opnsensevfs.read_maxdefaultIncrease UFS read-ahead speeds to match the state of hard drives and NCQ.net.inet.ip.portrange.firstdefaultSet the ephemeral port range to be lower.net.inet.tcp.blackholedefaultDrop packets to closed TCP ports without returning a RSTnet.inet.udp.blackholedefaultDo not send ICMP port unreachable messages for closed UDP portsnet.inet.ip.random_iddefaultRandomize the ID field in IP packetsnet.inet.ip.sourceroutedefault
Source routing is another way for an attacker to try to reach non-routable addresses behind your box.
It can also be used to probe for information about your internal networks. These functions come enabled
as part of the standard FreeBSD core system.
net.inet.ip.accept_sourceroutedefault
Source routing is another way for an attacker to try to reach non-routable addresses behind your box.
It can also be used to probe for information about your internal networks. These functions come enabled
as part of the standard FreeBSD core system.
net.inet.icmp.log_redirectdefault
This option turns off the logging of redirect packets because there is no limit and this could fill
up your logs consuming your whole hard drive.
net.inet.tcp.drop_synfindefaultDrop SYN-FIN packets (breaks RFC1379, but nobody uses it anyway)net.inet6.ip6.redirectdefaultEnable sending IPv6 redirectsnet.inet6.ip6.use_tempaddrdefaultEnable privacy settings for IPv6 (RFC 4941)net.inet6.ip6.prefer_tempaddrdefaultPrefer privacy addresses and use them over the normal addressesnet.inet.tcp.syncookiesdefaultGenerate SYN cookies for outbound SYN-ACK packetsnet.inet.tcp.recvspacedefaultMaximum incoming/outgoing TCP datagram size (receive)net.inet.tcp.sendspacedefaultMaximum incoming/outgoing TCP datagram size (send)net.inet.tcp.delayed_ackdefaultDo not delay ACK to try and piggyback it onto a data packetnet.inet.udp.maxdgramdefaultMaximum outgoing UDP datagram sizenet.link.bridge.pfil_onlyipdefaultHandling of non-IP packets which are not passed to pfil (see if_bridge(4))net.link.bridge.pfil_local_physdefaultSet to 1 to additionally filter on the physical interface for locally destined packetsnet.link.bridge.pfil_memberdefaultSet to 0 to disable filtering on the incoming and outgoing member interfaces.net.link.bridge.pfil_bridgedefaultSet to 1 to enable filtering on the bridge interfacenet.link.tap.user_opendefaultAllow unprivileged access to tap(4) device nodeskern.randompiddefaultRandomize PID's (see src/sys/kern/kern_fork.c: sysctl_kern_randompid())hw.syscons.kbd_rebootdefaultDisable CTRL+ALT+Delete reboot from keyboard.net.inet.tcp.log_debugdefaultEnable TCP extended debuggingnet.inet.icmp.icmplimdefaultSet ICMP Limitsnet.inet.tcp.tsodefaultTCP Offload Enginenet.inet.udp.checksumdefaultUDP Checksumskern.ipc.maxsockbufdefaultMaximum socket buffer sizevm.pmap.ptidefaultPage Table Isolation (Meltdown mitigation, requires reboot.)hw.ibrs_disabledefaultDisable Indirect Branch Restricted Speculation (Spectre V2 mitigation)security.bsd.see_other_gidsdefaultHide processes running as other groupssecurity.bsd.see_other_uidsdefaultHide processes running as other usersnet.inet.ip.redirectdefaultEnable/disable sending of ICMP redirects in response to IP packets for which a better,
and for the sender directly reachable, route and next hop is known.
net.inet.icmp.drop_redirect1
Redirect attacks are the purposeful mass-issuing of ICMP type 5 packets. In a normal network, redirects
to the end stations should not be required. This option enables the NIC to drop all inbound ICMP redirect
packets without returning a response.
net.local.dgram.maxdgramdefaultMaximum outgoing UDP datagram sizenormalOPNsenselocaldomain11999adminssystemSystem Administratorspage-all00root0system$2y$11$F5yOtLTn8aI21fKZTdsnueJjedH0PXTTPpD89Ha6ps3VfC/IxgojqSystem Administrator20002000Europe/Berlin0.opnsense.pool.ntp.org 1.opnsense.pool.ntp.org 2.opnsense.pool.ntp.org 3.opnsense.pool.ntp.orghttps65fda728512c3yes111111hadphadphadpmonthly11admins1enabled-1-1os-adguardhome-maxit,os-ddclient,os-git-backupde_DE115200serialvideourgent1nonenonenonenonenonenonenonenone11https://git.steini12.ddnss.de/steini/Opnsense.gitmastersteini$teini1972@gitigc0WAN1dhcp32SavedCfg1igc3192.168.1.124track664wan0LAN1Loopback1lo0127.0.0.1::18128none1igc1WAN21dhcp32SavedCfgigc2LAN21192.168.201.124vlan0.10Buero11192.168.10.124vlan0.50Steini1192.168.50.124vlan0.2Bruecke110.10.10.124wg0MobileClients113001WireGuard (Group)wireguard11group192.168.1.10192.168.1.2451hmac-md5192.168.10.10192.168.10.2001hmac-md5192.168.50.20192.168.50.2001hmac-md510.10.10.210.10.10.10000:f4:21:68:3f:7110.10.10.6OPNsense1hmac-md5192.168.201.10192.168.201.100publichybridany1opt5inet0root@192.168.50.82/firewall_nat_out_edit.php made changesroot@192.168.50.82/firewall_nat_out_edit.php made changes1wireguard1waninet0root@192.168.50.82/firewall_nat_out_edit.php made changesroot@192.168.50.82/firewall_nat_out_edit.php made changes1tcpwaninetnat_66096249452fb6.41739810192.168.50.101Server_Keller1wanipServer_Kellerroot@192.168.50.82/firewall_nat_edit.php made changesroot@192.168.50.82/firewall_nat_edit.php made changesudpwaninetnat_66201a35577007.13363244192.168.50.101WG_UDP1wanipWG_UDProot@192.168.50.82/firewall_nat_edit.php made changesroot@192.168.50.82/firewall_nat_edit.php made changesnat_66096249452fb6.417398101wankeep statetcpinet
192.168.50.101
Server_Kellerroot@192.168.50.82/firewall_nat_edit.php made changespasswaninetkeep statein111root@192.168.1.100/firewall_rules_edit.php made changesroot@192.168.1.100/firewall_rules_edit.php made changes1passwaninetkeep statein1udp1wanip51888root@192.168.50.82/firewall_rules_edit.php made changesroot@192.168.50.82/firewall_rules_edit.php made changes1nat_66201a35577007.133632441wankeep stateudpinet
192.168.50.101
WG_UDProot@192.168.50.82/firewall_nat_edit.php made changespassinetDefault allow LAN to any rulelanlanpassinet6Default allow LAN IPv6 to any rulelanlanpassopt2inetkeep statein111root@192.168.1.100/firewall_rules_edit.php made changesroot@192.168.1.100/firewall_rules_edit.php made changespassopt3inetkeep statein111root@192.168.1.100/firewall_rules_edit.php made changesroot@192.168.1.100/firewall_rules_edit.php made changes1passopt4inetkeep statein1opt4(self)root@192.168.50.82/firewall_rules_edit.php made changesroot@192.168.50.82/firewall_rules_edit.php made changes1passopt4inetkeep stateWAN2_DHCPin1
192.168.50.82
RF
1root@192.168.50.82/firewall_rules_edit.php made changesroot@192.168.50.82/firewall_rules_edit.php made changes1passopt4inetkeep statein111root@192.168.1.100/firewall_rules_edit.php made changesroot@192.168.1.100/firewall_rules_edit.php made changes1rejectopt5inetkeep statein1opt31root@10.10.10.6/firewall_rules_edit.php made changesroot@10.10.10.6/firewall_rules_edit.php made changespassopt5inetkeep statein111root@192.168.50.82/firewall_rules_edit.php made changesroot@192.168.50.82/firewall_rules_edit.php made changespassopt6inetkeep statein111root@192.168.50.82/firewall_rules_edit.php made changesroot@192.168.50.82/firewall_rules_edit.php made changes1ICMPicmpICMPTCPtcpGeneric TCPHTTPhttpGeneric HTTP/200HTTPShttpsGeneric HTTPS/200SMTPsendGeneric SMTP220 *0.opnsense.pool.ntp.orgtraffic_graphs-container:00000000-col3:show,system_information-container:00000001-col3:show,services_status-container:00000002-col4:hide,gateways-container:00000003-col4:show,interface_list-container:00000004-col4:show,thermal_sensors-container:00000005-col4:show,wireguard-container:00000006-col4:show,interface_statistics-container:00000007-col4:show2wan,opt1opt2root@192.168.50.82/api/adguardhome/general/set machte Änderungen1IphoneKtQnq1p3Q/cpILxq7NRBosj0de8wORBCDElewYoNc18=10.9.0.2/32251SvenCL1zITckQCuVysIx7aC/xnF5Q3Q6nVbm1xy+klx102g=10.9.0.3/321svenWSxVOBWE29aKCqrmkSz5bK3OGjn+vfrZ+Dfzw8Ub/DM=10.9.0.4/3211MobileClients0TT+xJplbhdJ+p+QcyOxhnSBNgxm8gCIoT8NTeMt0EwU=MOQxv6uu6PJOoDHXgQD7Jfgs1XTn8QUJ6u8KKtw6dlQ=5188810.9.0.1/240de8b1c52-da7f-4997-b560-ba1e41def08f,f2cec977-08ca-4d6d-ab6a-abb636da2777,552f0a94-2027-4b89-9560-e10b4f041f23steini12.ddnss.de:51888192.168.50.100163241000110111111111111111111cron102***rootfirmware pollFirmware Update checkcron1152**6rootfirmware auto-updateFirmwareupdatecron1020***rootsystem remote backupBackup1Server_Kellerport080
443Server_Keller1WG_UDPport051820WG_UDP1RFnetwork0192.168.50.0/24
192.168.10.0/24
192.168.0.0/24v90180015000wan192.168.0.0/16,10.0.0.0/8,172.16.0.0/12W0D234000000000127.0.0.18000040001raw020120120127.0.0.1250auto10rootEs1qpnWtrF33up9r7pewpRdSj2812510root@localhost.local01$HOSTsystem30030118792c7-270e-4c39-ab7f-14478485217c,b6402613-1e49-4ff7-86dd-e8444a248070,79ee91db-84b0-48fa-9a9c-5578c914a301,0d968211-9492-498e-9452-c6c27f4c74681RootFsfilesystem/30030e5d81bf1-1a2d-4f88-9ba0-123ae0a8651f0carp_status_changecustom/usr/local/opnsense/scripts/OPNsense/Monit/carp_status300308bddf11e-a9eb-41b2-92ab-8c038cc9adaa0gateway_alertcustom/usr/local/opnsense/scripts/OPNsense/Monit/gateway_alert30030267d77f9-0124-499f-b80e-166c23b6ff54PingNetworkPingfailed pingalertNetworkLinkNetworkInterfacefailed linkalertNetworkSaturationNetworkInterfacesaturation is greater than 75%alertMemoryUsageSystemResourcememory usage is greater than 75%alertCPUUsageSystemResourcecpu usage is greater than 75%alertLoadAvg1SystemResourceloadavg (1min) is greater than 8alertLoadAvg5SystemResourceloadavg (5min) is greater than 6alertLoadAvg15SystemResourceloadavg (15min) is greater than 4alertSpaceUsageSpaceUsagespace usage is greater than 75%alertChangedStatusProgramStatuschanged statusalertNonZeroStatusProgramStatusstatus != 0alert0WAN_GWWAN Gatewaywaninet10001.1.1.1025010Svenopt5inet10.10.10.60010025510WAN2_DHCPInterface WAN2_DHCP Gatewayopt1inet0000192.168.30.102551113120015353000000000transparent01100.0.0.0/8,10.0.0.0/8,100.64.0.0/10,169.254.0.0/16,172.16.0.0/12,192.0.2.0/24,192.168.0.0/16,198.18.0.0/15,198.51.100.0/24,203.0.113.0/24,233.252.0.0/24,::1/128,2001:db8::/32,fc00::/8,fd00::/8,fe80::/10allow00gitsteini12.ddnss.deA192.168.50.101git0001011100300opnsense1customdyndns1ddnss.desteini12Sidolin7219steini12.ddnss.de0cloudflare-ipv4101300igc3500Steinivlan0.50igc3100Bürovlan0.10igc320Brückevlan0.2igc3700WAN2vlan0.70192.168.30.0/24SvenSven0192.168.6.0/24SvenSven Groitzsch010.30.0.0/24SvenSven Groitzsch010.19.0.0/24SvenSven Groitzsch065fda728512c3Web GUI TLS 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LoadbalancingWAN_GW|1Sven|1downlosslatencyLoad0014000