opnsense vfs.read_max Increase UFS read-ahead speeds to match the state of hard drives and NCQ. net.inet.ip.portrange.first Set the ephemeral port range to be lower. net.inet.tcp.blackhole Drop packets to closed TCP ports without returning a RST net.inet.udp.blackhole Do not send ICMP port unreachable messages for closed UDP ports net.inet.ip.random_id Randomize the ID field in IP packets net.inet.ip.sourceroute Source routing is another way for an attacker to try to reach non-routable addresses behind your box. It can also be used to probe for information about your internal networks. These functions come enabled as part of the standard FreeBSD core system. net.inet.ip.accept_sourceroute Source routing is another way for an attacker to try to reach non-routable addresses behind your box. It can also be used to probe for information about your internal networks. These functions come enabled as part of the standard FreeBSD core system. net.inet.icmp.log_redirect This option turns off the logging of redirect packets because there is no limit and this could fill up your logs consuming your whole hard drive. net.inet.tcp.drop_synfin Drop SYN-FIN packets (breaks RFC1379, but nobody uses it anyway) net.inet6.ip6.redirect Enable sending IPv6 redirects net.inet6.ip6.use_tempaddr Enable privacy settings for IPv6 (RFC 4941) net.inet6.ip6.prefer_tempaddr Prefer privacy addresses and use them over the normal addresses net.inet.tcp.syncookies Generate SYN cookies for outbound SYN-ACK packets net.inet.tcp.recvspace Maximum incoming/outgoing TCP datagram size (receive) net.inet.tcp.sendspace Maximum incoming/outgoing TCP datagram size (send) net.inet.tcp.delayed_ack Do not delay ACK to try and piggyback it onto a data packet net.inet.udp.maxdgram Maximum outgoing UDP datagram size net.link.bridge.pfil_onlyip Handling of non-IP packets which are not passed to pfil (see if_bridge(4)) net.link.bridge.pfil_local_phys Set to 1 to additionally filter on the physical interface for locally destined packets net.link.bridge.pfil_member Set to 0 to disable filtering on the incoming and outgoing member interfaces. net.link.bridge.pfil_bridge Set to 1 to enable filtering on the bridge interface net.link.tap.user_open Allow unprivileged access to tap(4) device nodes kern.randompid Randomize PID's (see src/sys/kern/kern_fork.c: sysctl_kern_randompid()) hw.syscons.kbd_reboot Disable CTRL+ALT+Delete reboot from keyboard. net.inet.tcp.log_debug Enable TCP extended debugging net.inet.icmp.icmplim Set ICMP Limits net.inet.tcp.tso TCP Offload Engine net.inet.udp.checksum UDP Checksums kern.ipc.maxsockbuf Maximum socket buffer size vm.pmap.pti Page Table Isolation (Meltdown mitigation, requires reboot.) hw.ibrs_disable Disable Indirect Branch Restricted Speculation (Spectre V2 mitigation) security.bsd.see_other_gids Hide processes running as other groups security.bsd.see_other_uids Hide processes running as other users net.inet.ip.redirect Enable/disable sending of ICMP redirects in response to IP packets for which a better, and for the sender directly reachable, route and next hop is known. net.inet.icmp.drop_redirect 1 Redirect attacks are the purposeful mass-issuing of ICMP type 5 packets. In a normal network, redirects to the end stations should not be required. This option enables the NIC to drop all inbound ICMP redirect packets without returning a response. net.local.dgram.maxdgram Maximum outgoing UDP datagram size normal OPNsense localdomain 1 1999 admins system System Administrators page-all 0 0 root 0 system $2y$11$F5yOtLTn8aI21fKZTdsnueJjedH0PXTTPpD89Ha6ps3VfC/Ixgojq System Administrator 2000 2000 Europe/Berlin 0.opnsense.pool.ntp.org 1.opnsense.pool.ntp.org 2.opnsense.pool.ntp.org 3.opnsense.pool.ntp.org https 65fda728512c3 yes 1 1 1 1 1 1 hadp hadp hadp monthly 1 1 admins 1 enabled -1 -1 os-adguardhome-maxit,os-ddclient,os-git-backup de_DE 115200 serial video urgent 1 none none none none none none none none 1 1 https://git.steini12.ddnss.de/steini/Opnsense.git master steini $teini1972@git igc0 WAN 1 dhcp 32 SavedCfg 1 igc3 192.168.1.1 24 track6 64 wan 0 LAN 1 Loopback 1 lo0 127.0.0.1 ::1 8 128 none 1 igc1 WAN2 1 dhcp 32 SavedCfg igc2 LAN2 1 192.168.201.1 24 vlan0.10 Buero 1 1 192.168.10.1 24 vlan0.50 Steini 1 192.168.50.1 24 vlan0.2 Bruecke 1 10.10.10.1 24 wg0 MobileClients 1 1300 1 WireGuard (Gruppe) wireguard 1 1 group 192.168.1.10 192.168.1.245 1 hmac-md5 192.168.10.10 192.168.10.200 1 hmac-md5 192.168.50.20 192.168.50.200 1 hmac-md5 10.10.10.2 10.10.10.100 00:f4:21:68:3f:71 10.10.10.6 OPNsense 1 hmac-md5 192.168.201.10 192.168.201.100 public hybrid any 1 opt5 inet 0 root@192.168.50.82 /firewall_nat_out_edit.php made changes root@192.168.50.82 /firewall_nat_out_edit.php made changes 1 wireguard 1 wan inet 0 root@192.168.50.82 /firewall_nat_out_edit.php made changes root@192.168.50.82 /firewall_nat_out_edit.php made changes 1 tcp wan inet nat_66096249452fb6.41739810 192.168.50.101 Server_Keller 1 wanip Server_Keller root@192.168.50.82 /firewall_nat_edit.php made changes root@192.168.50.82 /firewall_nat_edit.php made changes udp wan inet nat_66201a35577007.13363244 192.168.50.101 WG_UDP 1 wanip WG_UDP root@192.168.50.82 /firewall_nat_edit.php made changes root@192.168.50.82 /firewall_nat_edit.php made changes nat_66096249452fb6.41739810 1 wan keep state tcp inet
192.168.50.101
Server_Keller
root@192.168.50.82 /firewall_nat_edit.php made changes
pass wan inet keep state in 1 1 1 root@192.168.1.100 /firewall_rules_edit.php made changes root@192.168.1.100 /firewall_rules_edit.php made changes 1 pass wan inet keep state in 1 udp 1 wanip 51888 root@192.168.50.82 /firewall_rules_edit.php made changes root@192.168.50.82 /firewall_rules_edit.php made changes 1 nat_66201a35577007.13363244 1 wan keep state udp inet
192.168.50.101
WG_UDP
root@192.168.50.82 /firewall_nat_edit.php made changes
pass inet Default allow LAN to any rule lan lan pass inet6 Default allow LAN IPv6 to any rule lan lan pass opt2 inet keep state in 1 1 1 root@192.168.1.100 /firewall_rules_edit.php made changes root@192.168.1.100 /firewall_rules_edit.php made changes pass opt3 inet keep state in 1 1 1 root@192.168.1.100 /firewall_rules_edit.php made changes root@192.168.1.100 /firewall_rules_edit.php made changes 1 pass opt4 inet keep state in 1 opt4 (self) root@192.168.50.82 /firewall_rules_edit.php made changes root@192.168.50.82 /firewall_rules_edit.php made changes 1 pass opt4 inet keep state WAN2_DHCP in 1
192.168.50.82
RF
1
root@192.168.50.82 /firewall_rules_edit.php made changes root@192.168.50.82 /firewall_rules_edit.php made changes 1
pass opt4 inet keep state in 1 1 1 root@192.168.1.100 /firewall_rules_edit.php made changes root@192.168.1.100 /firewall_rules_edit.php made changes 1 reject opt5 inet keep state in 1 opt3 1 root@10.10.10.6 /firewall_rules_edit.php made changes root@10.10.10.6 /firewall_rules_edit.php made changes pass opt5 inet keep state in 1 1 1 root@192.168.50.82 /firewall_rules_edit.php made changes root@192.168.50.82 /firewall_rules_edit.php made changes pass opt6 inet keep state in 1 1 1 root@192.168.50.82 /firewall_rules_edit.php made changes root@192.168.50.82 /firewall_rules_edit.php made changes 1
ICMP icmp ICMP TCP tcp Generic TCP HTTP http Generic HTTP / 200 HTTPS https Generic HTTPS / 200 SMTP send Generic SMTP 220 * 0.opnsense.pool.ntp.org traffic_graphs-container:00000000-col3:show,system_information-container:00000001-col3:show,services_status-container:00000002-col4:hide,gateways-container:00000003-col4:show,interface_list-container:00000004-col4:show,thermal_sensors-container:00000005-col4:show,wireguard-container:00000006-col4:show,interface_statistics-container:00000007-col4:show 2 wan,opt1 opt2 root@192.168.50.82 /api/adguardhome/general/set machte Änderungen 1 Iphone KtQnq1p3Q/cpILxq7NRBosj0de8wORBCDElewYoNc18= 10.9.0.2/32 25 1 Sven CL1zITckQCuVysIx7aC/xnF5Q3Q6nVbm1xy+klx102g= 10.9.0.3/32 1 sven WSxVOBWE29aKCqrmkSz5bK3OGjn+vfrZ+Dfzw8Ub/DM= 10.9.0.4/32 1 1 MobileClients 0 TT+xJplbhdJ+p+QcyOxhnSBNgxm8gCIoT8NTeMt0EwU= MOQxv6uu6PJOoDHXgQD7Jfgs1XTn8QUJ6u8KKtw6dlQ= 51888 10.9.0.1/24 0 de8b1c52-da7f-4997-b560-ba1e41def08f,f2cec977-08ca-4d6d-ab6a-abb636da2777,552f0a94-2027-4b89-9560-e10b4f041f23 steini12.ddnss.de:51888 192.168.50.1 0 0 16 32 4 1000 1 0 0 0 1 0 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 ipsec 0 1 cron 1 0 2 * * * root firmware poll Firmware Update check cron 1 15 2 * * 6 root firmware auto-update Firmwareupdate cron 1 0 20 * * * root system remote backup Backup 1 Server_Keller port 0 80 443 Server_Keller 1 WG_UDP port 0 51820 WG_UDP 1 RF network 0 192.168.50.0/24 192.168.10.0/24 192.168.0.0/24 v9 0 1800 15 0 0 0 wan 192.168.0.0/16,10.0.0.0/8,172.16.0.0/12 W0D23 4 0 0 0 0 0 0 0 0 0 127.0.0.1 8000 0 0 4000 1 raw 0 2 0 0 4000 1 0 2 0 120 120 127.0.0.1 25 0 auto 1 0 root Es1qpnWtrF33up9r7pewpRdSj 2812 5 1 0 root@localhost.local 0 1 $HOST system 300 30
118792c7-270e-4c39-ab7f-14478485217c,b6402613-1e49-4ff7-86dd-e8444a248070,79ee91db-84b0-48fa-9a9c-5578c914a301,0d968211-9492-498e-9452-c6c27f4c7468 1 RootFs filesystem / 300 30
e5d81bf1-1a2d-4f88-9ba0-123ae0a8651f 0 carp_status_change custom /usr/local/opnsense/scripts/monit/carp_status.php 300 30
8bddf11e-a9eb-41b2-92ab-8c038cc9adaa 0 gateway_alert custom /usr/local/opnsense/scripts/monit/gateway_alert.php 300 30
267d77f9-0124-499f-b80e-166c23b6ff54 Ping NetworkPing failed ping alert NetworkLink NetworkInterface failed link alert NetworkSaturation NetworkInterface saturation is greater than 75% alert MemoryUsage SystemResource memory usage is greater than 75% alert CPUUsage SystemResource cpu usage is greater than 75% alert LoadAvg1 SystemResource loadavg (1min) is greater than 8 alert LoadAvg5 SystemResource loadavg (5min) is greater than 6 alert LoadAvg15 SystemResource loadavg (15min) is greater than 4 alert SpaceUsage SpaceUsage space usage is greater than 75% alert ChangedStatus ProgramStatus changed status alert NonZeroStatus ProgramStatus status != 0 alert 0 WAN_GW WAN Gateway wan inet 1 0 0 0 1.1.1.1 0 250 1 0 Sven opt5 inet 10.10.10.6 0 0 1 0 0 255 1 0 WAN2_DHCP Interface WAN2_DHCP Gateway opt1 inet 0 0 0 0 192.168.30.1 0 255 1 1 1 31 200 1 5353 0 0 0 0 0 0 0 0 0 transparent 0 1 1 0 0.0.0.0/8,10.0.0.0/8,100.64.0.0/10,169.254.0.0/16,172.16.0.0/12,192.0.2.0/24,192.168.0.0/16,198.18.0.0/15,198.51.100.0/24,203.0.113.0/24,233.252.0.0/24,::1/128,2001:db8::/32,fc00::/8,fd00::/8,fe80::/10 allow 0
0 git steini12.ddnss.de A 192.168.50.101 git 0 0 0 1 0 1 1 1 0 0 300 opnsense 1 custom dyndns1 ddnss.de steini12 Sidolin7219 steini12.ddnss.de 0 cloudflare-ipv4 10 1 300 igc3 50 0 Steini vlan0.50 igc3 10 0 Büro vlan0.10 igc3 2 0 Brücke vlan0.2 igc3 70 0 WAN2 vlan0.70 192.168.30.0/24 Sven Sven 0 192.168.6.0/24 Sven Sven Groitzsch 0 10.30.0.0/24 Sven Sven Groitzsch 0 10.19.0.0/24 Sven Sven Groitzsch 0 65fda728512c3 Web GUI TLS certificate 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 Loadbalancing WAN_GW|1 Sven|1 downlosslatency Load 0 0 1400 0 0 0 0 0 1 0 1 0 0 1