Created
January 28, 2023 22:28
-
-
Save jlopp/ff8a10111f6b53f211c3e43ce8018e4f to your computer and use it in GitHub Desktop.
OPNSense config file for whole-home WireGuard VPN per https://blog.lopp.net/how-to-protect-your-home-network-with-a-gigabit-vpn
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?xml version="1.0"?> | |
<opnsense> | |
<theme>opnsense</theme> | |
<sysctl> | |
<item> | |
<descr>Increase UFS read-ahead speeds to match the state of hard drives and NCQ.</descr> | |
<tunable>vfs.read_max</tunable> | |
<value>default</value> | |
</item> | |
<item> | |
<descr>Set the ephemeral port range to be lower.</descr> | |
<tunable>net.inet.ip.portrange.first</tunable> | |
<value>default</value> | |
</item> | |
<item> | |
<descr>Drop packets to closed TCP ports without returning a RST</descr> | |
<tunable>net.inet.tcp.blackhole</tunable> | |
<value>default</value> | |
</item> | |
<item> | |
<descr>Do not send ICMP port unreachable messages for closed UDP ports</descr> | |
<tunable>net.inet.udp.blackhole</tunable> | |
<value>default</value> | |
</item> | |
<item> | |
<descr>Randomize the ID field in IP packets</descr> | |
<tunable>net.inet.ip.random_id</tunable> | |
<value>default</value> | |
</item> | |
<item> | |
<descr> | |
Source routing is another way for an attacker to try to reach non-routable addresses behind your box. | |
It can also be used to probe for information about your internal networks. These functions come enabled | |
as part of the standard FreeBSD core system. | |
</descr> | |
<tunable>net.inet.ip.sourceroute</tunable> | |
<value>default</value> | |
</item> | |
<item> | |
<descr> | |
Source routing is another way for an attacker to try to reach non-routable addresses behind your box. | |
It can also be used to probe for information about your internal networks. These functions come enabled | |
as part of the standard FreeBSD core system. | |
</descr> | |
<tunable>net.inet.ip.accept_sourceroute</tunable> | |
<value>default</value> | |
</item> | |
<item> | |
<descr> | |
This option turns off the logging of redirect packets because there is no limit and this could fill | |
up your logs consuming your whole hard drive. | |
</descr> | |
<tunable>net.inet.icmp.log_redirect</tunable> | |
<value>default</value> | |
</item> | |
<item> | |
<descr>Drop SYN-FIN packets (breaks RFC1379, but nobody uses it anyway)</descr> | |
<tunable>net.inet.tcp.drop_synfin</tunable> | |
<value>default</value> | |
</item> | |
<item> | |
<descr>Enable sending IPv6 redirects</descr> | |
<tunable>net.inet6.ip6.redirect</tunable> | |
<value>default</value> | |
</item> | |
<item> | |
<descr>Enable privacy settings for IPv6 (RFC 4941)</descr> | |
<tunable>net.inet6.ip6.use_tempaddr</tunable> | |
<value>default</value> | |
</item> | |
<item> | |
<descr>Prefer privacy addresses and use them over the normal addresses</descr> | |
<tunable>net.inet6.ip6.prefer_tempaddr</tunable> | |
<value>default</value> | |
</item> | |
<item> | |
<descr>Generate SYN cookies for outbound SYN-ACK packets</descr> | |
<tunable>net.inet.tcp.syncookies</tunable> | |
<value>default</value> | |
</item> | |
<item> | |
<descr>Maximum incoming/outgoing TCP datagram size (receive)</descr> | |
<tunable>net.inet.tcp.recvspace</tunable> | |
<value>default</value> | |
</item> | |
<item> | |
<descr>Maximum incoming/outgoing TCP datagram size (send)</descr> | |
<tunable>net.inet.tcp.sendspace</tunable> | |
<value>default</value> | |
</item> | |
<item> | |
<descr>Do not delay ACK to try and piggyback it onto a data packet</descr> | |
<tunable>net.inet.tcp.delayed_ack</tunable> | |
<value>default</value> | |
</item> | |
<item> | |
<descr>Maximum outgoing UDP datagram size</descr> | |
<tunable>net.inet.udp.maxdgram</tunable> | |
<value>default</value> | |
</item> | |
<item> | |
<descr>Handling of non-IP packets which are not passed to pfil (see if_bridge(4))</descr> | |
<tunable>net.link.bridge.pfil_onlyip</tunable> | |
<value>default</value> | |
</item> | |
<item> | |
<descr>Set to 1 to additionally filter on the physical interface for locally destined packets</descr> | |
<tunable>net.link.bridge.pfil_local_phys</tunable> | |
<value>default</value> | |
</item> | |
<item> | |
<descr>Set to 0 to disable filtering on the incoming and outgoing member interfaces.</descr> | |
<tunable>net.link.bridge.pfil_member</tunable> | |
<value>default</value> | |
</item> | |
<item> | |
<descr>Set to 1 to enable filtering on the bridge interface</descr> | |
<tunable>net.link.bridge.pfil_bridge</tunable> | |
<value>default</value> | |
</item> | |
<item> | |
<descr>Allow unprivileged access to tap(4) device nodes</descr> | |
<tunable>net.link.tap.user_open</tunable> | |
<value>default</value> | |
</item> | |
<item> | |
<descr>Randomize PID's (see src/sys/kern/kern_fork.c: sysctl_kern_randompid())</descr> | |
<tunable>kern.randompid</tunable> | |
<value>default</value> | |
</item> | |
<item> | |
<descr>Disable CTRL+ALT+Delete reboot from keyboard.</descr> | |
<tunable>hw.syscons.kbd_reboot</tunable> | |
<value>default</value> | |
</item> | |
<item> | |
<descr>Enable TCP extended debugging</descr> | |
<tunable>net.inet.tcp.log_debug</tunable> | |
<value>default</value> | |
</item> | |
<item> | |
<descr>Set ICMP Limits</descr> | |
<tunable>net.inet.icmp.icmplim</tunable> | |
<value>default</value> | |
</item> | |
<item> | |
<descr>TCP Offload Engine</descr> | |
<tunable>net.inet.tcp.tso</tunable> | |
<value>default</value> | |
</item> | |
<item> | |
<descr>UDP Checksums</descr> | |
<tunable>net.inet.udp.checksum</tunable> | |
<value>default</value> | |
</item> | |
<item> | |
<tunable>kern.ipc.maxsockbuf</tunable> | |
<value>614400000</value> | |
<descr>Maximum socket buffer size</descr> | |
</item> | |
<item> | |
<descr>Page Table Isolation (Meltdown mitigation, requires reboot.)</descr> | |
<tunable>vm.pmap.pti</tunable> | |
<value>default</value> | |
</item> | |
<item> | |
<tunable>hw.ibrs_disable</tunable> | |
<value>1</value> | |
<descr>Disable Indirect Branch Restricted Speculation (Spectre V2 mitigation)</descr> | |
</item> | |
<item> | |
<descr>Hide processes running as other groups</descr> | |
<tunable>security.bsd.see_other_gids</tunable> | |
<value>default</value> | |
</item> | |
<item> | |
<descr>Hide processes running as other users</descr> | |
<tunable>security.bsd.see_other_uids</tunable> | |
<value>default</value> | |
</item> | |
<item> | |
<descr>Enable/disable sending of ICMP redirects in response to IP packets for which a better, | |
and for the sender directly reachable, route and next hop is known. | |
</descr> | |
<tunable>net.inet.ip.redirect</tunable> | |
<value>default</value> | |
</item> | |
<item> | |
<descr> | |
Redirect attacks are the purposeful mass-issuing of ICMP type 5 packets. In a normal network, redirects | |
to the end stations should not be required. This option enables the NIC to drop all inbound ICMP redirect | |
packets without returning a response. | |
</descr> | |
<tunable>net.inet.icmp.drop_redirect</tunable> | |
<value>1</value> | |
</item> | |
<item> | |
<descr>Maximum outgoing UDP datagram size</descr> | |
<tunable>net.local.dgram.maxdgram</tunable> | |
<value>default</value> | |
</item> | |
<item> | |
<tunable>net.isr.maxthreads</tunable> | |
<value>-1</value> | |
<descr/> | |
</item> | |
<item> | |
<tunable>net.isr.bindthreads</tunable> | |
<value>1</value> | |
<descr/> | |
</item> | |
<item> | |
<tunable>net.isr.dispatch</tunable> | |
<value>deferred</value> | |
<descr/> | |
</item> | |
<item> | |
<tunable>net.inet.tcp.soreceive_stream</tunable> | |
<value>1</value> | |
<descr/> | |
</item> | |
<item> | |
<tunable>net.pf.source_nodes_hashsize</tunable> | |
<value>1048576</value> | |
<descr/> | |
</item> | |
<item> | |
<tunable>net.inet.tcp.mssdflt</tunable> | |
<value>1240</value> | |
<descr/> | |
</item> | |
<item> | |
<tunable>net.inet.tcp.abc_l_var</tunable> | |
<value>52</value> | |
<descr/> | |
</item> | |
<item> | |
<tunable>net.inet.tcp.minmss</tunable> | |
<value>536</value> | |
<descr/> | |
</item> | |
<item> | |
<tunable>kern.random.fortuna.minpoolsize</tunable> | |
<value>128</value> | |
<descr/> | |
</item> | |
<item> | |
<tunable>net.isr.defaultqlimit</tunable> | |
<value>2048</value> | |
<descr/> | |
</item> | |
</sysctl> | |
<system> | |
<optimization>normal</optimization> | |
<hostname>OPNsense</hostname> | |
<domain>localdomain</domain> | |
<group> | |
<name>admins</name> | |
<description>System Administrators</description> | |
<scope>system</scope> | |
<gid>1999</gid> | |
<member>0</member> | |
<priv>page-all</priv> | |
</group> | |
<user> | |
<name>root</name> | |
<descr>System Administrator</descr> | |
<scope>system</scope> | |
<groupname>admins</groupname> | |
<password>$2y$10$/KxEWx3gxj1BdoJiUzp4Iuz7MUg2.uE7RVuJUhWP.fmvF05/pmoGW</password> | |
<uid>0</uid> | |
<expires/> | |
<authorizedkeys/> | |
<otp_seed/> | |
</user> | |
<nextuid>2000</nextuid> | |
<nextgid>2000</nextgid> | |
<timezone>America/New_York</timezone> | |
<timeservers>0.opnsense.pool.ntp.org 1.opnsense.pool.ntp.org 2.opnsense.pool.ntp.org 3.opnsense.pool.ntp.org</timeservers> | |
<webgui> | |
<protocol>https</protocol> | |
<ssl-certref>638682ed1f3b2</ssl-certref> | |
</webgui> | |
<disablenatreflection>yes</disablenatreflection> | |
<usevirtualterminal>1</usevirtualterminal> | |
<disableconsolemenu/> | |
<disablevlanhwfilter>1</disablevlanhwfilter> | |
<disablechecksumoffloading>1</disablechecksumoffloading> | |
<disablesegmentationoffloading>1</disablesegmentationoffloading> | |
<disablelargereceiveoffloading>1</disablelargereceiveoffloading> | |
<ipv6allow/> | |
<powerd_ac_mode>hadp</powerd_ac_mode> | |
<powerd_battery_mode>hadp</powerd_battery_mode> | |
<powerd_normal_mode>hadp</powerd_normal_mode> | |
<bogons> | |
<interval>monthly</interval> | |
</bogons> | |
<pf_share_forward>1</pf_share_forward> | |
<lb_use_sticky>1</lb_use_sticky> | |
<ssh> | |
<group>admins</group> | |
</ssh> | |
<rrdbackup>-1</rrdbackup> | |
<netflowbackup>-1</netflowbackup> | |
<firmware version="1.0.0"> | |
<mirror/> | |
<flavour/> | |
<plugins>os-wireguard</plugins> | |
</firmware> | |
<language>en_US</language> | |
<dnsserver>9.9.9.9</dnsserver> | |
<dnsserver>1.1.1.1</dnsserver> | |
<dns1gw>WireGuard</dns1gw> | |
<dns2gw>WireGuard</dns2gw> | |
<dns3gw>none</dns3gw> | |
<dns4gw>none</dns4gw> | |
<dns5gw>none</dns5gw> | |
<dns6gw>none</dns6gw> | |
<dns7gw>none</dns7gw> | |
<dns8gw>none</dns8gw> | |
<prefer_ipv4>1</prefer_ipv4> | |
</system> | |
<interfaces> | |
<wan> | |
<enable>1</enable> | |
<if>igb0</if> | |
<ipaddr>dhcp</ipaddr> | |
<ipaddrv6>dhcp6</ipaddrv6> | |
<gateway/> | |
<blockbogons>on</blockbogons> | |
<media/> | |
<mediaopt/> | |
<dhcp6-ia-pd-len>0</dhcp6-ia-pd-len> | |
</wan> | |
<lan> | |
<enable>1</enable> | |
<if>igb1</if> | |
<ipaddr>192.168.1.1</ipaddr> | |
<subnet>24</subnet> | |
<ipaddrv6>track6</ipaddrv6> | |
<subnetv6>64</subnetv6> | |
<media/> | |
<mediaopt/> | |
<track6-interface>wan</track6-interface> | |
<track6-prefix-id>0</track6-prefix-id> | |
</lan> | |
<lo0> | |
<internal_dynamic>1</internal_dynamic> | |
<descr>Loopback</descr> | |
<enable>1</enable> | |
<if>lo0</if> | |
<ipaddr>127.0.0.1</ipaddr> | |
<ipaddrv6>::1</ipaddrv6> | |
<subnet>8</subnet> | |
<subnetv6>128</subnetv6> | |
<type>none</type> | |
<virtual>1</virtual> | |
</lo0> | |
<opt2> | |
<if>igb3</if> | |
<descr>OPT2</descr> | |
</opt2> | |
<opt3> | |
<if>igb4</if> | |
<descr>OPT3</descr> | |
</opt3> | |
<opt4> | |
<if>igb5</if> | |
<descr>OPT4</descr> | |
</opt4> | |
<opt1> | |
<descr>OPT1</descr> | |
<if>igb2</if> | |
</opt1> | |
<opt5> | |
<if>wg1</if> | |
<descr>Wireguard</descr> | |
<enable>1</enable> | |
<lock>1</lock> | |
<spoofmac/> | |
<mtu>1420</mtu> | |
<mss>1420</mss> | |
</opt5> | |
<wireguard> | |
<internal_dynamic>1</internal_dynamic> | |
<enable>1</enable> | |
<if>wireguard</if> | |
<descr>WireGuard (Group)</descr> | |
<type>group</type> | |
<virtual>1</virtual> | |
<networks/> | |
</wireguard> | |
</interfaces> | |
<dhcpd> | |
<lan> | |
<enable>1</enable> | |
<ddnsdomainalgorithm>hmac-md5</ddnsdomainalgorithm> | |
<numberoptions> | |
<item/> | |
</numberoptions> | |
<range> | |
<from>192.168.1.10</from> | |
<to>192.168.1.245</to> | |
</range> | |
<winsserver/> | |
<dnsserver/> | |
<ntpserver/> | |
<staticmap> | |
<mac>88:88:88:88:88:88</mac> | |
<ipaddr>192.168.1.102</ipaddr> | |
<hostname>LG-Smart-TV</hostname> | |
<descr>Smart TV</descr> | |
<winsserver/> | |
<dnsserver/> | |
<ntpserver/> | |
</staticmap> | |
</lan> | |
</dhcpd> | |
<unbound> | |
<enable>1</enable> | |
<outgoing_interface>opt5</outgoing_interface> | |
</unbound> | |
<snmpd> | |
<syslocation/> | |
<syscontact/> | |
<rocommunity>public</rocommunity> | |
</snmpd> | |
<nat> | |
<outbound> | |
<mode>hybrid</mode> | |
<rule> | |
<source> | |
<network>WireGuard_Routed_Devices</network> | |
</source> | |
<destination> | |
<any>1</any> | |
</destination> | |
<descr>WireGuard NAT</descr> | |
<category/> | |
<interface>opt5</interface> | |
<tag/> | |
<tagged/> | |
<poolopts/> | |
<poolopts_sourcehashkey/> | |
<ipprotocol>inet</ipprotocol> | |
<created> | |
<username>[email protected]</username> | |
<time>1674476031.1913</time> | |
<description>/firewall_nat_out_edit.php made changes</description> | |
</created> | |
<target/> | |
<targetip_subnet>0</targetip_subnet> | |
<sourceport/> | |
<updated> | |
<username>[email protected]</username> | |
<time>1674512995.7868</time> | |
<description>/firewall_nat_out_edit.php made changes</description> | |
</updated> | |
</rule> | |
</outbound> | |
<rule/> | |
</nat> | |
<filter> | |
<rule uuid="5a383135-2b99-453d-8df5-53c9d2959275"> | |
<type>pass</type> | |
<ipprotocol>inet</ipprotocol> | |
<statetype>keep state</statetype> | |
<gateway>WireGuard</gateway> | |
<direction>out</direction> | |
<floating>yes</floating> | |
<allowopts>1</allowopts> | |
<quick>0</quick> | |
<source> | |
<network>opt5ip</network> | |
</source> | |
<destination> | |
<network>opt5</network> | |
<not>1</not> | |
</destination> | |
<updated> | |
<username>[email protected]</username> | |
<time>1674512903.7253</time> | |
<description>/firewall_rules_edit.php made changes</description> | |
</updated> | |
<created> | |
<username>[email protected]</username> | |
<time>1674421928.6829</time> | |
<description>/firewall_rules_edit.php made changes</description> | |
</created> | |
</rule> | |
<rule uuid="cb40ddce-016d-43cd-b925-da4cd80e9e4b"> | |
<type>block</type> | |
<interface>wan</interface> | |
<ipprotocol>inet</ipprotocol> | |
<tagged>NO_WAN_EGRESS</tagged> | |
<statetype>keep state</statetype> | |
<descr>VPN Kill Switch (block traffic if tunnel goes down)</descr> | |
<direction>out</direction> | |
<floating>yes</floating> | |
<quick>1</quick> | |
<source> | |
<any>1</any> | |
</source> | |
<destination> | |
<any>1</any> | |
</destination> | |
<updated> | |
<username>[email protected]</username> | |
<time>1674933692.2985</time> | |
<description>/firewall_rules_edit.php made changes</description> | |
</updated> | |
<created> | |
<username>[email protected]</username> | |
<time>1674933665.0812</time> | |
<description>/firewall_rules_edit.php made changes</description> | |
</created> | |
</rule> | |
<rule uuid="061d8a1f-f331-4e10-99c3-817d199c291b"> | |
<type>pass</type> | |
<interface>wan</interface> | |
<ipprotocol>inet</ipprotocol> | |
<statetype>keep state</statetype> | |
<direction>in</direction> | |
<quick>1</quick> | |
<source> | |
<any>1</any> | |
</source> | |
<destination> | |
<any>1</any> | |
</destination> | |
<updated> | |
<username>[email protected]</username> | |
<time>1674475758.2962</time> | |
<description>/firewall_rules_edit.php made changes</description> | |
</updated> | |
<created> | |
<username>[email protected]</username> | |
<time>1674475758.2962</time> | |
<description>/firewall_rules_edit.php made changes</description> | |
</created> | |
<disabled>1</disabled> | |
</rule> | |
<rule uuid="e3afb473-580a-4f40-af88-a5bc8109e5ad"> | |
<type>pass</type> | |
<interface>lan</interface> | |
<ipprotocol>inet</ipprotocol> | |
<tag>NO_WAN_EGRESS</tag> | |
<statetype>keep state</statetype> | |
<descr>internal wireguard routing</descr> | |
<gateway>WireGuard</gateway> | |
<direction>in</direction> | |
<quick>1</quick> | |
<source> | |
<address>WireGuard_Routed_Devices</address> | |
</source> | |
<destination> | |
<address>RFC1918_Networks</address> | |
<not>1</not> | |
</destination> | |
<updated> | |
<username>[email protected]</username> | |
<time>1674512791.4965</time> | |
<description>/firewall_rules_edit.php made changes</description> | |
</updated> | |
<created> | |
<username>[email protected]</username> | |
<time>1674411649.7547</time> | |
<description>/firewall_rules_edit.php made changes</description> | |
</created> | |
</rule> | |
<rule uuid="93d57b38-26ec-461b-91a7-487ff1a0a704"> | |
<type>pass</type> | |
<ipprotocol>inet</ipprotocol> | |
<descr>Default allow LAN to any rule</descr> | |
<interface>lan</interface> | |
<source> | |
<network>lan</network> | |
</source> | |
<destination> | |
<any/> | |
</destination> | |
</rule> | |
<rule uuid="41f6794b-b632-42dd-8424-da8d073b2e8f"> | |
<type>pass</type> | |
<ipprotocol>inet6</ipprotocol> | |
<descr>Default allow LAN IPv6 to any rule</descr> | |
<interface>lan</interface> | |
<source> | |
<network>lan</network> | |
</source> | |
<destination> | |
<any/> | |
</destination> | |
</rule> | |
<rule uuid="d32191ff-5fc9-4c42-9a26-6f648535a3cc"> | |
<type>pass</type> | |
<interface>opt5</interface> | |
<ipprotocol>inet</ipprotocol> | |
<statetype>keep state</statetype> | |
<descr>Allow All – WG</descr> | |
<direction>in</direction> | |
<quick>1</quick> | |
<source> | |
<any>1</any> | |
</source> | |
<destination> | |
<any>1</any> | |
</destination> | |
<updated> | |
<username>[email protected]</username> | |
<time>1674177381.1914</time> | |
<description>/firewall_rules_edit.php made changes</description> | |
</updated> | |
<created> | |
<username>[email protected]</username> | |
<time>1674177381.1914</time> | |
<description>/firewall_rules_edit.php made changes</description> | |
</created> | |
</rule> | |
</filter> | |
<rrd> | |
<enable/> | |
</rrd> | |
<load_balancer> | |
<monitor_type> | |
<name>ICMP</name> | |
<type>icmp</type> | |
<descr>ICMP</descr> | |
<options/> | |
</monitor_type> | |
<monitor_type> | |
<name>TCP</name> | |
<type>tcp</type> | |
<descr>Generic TCP</descr> | |
<options/> | |
</monitor_type> | |
<monitor_type> | |
<name>HTTP</name> | |
<type>http</type> | |
<descr>Generic HTTP</descr> | |
<options> | |
<path>/</path> | |
<host/> | |
<code>200</code> | |
</options> | |
</monitor_type> | |
<monitor_type> | |
<name>HTTPS</name> | |
<type>https</type> | |
<descr>Generic HTTPS</descr> | |
<options> | |
<path>/</path> | |
<host/> | |
<code>200</code> | |
</options> | |
</monitor_type> | |
<monitor_type> | |
<name>SMTP</name> | |
<type>send</type> | |
<descr>Generic SMTP</descr> | |
<options> | |
<send/> | |
<expect>220 *</expect> | |
</options> | |
</monitor_type> | |
</load_balancer> | |
<ntpd> | |
<prefer>0.opnsense.pool.ntp.org</prefer> | |
</ntpd> | |
<widgets> | |
<sequence>system_information-container:00000000-col3:show,services_status-container:00000001-col4:show,gateways-container:00000002-col4:show,interface_list-container:00000003-col4:show</sequence> | |
<column_count>2</column_count> | |
</widgets> | |
<revision> | |
<username>[email protected]</username> | |
<time>1674944123.1917</time> | |
<description>user "root" changed</description> | |
</revision> | |
<OPNsense> | |
<captiveportal version="1.0.1"> | |
<zones/> | |
<templates/> | |
</captiveportal> | |
<cron version="1.0.3"> | |
<jobs/> | |
</cron> | |
<Firewall> | |
<Lvtemplate version="0.0.1"> | |
<templates/> | |
</Lvtemplate> | |
<Category version="1.0.0"> | |
<categories/> | |
</Category> | |
<Alias version="1.0.1"> | |
<geoip> | |
<url/> | |
</geoip> | |
<aliases> | |
<alias uuid="505156d7-6c0b-4ef8-9a12-9b2614b04385"> | |
<enabled>1</enabled> | |
<name>WireGuard_Routed_Devices</name> | |
<type>network</type> | |
<proto/> | |
<interface/> | |
<counters>0</counters> | |
<updatefreq/> | |
<content>192.168.1.103/32 | |
192.168.1.104/29 | |
192.168.1.112/28 | |
192.168.1.128/25</content> | |
<categories/> | |
<description/> | |
</alias> | |
<alias uuid="674b99c4-a2af-4e40-8e02-1d85ec675084"> | |
<enabled>1</enabled> | |
<name>RFC1918_Networks</name> | |
<type>network</type> | |
<proto/> | |
<interface/> | |
<counters>0</counters> | |
<updatefreq/> | |
<content>192.168.0.0/16 | |
10.0.0.0/8 | |
172.16.0.0/12</content> | |
<categories/> | |
<description/> | |
</alias> | |
</aliases> | |
</Alias> | |
</Firewall> | |
<Netflow version="1.0.1"> | |
<capture> | |
<interfaces/> | |
<egress_only/> | |
<version>v9</version> | |
<targets/> | |
</capture> | |
<collect> | |
<enable>0</enable> | |
</collect> | |
<activeTimeout>1800</activeTimeout> | |
<inactiveTimeout>15</inactiveTimeout> | |
</Netflow> | |
<IDS version="1.0.7"> | |
<rules/> | |
<policies/> | |
<userDefinedRules/> | |
<files/> | |
<fileTags/> | |
<general> | |
<enabled>0</enabled> | |
<ips>0</ips> | |
<promisc>0</promisc> | |
<interfaces>wan</interfaces> | |
<homenet>192.168.0.0/16,10.0.0.0/8,172.16.0.0/12</homenet> | |
<defaultPacketSize/> | |
<UpdateCron/> | |
<AlertLogrotate>W0D23</AlertLogrotate> | |
<AlertSaveLogs>4</AlertSaveLogs> | |
<MPMAlgo>ac</MPMAlgo> | |
<detect> | |
<Profile>medium</Profile> | |
<toclient_groups/> | |
<toserver_groups/> | |
</detect> | |
<syslog>0</syslog> | |
<syslog_eve>0</syslog_eve> | |
<LogPayload>0</LogPayload> | |
</general> | |
</IDS> | |
<IPsec version="1.0.1"> | |
<general> | |
<enabled/> | |
</general> | |
<keyPairs/> | |
<preSharedKeys/> | |
</IPsec> | |
<Interfaces> | |
<vxlans version="1.0.1"/> | |
<loopbacks version="1.0.0"/> | |
</Interfaces> | |
<monit version="1.0.11"> | |
<general> | |
<enabled>0</enabled> | |
<interval>120</interval> | |
<startdelay>120</startdelay> | |
<mailserver>127.0.0.1</mailserver> | |
<port>25</port> | |
<username/> | |
<password/> | |
<ssl>0</ssl> | |
<sslversion>auto</sslversion> | |
<sslverify>1</sslverify> | |
<logfile>syslog facility log_daemon</logfile> | |
<statefile/> | |
<eventqueuePath/> | |
<eventqueueSlots/> | |
<httpdEnabled>0</httpdEnabled> | |
<httpdUsername>root</httpdUsername> | |
<httpdPassword>KhZpyvGvVqBrjJCqnFu</httpdPassword> | |
<httpdPort>2812</httpdPort> | |
<httpdAllow/> | |
<mmonitUrl/> | |
<mmonitTimeout>5</mmonitTimeout> | |
<mmonitRegisterCredentials>1</mmonitRegisterCredentials> | |
</general> | |
<alert uuid="315e6e11-d101-47c9-8c96-b3ad9c5aba9f"> | |
<enabled>0</enabled> | |
<recipient>[email protected]</recipient> | |
<noton>0</noton> | |
<events/> | |
<format/> | |
<reminder>10</reminder> | |
<description/> | |
</alert> | |
<service uuid="64fbcc2a-62e7-47cf-a342-8961b83197ee"> | |
<enabled>1</enabled> | |
<name>$HOST</name> | |
<description/> | |
<type>system</type> | |
<pidfile/> | |
<match/> | |
<path/> | |
<timeout>300</timeout> | |
<address/> | |
<interface/> | |
<start/> | |
<stop/> | |
<tests>c77429f2-9c57-4f56-a018-890ccd966278,a9556376-a944-48fd-b753-12c6d956adf7,820091ca-133f-4b72-83fc-edf83f6594fb,739c734b-395a-4062-bbc3-e7e6518fbcc3</tests> | |
<depends/> | |
<polltime/> | |
</service> | |
<service uuid="243bed69-6fde-44fa-8e77-23ce3af3531a"> | |
<enabled>1</enabled> | |
<name>RootFs</name> | |
<description/> | |
<type>filesystem</type> | |
<pidfile/> | |
<match/> | |
<path>/</path> | |
<timeout>300</timeout> | |
<address/> | |
<interface/> | |
<start/> | |
<stop/> | |
<tests>bf5140b8-7545-4188-b47b-fb29501650bd</tests> | |
<depends/> | |
<polltime/> | |
</service> | |
<service uuid="9de4dd16-dfd1-4b02-9706-a9e24a242a1f"> | |
<enabled>0</enabled> | |
<name>carp_status_change</name> | |
<description/> | |
<type>custom</type> | |
<pidfile/> | |
<match/> | |
<path>/usr/local/opnsense/scripts/OPNsense/Monit/carp_status</path> | |
<timeout>300</timeout> | |
<address/> | |
<interface/> | |
<start/> | |
<stop/> | |
<tests>1c179742-6570-46bf-a343-8bedcf910b25</tests> | |
<depends/> | |
<polltime/> | |
</service> | |
<service uuid="c19defcf-d847-4d73-a3b0-d17201095f66"> | |
<enabled>0</enabled> | |
<name>gateway_alert</name> | |
<description/> | |
<type>custom</type> | |
<pidfile/> | |
<match/> | |
<path>/usr/local/opnsense/scripts/OPNsense/Monit/gateway_alert</path> | |
<timeout>300</timeout> | |
<address/> | |
<interface/> | |
<start/> | |
<stop/> | |
<tests>a8b6b926-331a-4bc4-a221-a5fa957a3c43</tests> | |
<depends/> | |
<polltime/> | |
</service> | |
<test uuid="1ec402c5-57fa-45a5-af63-2b1798ba9b53"> | |
<name>Ping</name> | |
<type>NetworkPing</type> | |
<condition>failed ping</condition> | |
<action>alert</action> | |
<path/> | |
</test> | |
<test uuid="969f9bb7-06d8-4c9a-9a33-f79418d8bd66"> | |
<name>NetworkLink</name> | |
<type>NetworkInterface</type> | |
<condition>failed link</condition> | |
<action>alert</action> | |
<path/> | |
</test> | |
<test uuid="109abb3b-cde9-4a1a-99da-d0d89096136c"> | |
<name>NetworkSaturation</name> | |
<type>NetworkInterface</type> | |
<condition>saturation is greater than 75%</condition> | |
<action>alert</action> | |
<path/> | |
</test> | |
<test uuid="c77429f2-9c57-4f56-a018-890ccd966278"> | |
<name>MemoryUsage</name> | |
<type>SystemResource</type> | |
<condition>memory usage is greater than 75%</condition> | |
<action>alert</action> | |
<path/> | |
</test> | |
<test uuid="a9556376-a944-48fd-b753-12c6d956adf7"> | |
<name>CPUUsage</name> | |
<type>SystemResource</type> | |
<condition>cpu usage is greater than 75%</condition> | |
<action>alert</action> | |
<path/> | |
</test> | |
<test uuid="820091ca-133f-4b72-83fc-edf83f6594fb"> | |
<name>LoadAvg1</name> | |
<type>SystemResource</type> | |
<condition>loadavg (1min) is greater than 4</condition> | |
<action>alert</action> | |
<path/> | |
</test> | |
<test uuid="739c734b-395a-4062-bbc3-e7e6518fbcc3"> | |
<name>LoadAvg5</name> | |
<type>SystemResource</type> | |
<condition>loadavg (5min) is greater than 3</condition> | |
<action>alert</action> | |
<path/> | |
</test> | |
<test uuid="3cc419ad-e5a1-4f22-8f73-8a1053fbc320"> | |
<name>LoadAvg15</name> | |
<type>SystemResource</type> | |
<condition>loadavg (15min) is greater than 2</condition> | |
<action>alert</action> | |
<path/> | |
</test> | |
<test uuid="bf5140b8-7545-4188-b47b-fb29501650bd"> | |
<name>SpaceUsage</name> | |
<type>SpaceUsage</type> | |
<condition>space usage is greater than 75%</condition> | |
<action>alert</action> | |
<path/> | |
</test> | |
<test uuid="1c179742-6570-46bf-a343-8bedcf910b25"> | |
<name>ChangedStatus</name> | |
<type>ProgramStatus</type> | |
<condition>changed status</condition> | |
<action>alert</action> | |
<path/> | |
</test> | |
<test uuid="a8b6b926-331a-4bc4-a221-a5fa957a3c43"> | |
<name>NonZeroStatus</name> | |
<type>ProgramStatus</type> | |
<condition>status != 0</condition> | |
<action>alert</action> | |
<path/> | |
</test> | |
</monit> | |
<OpenVPNExport version="0.0.1"> | |
<servers/> | |
</OpenVPNExport> | |
<proxy version="1.0.5"> | |
<general> | |
<enabled>0</enabled> | |
<error_pages>opnsense</error_pages> | |
<icpPort/> | |
<logging> | |
<enable> | |
<accessLog>1</accessLog> | |
<storeLog>1</storeLog> | |
</enable> | |
<ignoreLogACL/> | |
<target/> | |
</logging> | |
<alternateDNSservers/> | |
<dnsV4First>0</dnsV4First> | |
<forwardedForHandling>on</forwardedForHandling> | |
<uriWhitespaceHandling>strip</uriWhitespaceHandling> | |
<enablePinger>1</enablePinger> | |
<useViaHeader>1</useViaHeader> | |
<suppressVersion>0</suppressVersion> | |
<connecttimeout/> | |
<VisibleEmail>[email protected]</VisibleEmail> | |
<VisibleHostname/> | |
<cache> | |
<local> | |
<enabled>0</enabled> | |
<directory>/var/squid/cache</directory> | |
<cache_mem>256</cache_mem> | |
<maximum_object_size/> | |
<maximum_object_size_in_memory/> | |
<memory_cache_mode>always</memory_cache_mode> | |
<size>100</size> | |
<l1>16</l1> | |
<l2>256</l2> | |
<cache_linux_packages>0</cache_linux_packages> | |
<cache_windows_updates>0</cache_windows_updates> | |
</local> | |
</cache> | |
<traffic> | |
<enabled>0</enabled> | |
<maxDownloadSize>2048</maxDownloadSize> | |
<maxUploadSize>1024</maxUploadSize> | |
<OverallBandwidthTrotteling>1024</OverallBandwidthTrotteling> | |
<perHostTrotteling>256</perHostTrotteling> | |
</traffic> | |
<parentproxy> | |
<enabled>0</enabled> | |
<host/> | |
<enableauth>0</enableauth> | |
<user>username</user> | |
<password>password</password> | |
<port/> | |
<localdomains/> | |
<localips/> | |
</parentproxy> | |
</general> | |
<forward> | |
<interfaces>lan</interfaces> | |
<port>3128</port> | |
<sslbumpport>3129</sslbumpport> | |
<sslbump>0</sslbump> | |
<sslurlonly>0</sslurlonly> | |
<sslcertificate/> | |
<sslnobumpsites/> | |
<ssl_crtd_storage_max_size>4</ssl_crtd_storage_max_size> | |
<sslcrtd_children>5</sslcrtd_children> | |
<snmp_enable>0</snmp_enable> | |
<snmp_port>3401</snmp_port> | |
<snmp_password>public</snmp_password> | |
<ftpInterfaces/> | |
<ftpPort>2121</ftpPort> | |
<ftpTransparentMode>0</ftpTransparentMode> | |
<addACLforInterfaceSubnets>1</addACLforInterfaceSubnets> | |
<transparentMode>0</transparentMode> | |
<acl> | |
<allowedSubnets/> | |
<unrestricted/> | |
<bannedHosts/> | |
<whiteList/> | |
<blackList/> | |
<browser/> | |
<mimeType/> | |
<googleapps/> | |
<youtube/> | |
<safePorts>80:http,21:ftp,443:https,70:gopher,210:wais,1025-65535:unregistered ports,280:http-mgmt,488:gss-http,591:filemaker,777:multiling http</safePorts> | |
<sslPorts>443:https</sslPorts> | |
<remoteACLs> | |
<blacklists/> | |
<UpdateCron/> | |
</remoteACLs> | |
</acl> | |
<icap> | |
<enable>0</enable> | |
<RequestURL>icap://[::1]:1344/avscan</RequestURL> | |
<ResponseURL>icap://[::1]:1344/avscan</ResponseURL> | |
<SendClientIP>1</SendClientIP> | |
<SendUsername>0</SendUsername> | |
<EncodeUsername>0</EncodeUsername> | |
<UsernameHeader>X-Username</UsernameHeader> | |
<EnablePreview>1</EnablePreview> | |
<PreviewSize>1024</PreviewSize> | |
<OptionsTTL>60</OptionsTTL> | |
<exclude/> | |
</icap> | |
<authentication> | |
<method/> | |
<authEnforceGroup/> | |
<realm>OPNsense proxy authentication</realm> | |
<credentialsttl>2</credentialsttl> | |
<children>5</children> | |
</authentication> | |
</forward> | |
<pac/> | |
<error_pages> | |
<template/> | |
</error_pages> | |
</proxy> | |
<Syslog version="1.0.1"> | |
<general> | |
<enabled>1</enabled> | |
</general> | |
<destinations/> | |
</Syslog> | |
<TrafficShaper version="1.0.3"> | |
<pipes/> | |
<queues/> | |
<rules/> | |
</TrafficShaper> | |
<unboundplus version="1.0.4"> | |
<service_enabled/> | |
<advanced> | |
<hideidentity>0</hideidentity> | |
<hideversion>0</hideversion> | |
<prefetch>0</prefetch> | |
<prefetchkey>0</prefetchkey> | |
<dnssecstripped>0</dnssecstripped> | |
<serveexpired>0</serveexpired> | |
<serveexpiredreplyttl/> | |
<serveexpiredttl/> | |
<serveexpiredttlreset>0</serveexpiredttlreset> | |
<serveexpiredclienttimeout/> | |
<qnameminstrict>0</qnameminstrict> | |
<extendedstatistics>0</extendedstatistics> | |
<logqueries>0</logqueries> | |
<logreplies>0</logreplies> | |
<logtagqueryreply>0</logtagqueryreply> | |
<logverbosity>1</logverbosity> | |
<privatedomain/> | |
<privateaddress>0.0.0.0/8,10.0.0.0/8,100.64.0.0/10,169.254.0.0/16,172.16.0.0/12,192.0.2.0/24,192.168.0.0/16,198.18.0.0/15,198.51.100.0/24,203.0.113.0/24,233.252.0.0/24,::1/128,2001:db8::/32,fc00::/8,fd00::/8,fe80::/10</privateaddress> | |
<insecuredomain/> | |
<msgcachesize/> | |
<rrsetcachesize/> | |
<outgoingnumtcp/> | |
<incomingnumtcp/> | |
<numqueriesperthread/> | |
<outgoingrange/> | |
<jostletimeout/> | |
<cachemaxttl/> | |
<cacheminttl/> | |
<infrahostttl/> | |
<infracachenumhosts/> | |
<unwantedreplythreshold/> | |
</advanced> | |
<dnsbl> | |
<enabled>0</enabled> | |
<type/> | |
<lists/> | |
<whitelists/> | |
<blocklists/> | |
<address/> | |
<nxdomain>0</nxdomain> | |
</dnsbl> | |
<forwarding> | |
<enabled>1</enabled> | |
</forwarding> | |
<dots> | |
<dot uuid="eb35e964-56c8-4706-b6fb-f55fb7ce850a"> | |
<enabled>0</enabled> | |
<type>forward</type> | |
<domain/> | |
<server>1.1.1.1</server> | |
<port>53</port> | |
<verify/> | |
</dot> | |
</dots> | |
<hosts/> | |
<aliases/> | |
<domains/> | |
</unboundplus> | |
<wireguard> | |
<general version="0.0.1"> | |
<enabled>1</enabled> | |
</general> | |
<client version="0.0.7"> | |
<clients> | |
<client uuid="ae418043-cc29-4f94-abd6-27a9803ffc6a"> | |
<enabled>1</enabled> | |
<name>VPS</name> | |
<pubkey></pubkey> | |
<psk/> | |
<tunneladdress>0.0.0.0/0</tunneladdress> | |
<serveraddress></serveraddress> | |
<serverport>51820</serverport> | |
<keepalive>25</keepalive> | |
</client> | |
</clients> | |
</client> | |
<server version="0.0.4"> | |
<servers> | |
<server uuid="756a7c9a-f18e-4c63-9454-ca93e72185a0"> | |
<enabled>1</enabled> | |
<name>WireGuard_VPN</name> | |
<instance>1</instance> | |
<pubkey></pubkey> | |
<privkey></privkey> | |
<port>51820</port> | |
<mtu>1420</mtu> | |
<dns/> | |
<tunneladdress>10.8.0.2/24</tunneladdress> | |
<disableroutes>1</disableroutes> | |
<gateway>10.8.0.240</gateway> | |
<peers>ae418043-cc29-4f94-abd6-27a9803ffc6a</peers> | |
</server> | |
</servers> | |
</server> | |
</wireguard> | |
<Swanctl version="1.0.0"> | |
<Connections/> | |
<locals/> | |
<remotes/> | |
<children/> | |
<Pools/> | |
<VTIs/> | |
<SPDs/> | |
</Swanctl> | |
</OPNsense> | |
<vlans version="1.0.0"> | |
<vlan/> | |
</vlans> | |
<staticroutes version="1.0.0"> | |
<route/> | |
</staticroutes> | |
<bridges> | |
<bridged/> | |
</bridges> | |
<gifs> | |
<gif/> | |
</gifs> | |
<gres> | |
<gre/> | |
</gres> | |
<ca/> | |
<gateways> | |
<gateway_item> | |
<interface>opt5</interface> | |
<gateway>10.8.0.240</gateway> | |
<name>WireGuard</name> | |
<priority>255</priority> | |
<weight>1</weight> | |
<ipprotocol>inet</ipprotocol> | |
<interval/> | |
<descr/> | |
<monitor>10.8.0.1</monitor> | |
<fargw>1</fargw> | |
</gateway_item> | |
</gateways> | |
<virtualip version="1.0.0"/> | |
<cert> | |
<refid>638682ed1f3b2</refid> | |
<descr>Web GUI TLS certificate</descr> | |
<crt>LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUhORENDQlJ5Z0F3SUJBZ0lVTXpDaWp0OW9QMThoYk9mcmxGQWNZV01OVzZFd0RRWUpLb1pJaHZjTkFRRUwKQlFBd2dZa3hIVEFiQmdOVkJBTU1GRTlRVG5ObGJuTmxMbXh2WTJGc1pHOXRZV2x1TVFzd0NRWURWUVFHRXdKTwpUREVWTUJNR0ExVUVDQXdNV25WcFpDMUliMnhzWVc1a01SVXdFd1lEVlFRSERBeE5hV1JrWld4b1lYSnVhWE14CkxUQXJCZ05WQkFvTUpFOVFUbk5sYm5ObElITmxiR1l0YzJsbmJtVmtJSGRsWWlCalpYSjBhV1pwWTJGMFpUQWUKRncweU1qRXhNamt5TWpBNE5EVmFGdzB5TXpFeU16RXlNakE0TkRWYU1JR0pNUjB3R3dZRFZRUUREQlJQVUU1egpaVzV6WlM1c2IyTmhiR1J2YldGcGJqRUxNQWtHQTFVRUJoTUNUa3d4RlRBVEJnTlZCQWdNREZwMWFXUXRTRzlzCmJHRnVaREVWTUJNR0ExVUVCd3dNVFdsa1pHVnNhR0Z5Ym1sek1TMHdLd1lEVlFRS0RDUlBVRTV6Wlc1elpTQnoKWld4bUxYTnBaMjVsWkNCM1pXSWdZMlZ5ZEdsbWFXTmhkR1V3Z2dJaU1BMEdDU3FHU0liM0RRRUJBUVVBQTRJQwpEd0F3Z2dJS0FvSUNBUURQQ01IVmlRSE9lUkdaZ3REM0F5OW5DdWdXaWhYV0I2MXVvSWptSm5oT2trakU3Z0NDCnNCS3hvV2tFUVdxU2M4NmZyVWY1aTAxYXFBTDhGR0d3ODBZK1lLU0ZMM3BuVXBxcWJVUWpyR1V2WE8ybUxFOGwKUGVnVHBVYmYyOEpjRUxSa0NtZGYxeGtTdFRqQ09uelNERFZ6a2xiS2ZwOEJtYlRidHJLM25GMGY2SUp5VE5kRwpSeC9yRzNuT3psdTBGSUhmQkxreVBZVVZqem9iMFlPN2h0bjJydzkzYmNwbTNhNXZhMTRGcGJtd0NMMWhhUHZhCkgwWnJMWUVWaXJKZ2pJSlpXSkE3a0lqcHZNQkI3bjJRVDF5U2taWUtWSUFkQndPS1NmZjlwZmtLZnNPRjQ2T24KeTMvdmpZODZXRWU4eTI3Rnp6dWhnNVQxK0FJTEhhdjhlR09yVUFlTlVZM2ZQWStsQUttZ1JYc3Y5VElYRkhYUQplNm9CeU52cTBXeElWMTdpWWc2M3NhVFNzSHBxMGZkaSs2TlpLUWJHUnpFeFZ2RWpDU3NLbjYwNTZ5WVRhNS9WCjF3VnV1Wm9OK3ZYYUFPYlNjSUF4NUVPV2Rna2YzbFcyQURkYWxCcEVKOWdqcG5LQnhwWHd1eWVRUlRJTFZTMTcKS2c0RVJJaVNiSUxJRHhTTzYzZDZNMngvWEFWRHNBSVZJM3ZYNmI1VHNTK2NrTmYwSldQT2YvWDRjWThBdVFvMQp4UGI4cThVdFZ3ZW9CSGtib01YbVdOWXdocTVMdnVsZnozQmNVdHdFQUlaVlNhY3N0ZDFqYmw5dW5MYWtVQi9kCkxQbDFPSnNzeFByRUhaNFBSTlphUWV4Qm1qcXY1WG94K3ZTRGlLcG5hQ0FPb0MyY3U0eTdta1FYUlFJREFRQUIKbzRJQmtEQ0NBWXd3Q1FZRFZSMFRCQUl3QURBUkJnbGdoa2dCaHZoQ0FRRUVCQU1DQmtBd05BWUpZSVpJQVliNApRZ0VOQkNjV0pVOVFUbk5sYm5ObElFZGxibVZ5WVhSbFpDQlRaWEoyWlhJZ1EyVnlkR2xtYVdOaGRHVXdIUVlEClZSME9CQllFRk1pMnpEMkJOMmNsWkdkcHhvTExhM09pL2NQS01JSEpCZ05WSFNNRWdjRXdnYjZBRk1pMnpEMkIKTjJjbFpHZHB4b0xMYTNPaS9jUEtvWUdQcElHTU1JR0pNUjB3R3dZRFZRUUREQlJQVUU1elpXNXpaUzVzYjJOaApiR1J2YldGcGJqRUxNQWtHQTFVRUJoTUNUa3d4RlRBVEJnTlZCQWdNREZwMWFXUXRTRzlzYkdGdVpERVZNQk1HCkExVUVCd3dNVFdsa1pHVnNhR0Z5Ym1sek1TMHdLd1lEVlFRS0RDUlBVRTV6Wlc1elpTQnpaV3htTFhOcFoyNWwKWkNCM1pXSWdZMlZ5ZEdsbWFXTmhkR1dDRkRNd29vN2ZhRDlmSVd6bjY1UlFIR0ZqRFZ1aE1CMEdBMVVkSlFRVwpNQlFHQ0NzR0FRVUZCd01CQmdnckJnRUZCUWdDQWpBTEJnTlZIUThFQkFNQ0JhQXdId1lEVlIwUkJCZ3dGb0lVClQxQk9jMlZ1YzJVdWJHOWpZV3hrYjIxaGFXNHdEUVlKS29aSWh2Y05BUUVMQlFBRGdnSUJBTFk1SUd0UFJidW8KUGdRaVBEQ2QxbitOWlhGQXRYU2N0UDFhemZ1OGVQVVBQUlJReVFvMUYya1JqYzBsTjFZUldaM3pEQTNpbGxlVQpaMWptWmR3WGZRUnJuY0liSDhWY2xaN0hmZjhMRk5LL1EwdTZDVkJkODZiSXMzVU5TUE92ZjlsS1BtTzFWaDBmClpuUEZNS1ZOcEc5VXhpQ2kzaVpvdGNiTDRSeWIzOW5YMU1jRGk3RVFqUUNVNHVaOSsxeXd3WXpqRW1hV2xrWEoKcy9TL29uTjhSblR3UGpqZlBUNGVPbTRGazVQQVV1QkhKMnZMczlhYXpuaVR0ZVJ6aW8xazJPeVJuZkh4YkYvbgp1N3h4ZVNCSXFrN25WWC95OUtSTmhFMllLNy9UeGNPeStuMmlxUmhPeDJteEhzeXI0aVMraDMxR3NGakRQMkp5CkVORytjbEVkREhyMWN3N0ZmVHpMangyelViOFNIVk5GcnoyblFQRXB2QWgrS0Z2SEZHanZVbXpicUVrdXhNREwKSXFzWWxlZVppWjhUNG0wYWpHNWlOWWMzYm5TT0x4TklzcE9JeWJ6cnRoSnlhZjBHWlNONXZYVGgxZS9UWm8wdQpIVk41WXRhcW9BMFJDT3krN3pmZkY5TnBhTGgreU1nRjJnTUhaeXJBWm82SG94VTBiUVY4S0pjV0UzQW1razdRCjdsNkIyb2JKVEYwd0FrSHY0bTRqaDFJUFBxdEFRM1IyeERQcFEvK21HazVvSHRYb1hTejUxR2Y5eGRoaVhoQlgKdEtrOXduVy9WNk1Ldk43N242cHh6SHA3UHZjTmhISVhZQTR1Vm9wMVJQTDFKWDhaNzZFN3duTEMrQkNxT3ZFOApaVmRoMDlVOHlHOFRTTU9DVk42bUJzZ1JveVFvUWxWZQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==</crt> | |
<prv>LS0tLS1CRUdJTiBQUklWQVRFIEtFWS0tLS0tCk1JSUpRZ0lCQURBTkJna3Foa2lHOXcwQkFRRUZBQVNDQ1N3d2dna29BZ0VBQW9JQ0FRRFBDTUhWaVFIT2VSR1oKZ3REM0F5OW5DdWdXaWhYV0I2MXVvSWptSm5oT2trakU3Z0NDc0JLeG9Xa0VRV3FTYzg2ZnJVZjVpMDFhcUFMOApGR0d3ODBZK1lLU0ZMM3BuVXBxcWJVUWpyR1V2WE8ybUxFOGxQZWdUcFViZjI4SmNFTFJrQ21kZjF4a1N0VGpDCk9uelNERFZ6a2xiS2ZwOEJtYlRidHJLM25GMGY2SUp5VE5kR1J4L3JHM25Pemx1MEZJSGZCTGt5UFlVVmp6b2IKMFlPN2h0bjJydzkzYmNwbTNhNXZhMTRGcGJtd0NMMWhhUHZhSDBackxZRVZpckpnaklKWldKQTdrSWpwdk1CQgo3bjJRVDF5U2taWUtWSUFkQndPS1NmZjlwZmtLZnNPRjQ2T255My92alk4NldFZTh5MjdGenp1aGc1VDErQUlMCkhhdjhlR09yVUFlTlVZM2ZQWStsQUttZ1JYc3Y5VElYRkhYUWU2b0J5TnZxMFd4SVYxN2lZZzYzc2FUU3NIcHEKMGZkaSs2TlpLUWJHUnpFeFZ2RWpDU3NLbjYwNTZ5WVRhNS9WMXdWdXVab04rdlhhQU9iU2NJQXg1RU9XZGdrZgozbFcyQURkYWxCcEVKOWdqcG5LQnhwWHd1eWVRUlRJTFZTMTdLZzRFUklpU2JJTElEeFNPNjNkNk0yeC9YQVZECnNBSVZJM3ZYNmI1VHNTK2NrTmYwSldQT2YvWDRjWThBdVFvMXhQYjhxOFV0Vndlb0JIa2JvTVhtV05Zd2hxNUwKdnVsZnozQmNVdHdFQUlaVlNhY3N0ZDFqYmw5dW5MYWtVQi9kTFBsMU9Kc3N4UHJFSFo0UFJOWmFRZXhCbWpxdgo1WG94K3ZTRGlLcG5hQ0FPb0MyY3U0eTdta1FYUlFJREFRQUJBb0lDQUQrL0Q0ZkROcll2V3Zic2E1RVMvdjU0ClFqdm1hcERMTG1CNHQ0NDkzQjg5TllERlU0enB6K2UzcmxFc0h6ZFd4eEV0VnBNRWpGM1VpNDY0YTlnREgrYkcKOVFFNVBEUWlJQk5IcjRwWVk1Tnd4bys2NXVldHB3NmRmalFoUXpmN3dMOW80S21HM21aL1BDbTV2b01pVlRidgpvUithV3pVdjhac1JKdmdZQWloMysrcGJ0SkVrQnpUcDhkaDJlNC80SElEaHdIQXl0dzZMV2pZRWpjNG8yR1gzClF3amYya2xRQ295dC8zWTNyL1Arek9qNFhVdXRBNDZ1cFNkUDNGcVVDUEtmclZGWjBINC9xdWJpR3ZGYkxrTEcKNXU3cFU4VWNTci9DeE1QcDNjT1lnblZ3UVF6Q1FQTXVvQ0l6Mm1yTUxLQmxqWlBPb3dnVlEvUE9RQTF0dUNvUwpRWWlCclVZTFNrc0VNV3NpMk1ZanFsQXpJL2NJTHFJc1Z5VnIrUmxlcHI4NnBQbXhYaXhueWJhYkRLUFRxeDlHCnE1M3RSUjY3Tm4zcWprTWoraTRHL3ZXZjh3UWVacE9EQVFoTWQvWjJQNlNDRUU5RnhNV3BTUGtPRk9hbktQb1UKTERSbVlReHY5akx6ZExiNVpoaHZhWWFxMnphNVcweEtjaG9PYStqUDNqdWZQamErYXNQVDNhUVFLeW5rdzRhYwp1RWN5QnFSYVpabVF2dWlrZDA1enA4Vm5ZQTM5endFeVRrSW9Gd2Y2aU9zMFBzUmdGYUFyK3V1SnB2d2doSkxuCnhlOTgwS3lVdVBMNmdhWml4cVhNMHJaOVpZUVJlM3FEL2VJZmd5cHVvcVJmL1A2b3g1NlBKYml4Nmx5N3E2STYKMVN4UjNURkNKc0t1ZmpyMlI3ZkJBb0lCQVFEMzlJd2Z3aSthd21tVjR2ZXZ5bnFRM21zUHliOXpZamdFSno3UApqV0p1TG1CTnNMZFo2aFhoL05VaUJ4NUhmWE1tL2kvTmI0anpQd1djbER6Wk5Wb3E2NmtFbWdaZ0JMeWxVS2pPCkdlaVVXWG1WT05MekczUU94dEpPTC9TdkZxOWxpVFZOUnhERW85cVFHYXdTOGF0emRVOVpPTDV3Z3dndXkrNUIKWk42b04zYkdtS3RyaWZDRk5ReVpzZm9RaE5IREJ5VlhrTzZnbFR5MGNENEFqSHlCZDFuWXkrSFAwQmxBd0F1QwpNY3FBN0QyMDdOTTJ6UDBxVnFmZ1A2YSszdUI4clpxR3JlTEhkd1NzcGcwNjFiYXNJZlB3a3NoS3N3WWdGSWNMCm1kMFB4R3V3aFpVa3dmMlgxRFBjN2p5bzJka09veWp5cE9haWdnK3RRRHdjN0FDUkFvSUJBUURWd0ZSOXVoU3cKYVBSWFpmVkwzbkdEaDUvc0crdTdkOXBHRjBMcFE5cEJWV0JoSGg3cHBwZ2txd3hJZy9QMmt6Rm4rN2RWd0hDYQpWV0FVQmMwdERBQkRtTHRIblpjZWQ4SlYvdUpCNEpaUjVZVmp4bEhwZXh4dFpDVm81V210bDFqeVJ1aytaQWJICmI4d3l2MFhJNDlQR1lpT3FiekUwWDNaQ1BHbXozVld1L0U4NCt2OUpLb3p0bXQ2Wi90WGxVRkc0cVhTVUZNS2EKc09sZTU3K1pCdEtXT3p5VEErTzFwLytUK3BWMnljL3g0cnRzdXVMQzZiSm9heTd4c3Q5bGxZTTl1dXlFZk1VYQo0MlQ1MkVxSmZQL1hNNDYyOWZFaUszenJCdnRxaDA0ZkU5R21DS2JsekVFMWFMVG1FRzlKczNtOStNckx4OUdrCmUrMmIrRGRTbFFWMUFvSUJBQkFyb0ovSm1EVXRqSms3emc5bTB3dHpsZVBYc21haDl5aytMZmgzTGY0bGhCNU0KOGdncEhmZzQ5dVZiTlh4UUVCeHc0MGt3aHV2bUprV0ozVllGQnJaWjNCSHl3WXV0ZzJmOGxLV3NSdUMxM1JvQQpOTEdxRHEyUUJkTVhpWXVKblRLditndnFJSXZTYThTT0NBek1PZlF6cUZNWFFrUXdKMjUxMmpubGpDZklSalM1CmJDUjlRSFJQZTF6aW9INUhTeTYrM282Ull4NlIzUDJmZkV1bzNjM0xyTTVZcllkUitQT2lFcDRSQlRYWE1rY0UKVXRuMkVHU2NkaUpIeEdZYVB1V2lwTHMzeDl4ZVJLM0Z2b01od09JRTdOVzVuTnBTUm9uOURMbVM5VG04QTVIbApoRTU3WUVCd2xGbEtLQ2FTM25iMzZRbTUrMWlKeHQvem1uZ0FaQ0VDZ2dFQkFKMnNKT2NsVjFPVjUvOThSMGh5Cnlyc2lWVFplbGpJUVErT0dEeVp3bGRPeHZjbUY1WG1uR1AyYmF4RW12TlE3V2F1Qmc0aHV6dUVaYnlqMTZwWjcKRHNyT0kvKzg0SmRwOGVGcmhjemdkU0h1TThvWXBaMmI0YWxUd1VDeVVaVHFXb05GQ1pLclNGRGZSL3A3RzJnSApudFRzMmJCRUcwQ3QxbGNmcHowMVhKb2FwZm03TklydEowMngrdGdQb2dwb2lBKzJlRGN2WlNta3JGRUVsRkcyCk5hcjZBVUhWRWFpVFJ6VUtHQ3lxeTRoN0hwUWkrMWlaK0srTHVQSXpaeFRSQ0NHRi9DZnl2WmFLL0paTUZSZDgKTEdDN09GLy81YUsxLzR5Qzl2eHEySmFXRVFUdnh1VW1HVWZqZCtWcFpCNHlsUEFzVUxPbkx4NnRCK1lRWUFhNwp4RzBDZ2dFQVB3V29MUDZ3ZDZDMGJHK0FQK3E2MGovbE96c1pNblpLTmNyQjdCWHNzL0hvRkJHYVZoNm5yWTkvClhHSklmSTlPeDNMN2g4MENCL3c2TzJ0UDJlNGhNSlFLbzNDUVZYZitNUnJmWkIwOTNUVGtmd2Y4U1pIYnh4YVoKVlpacytEYTExQmFjZEhxRU9najBVSnRFWVdnT1JnNW1CNTFINVNSSHNTUk03NllPczVwOVFzbFdMRGNaYTY4NAoxNlRXbzJvZnRtcmZKN0F3ME9YSFlYR3dhcXcwdE5oSkdMZmg4eTFKa3BXdDBqRm5JSzVnejRYTmpnQU53K0IzCmVEaVhkQWlVU1VEMEdTVG8zdTQyWkVHVnRuang2dEh4eElsL1Q2SGFOQXhuRGd0VjA0eGRNWEc2UTUwenVURU4KNkYzQXRrekdhWmVGNzEwT0IxU2tuYWYyakpBRGFRPT0KLS0tLS1FTkQgUFJJVkFURSBLRVktLS0tLQo=</prv> | |
</cert> | |
<ppps> | |
<ppp/> | |
</ppps> | |
<laggs> | |
<lagg/> | |
</laggs> | |
<wireless> | |
<clone/> | |
</wireless> | |
</opnsense> |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment