 30 +
+ + + + 118792c7-270e-4c39-ab7f-14478485217c,b6402613-1e49-4ff7-86dd-e8444a248070,79ee91db-84b0-48fa-9a9c-5578c914a301,0d968211-9492-498e-9452-c6c27f4c7468 + + + + + 1 + RootFs + + filesystem + + + / + 300 + 30 +
+ + + + e5d81bf1-1a2d-4f88-9ba0-123ae0a8651f + + + + + 0 + carp_status_change + + custom + + + /usr/local/opnsense/scripts/OPNsense/Monit/carp_status + 300 + 30 +
+ + + + 8bddf11e-a9eb-41b2-92ab-8c038cc9adaa + + + + + 0 + gateway_alert + + custom + + + /usr/local/opnsense/scripts/OPNsense/Monit/gateway_alert + 300 + 30 +
+ + + + 267d77f9-0124-499f-b80e-166c23b6ff54 + + + + + Ping + NetworkPing + failed ping + alert + + + + NetworkLink + NetworkInterface + failed link + alert + + + + NetworkSaturation + NetworkInterface + saturation is greater than 75% + alert + + + + MemoryUsage + SystemResource + memory usage is greater than 75% + alert + + + + CPUUsage + SystemResource + cpu usage is greater than 75% + alert + + + + LoadAvg1 + SystemResource + loadavg (1min) is greater than 8 + alert + + + + LoadAvg5 + SystemResource + loadavg (5min) is greater than 6 + alert + + + + LoadAvg15 + SystemResource + loadavg (15min) is greater than 4 + alert + + + + SpaceUsage + SpaceUsage + space usage is greater than 75% + alert + + + + ChangedStatus + ProgramStatus + changed status + alert + + + + NonZeroStatus + ProgramStatus + status != 0 + alert + + + + + + 0 + WAN_GW + WAN Gateway + wan + inet + + 1 + 0 + 0 + 0 + 1.1.1.1 + 0 + 250 + 1 + + + + + + + + + + + 0 + Sven + + opt5 + inet + 10.10.10.6 + 0 + 0 + 1 + 0 + + 0 + 255 + 1 + + + + + + + + + + + 0 + WAN2_DHCP + Interface WAN2_DHCP Gateway + opt1 + inet + + 0 + 0 + 0 + 0 + 192.168.30.1 + 0 + 255 + 1 + + + + + + + + + + + + + 1 + 1 + 31 + 200 + + + + + + + + + + + 1 + 53 + + + + + + + + + + + + + + transparent + + + + + + + + + + 1 + + + + + + + + + + + + + 1 + 0 + + 0.0.0.0/8,10.0.0.0/8,100.64.0.0/10,169.254.0.0/16,172.16.0.0/12,192.0.2.0/24,192.168.0.0/16,198.18.0.0/15,198.51.100.0/24,203.0.113.0/24,233.252.0.0/24,::1/128,2001:db8::/32,fc00::/8,fd00::/8,fe80::/10 + + + + + + + + + + + + + + + + + + + allow + + + 0 + + + + + + +
+ + + + + + + + + + + + + 0 + 0 + 0 + 1 + 0 + + + + + + + + + + + + + + + + + + + igc3 + 50 + 0 + + Steini + vlan0.50 + + + igc3 + 10 + 0 + + Büro + vlan0.10 + + + igc3 + 2 + 0 + + Brücke + vlan0.2 + + + igc3 + 70 + 0 + + WAN2 + vlan0.70 + + + + + 192.168.30.0/24 + Sven + Sven + 0 + + + 192.168.6.0/24 + Sven + Sven Groitzsch + 0 + + + 10.30.0.0/24 + Sven + Sven Groitzsch + 0 + + + 10.19.0.0/24 + Sven + Sven Groitzsch + 0 + + + + + + + + + + + + + + + + + + + + + 65fda728512c3 + Web GUI TLS certificate + + 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 + + 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 + + + + Loadbalancing + WAN_GW|1 + Sven|1 + downlosslatency + + Load + + + + 0 + 0 + + + 1400 + + + + + + +