opnsense-dark vfs.read_max Increase UFS read-ahead speeds to match the state of hard drives and NCQ. net.inet.ip.portrange.first Set the ephemeral port range to be lower. net.inet.tcp.blackhole Drop packets to closed TCP ports without returning a RST net.inet.udp.blackhole Do not send ICMP port unreachable messages for closed UDP ports net.inet.ip.random_id Randomize the ID field in IP packets net.inet.ip.sourceroute Source routing is another way for an attacker to try to reach non-routable addresses behind your box. It can also be used to probe for information about your internal networks. These functions come enabled as part of the standard FreeBSD core system. net.inet.ip.accept_sourceroute Source routing is another way for an attacker to try to reach non-routable addresses behind your box. It can also be used to probe for information about your internal networks. These functions come enabled as part of the standard FreeBSD core system. net.inet.icmp.log_redirect This option turns off the logging of redirect packets because there is no limit and this could fill up your logs consuming your whole hard drive. net.inet.tcp.drop_synfin Drop SYN-FIN packets (breaks RFC1379, but nobody uses it anyway) net.inet6.ip6.redirect Enable sending IPv6 redirects net.inet6.ip6.use_tempaddr Enable privacy settings for IPv6 (RFC 4941) net.inet6.ip6.prefer_tempaddr Prefer privacy addresses and use them over the normal addresses net.inet.tcp.syncookies Generate SYN cookies for outbound SYN-ACK packets net.inet.tcp.recvspace Maximum incoming/outgoing TCP datagram size (receive) net.inet.tcp.sendspace Maximum incoming/outgoing TCP datagram size (send) net.inet.tcp.delayed_ack Do not delay ACK to try and piggyback it onto a data packet net.inet.udp.maxdgram Maximum outgoing UDP datagram size net.link.bridge.pfil_onlyip Handling of non-IP packets which are not passed to pfil (see if_bridge(4)) net.link.bridge.pfil_local_phys Set to 1 to additionally filter on the physical interface for locally destined packets net.link.bridge.pfil_member Set to 0 to disable filtering on the incoming and outgoing member interfaces. net.link.bridge.pfil_bridge Set to 1 to enable filtering on the bridge interface net.link.tap.user_open Allow unprivileged access to tap(4) device nodes kern.randompid Randomize PID's (see src/sys/kern/kern_fork.c: sysctl_kern_randompid()) hw.syscons.kbd_reboot Disable CTRL+ALT+Delete reboot from keyboard. net.inet.tcp.log_debug Enable TCP extended debugging net.inet.icmp.icmplim Set ICMP Limits net.inet.tcp.tso TCP Offload Engine net.inet.udp.checksum UDP Checksums kern.ipc.maxsockbuf Maximum socket buffer size vm.pmap.pti 0 Page Table Isolation (Meltdown mitigation, requires reboot.) hw.ibrs_disable 1 Disable Indirect Branch Restricted Speculation (Spectre V2 mitigation) security.bsd.see_other_gids Hide processes running as other groups security.bsd.see_other_uids Hide processes running as other users net.inet.ip.redirect Enable/disable sending of ICMP redirects in response to IP packets for which a better, and for the sender directly reachable, route and next hop is known. net.local.dgram.maxdgram Maximum outgoing UDP datagram size conservative rno1 home.arpa 1999 admins system System Administrators page-all 0,2000 0 root 0 system c3NoLWVkMjU1MTkgQUFBQUMzTnphQzFsWkRJMU5URTVBQUFBSVB6eWRlMk1CTEhHVXBZUFpiMnl2V0dvNkV6VTBvei9WTklHVElNSXNDMWIga2Vu $2y$11$r1zHIfGti8A0TV1wAj0Tq.6xeO2/iHv.vmQy3/AjUv1QkeWNZAv3C ken@blkdoor.com System Administrator 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 2000 ken 0 user c3NoLWVkMjU1MTkgQUFBQUMzTnphQzFsWkRJMU5URTVBQUFBSVB6eWRlMk1CTEhHVXBZUFpiMnl2V0dvNkV6VTBvei9WTklHVElNSXNDMWIga2Vu /usr/local/bin/bash $2y$11$pX.BHOUklN0PAGOyembxduWnMNGtEWLyYPiWNYYQ4/SfdQflhllZe ken@blkdoor.com Ken Johnson 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 2001 HomeAssistant 0 user $2y$11$nAeFuOV8b7S4yZwOyFshy.LJvqqENW4MSHTr3gbsjdml3cxthcHWi HomeAssistant Integation O7rmzwnJ55/R3d3IoePl8cC/CLVh83bTKz63cRwQ0GE26KkXdbLKSZ+FeoPZtQ6yUrR3Yqaqtn1OZlIz|$6$$.k6o..NDGhrS2R7UBk4OmfldJcy4f4GQJflJ.RQFfLFzIz6gQkMWzDzyrPOZtnZ50.l/vraPrYDC9xAQXCEzx1 page-all,page-diagnostics-arptable,page-diagnostics-netflow Home Assistant 2000 2000 America/Los_Angeles 0.us.pool.ntp.org 1.us.pool.ntp.org 2.us.pool.ntp.org 3.us.pool.ntp.org https 67a9532677f13 10443 5 1 Local Database 1 rno1.rail-city.net 1 1 1 1 1 1 1 1 hadp hadp hadp weekly 1 1 admins 1 lan,opt3 enabled 1 1 -1 -1 1 ssh://gitea.coldsprings.dev:2222/kenjreno/OPNSenseBackup main -----BEGIN OPENSSH PRIVATE KEY----- b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW QyNTUxOQAAACC7cx3TjYZlayN5VeOZXD7Xhh0kl/3Hi6dJXc+PnssKLAAAAJgdsVzbHbFc 2wAAAAtzc2gtZWQyNTUxOQAAACC7cx3TjYZlayN5VeOZXD7Xhh0kl/3Hi6dJXc+PnssKLA AAAECtYwZAx6u1ADbu+Vy3IQYHdDSQ2G2exBwQ2WPpOPpXsrtzHdONhmVrI3lV45lcPteG HSSX/ceLp0ldz4+eywosAAAAFWdpdHVzZXJAb3Buc2VzZS5sb2NhbA== -----END OPENSSH PRIVATE KEY----- git 1 https://railcloud.us kenjreno 6dEcp-dC5QR-JJJAd-pRbaf-2FbFi OPNsense-Backup https://mirror.sfo12.us.leaseweb.net/opnsense os-acme-client,os-dmidecode,os-frr,os-git-backup,os-haproxy,os-iperf,os-mdns-repeater,os-netdata,os-nextcloud-backup,os-node_exporter,os-qemu-guest-agent,os-rfc2136,os-tailscale 0 en_US 100.100.100.100 127.0.0.1 none none none none none none none none 115200 video 1 admins 50 home.arpa 1 qat 1 1 67a9ff977c4fc voucher Captive Vouchers yes urgent coretemp vtnet0 Wan 1 1 71.83.99.150 29 WAN_GW dhcp6 0 1 Loopback 1 lo0 127.0.0.1 ::1 8 128 none 1 vtnet2 ETH3 vtnet3 ETH4 vtnet1 1 1 9000 192.168.5.1 24 fdcf:39d9:630d::1 48 vlan00 Servers 1 9000 192.168.10.1 24 2001:470:1f05:a::1 64 vlan01 Cameras 1 9000 192.168.3.1 24 fd04:87b2:9345::1 48 tailscale0 Tailscale 1 vlan02 Phones 1 9000 192.168.2.1 24 fd36:94be:70a6::1 48 vlan03 Christmas 1 9000 192.168.70.1 24 fddb:45f0:de98::1 48 1 1 Trust Trust 1 group 1 1 Untrust Untrust 1 group gif0 TunnelBroker 1 1 Guest vlan04 IoT vlan05 vtnet4 Kubernetes 1 9000 192.168.146.1 24 fd00:146::1 64 1 WireGuard (Group) wireguard 1 1 group 1 7200 192.168.5.1 home.arpa home.arpa hmac-md5 43 string "http://pbx.internal.rail-city.net:5000/provisioning/s6xyrhxwvxuzli9" 66 string "http://pbx.internal.rail-city.net:5000/provisioning/s6xyrhxwvxuzli9" 100 text PST8PDT,M3.2.0/2:00:00,M11.1.0/2:00:00 101 text America/Los_Angeles 120 ip-address 192.168.5.48 160 text http://pbx.internal.rail-city.net:5000/provisioning/s6xyrhxwvxuzli9 2 signed integer 32 -28800 192.168.5.50 192.168.5.229 192.168.5.1 192.168.5.1 0c:c4:7a:36:5a:bc gizmo-bnc Supermicro IPMI - Gizmo 00:25:90:f3:5a:aa 192.168.5.10 zoey Proxmox - Zoey coldsprings.dev coldsprings.dev 00:25:90:f2:19:68 192.168.5.12 roxy Proxmox - Roxy coldsprings.dev coldsprings.dev 0c:c4:7a:32:f9:20 192.168.5.14 gizmo Proxmox - Gizmo coldsprings.dev coldspring.dev 0c:c4:7a:95:c8:f6 192.168.5.16 jonah Proxmox - Jonah coldsprings.dev coldsprings.dev 0c:c4:7a:63:9a:b8 192.168.5.20 lacey Proxmox - Lacey/pve2 coldsprings.dev coldsprings.dev 00:0e:f3:2a:aa:50 192.168.5.21 hub-2242 Insteon Hub v1 a8:b8:e0:01:18:29 192.168.5.22 foggy Proxmox - Foggy coldsprings.dev coldsprings.dev 00:0e:f3:3c:a2:8f 192.168.5.23 hub-2245 Insteon Hub v2 0c:c4:7a:d3:54:2a 192.168.5.24 joe Proxmox - Joe/pve1 coldsprings.dev coldsprings.dev d8:9e:f3:47:12:af 192.168.5.26 suzie Proxmox - Suzie coldsprings.dev coldsprings.dev bc:24:11:9e:4b:e2 192.168.5.36 pbs Proxmox Backup Server coldsprings.dev coldsprings.dev 28:c6:8e:f5:15:0f 192.168.5.43 rack01sw02 Netgear Switch GS748T bc:24:11:c1:27:60 192.168.5.48 pbx 3CX PBX bc:24:11:e9:44:9a 192.168.5.49 haos_5 Home Assistant - Home Network bc:24:11:7a:a6:76 192.168.5.195 ollama 0c:c4:7a:d5:6a:17 192.168.5.233 joe_bnc Supermicro IPMI - joe 1 xmascity.net xmascity.net hmac-md5 192.168.70.50 192.168.70.127 1 hmac-md5 192.168.3.50 192.168.3.127 1 hmac-md5 192.168.2.50 192.168.2.127 1 coldsprings.dev coldsprings.dev hmac-md5 192.168.10.64 192.168.10.127 192.168.10.1 192.168.10.13 bc:24:11:72:64:bb 192.168.10.7 filesvr Truenas Scale File Server bc:24:11:2a:4e:d1 192.168.10.9 dbsvr01 Production MySQL Database bc:24:11:ae:d9:b4 192.168.10.11 dc1 Domain Controller 1 bc:24:11:28:ee:dc 192.168.10.13 dc2 Domain Controller 2 bc:24:11:b1:9e:2b 192.168.10.15 lb1 Load Balancer 1 bc:24:11:b1:9e:2c 192.168.10.17 lb2 Load Balancer 2 bc:24:11:b1:9e:2d 192.168.10.19 lb3 Load Balancer 3 bc:24:11:22:02:8b 192.168.10.25 mx Mail Server 02:ff:60:27:9a:c0 192.168.10.26 nextcloud Railcloud/Nextcloud coldsprings.dev coldsprings.dev bc:24:11:5b:89:02 192.168.10.29 dbnp01 Non-Production MySQL Server bc:24:11:ae:ae:c9 192.168.10.30 docker Docker System bc:24:11:ee:08:22 192.168.10.31 dbnp02 NonProd MySQL Database 2 bc:24:11:27:a6:8d 192.168.10.33 dbnp03 Non-Prod MySQL Database 3 bc:24:11:2d:30:72 192.168.10.44 minio minio S3 Service bc:24:11:90:c3:e8 192.168.10.45 emqx1 Emqx MQTT Server 1 bc:24:11:b2:1a:9e 192.168.10.57 plexsvr Plex Media Server bc:24:11:dc:35:76 192.168.10.130 gitea Gitea GIT Hosting bc:24:11:31:20:54 192.168.10.131 pgsqlnp Postgresql NonProd bc:24:11:7a:a6:76 192.168.10.195 ollama Ollama AI bc:24:11:48:28:01 192.168.10.241 k8s-control-01 Kubernetes Control 01 bc:24:11:48:28:02 192.168.10.242 k8s-control-02 Kubernetes Control 02 bc:24:11:48:28:03 192.168.10.243 k8s-control-03 Kubernetes Control 03 bc:24:11:48:29:01 192.168.10.244 k8s-worker-01 Kubernetes Worker 01 bc:24:11:48:29:02 192.168.10.245 k8s-worker-02 Kubernetes Worker 02 bc:24:11:48:29:03 192.168.10.246 k8s-worker-03 kubernetes Worker 03 bc:24:11:48:28:04 192.168.10.247 talos-staging Talos Staging System 1 hmac-md5 192.168.146.50 192.168.146.240 bc:24:11:48:28:01 192.168.146.21 k8s-control-01 Kubernetes Controller 1 bc:24:11:48:28:02 192.168.146.23 k8s-control-02 Kubernetes Controller 2 bc:24:11:48:28:03 192.168.146.25 k8s-control-03 Kubernetes Controller 3 bc:24:11:48:29:01 192.168.146.51 k8s-worker-01 Kubernetes Worker 1 bc:24:11:48:29:02 192.168.146.53 k8s-worker-02 Kubernetes Worker 2 bc:24:11:48:29:03 192.168.146.55 k8s-worker-03 Kubernetes Worker 3 public hybrid any
192.168.7.0/24
Allow Lan -> Tailscale opt5 inet kenjreno@192.168.5.122 /firewall_nat_out_edit.php made changes opt5ip kenjreno@192.168.5.122 /firewall_nat_out_edit.php made changes
any
100.64.0.0/10
Allow Server -> Tailscale opt5 inet kenjreno@192.168.5.122 /firewall_nat_out_edit.php made changes opt5ip kenjreno@192.168.5.122 /firewall_nat_out_edit.php made changes
192.168.10.25/32 1 Forward Mailserver to .147 wan inet 71.83.99.147 1 kenjreno@192.168.5.122 /firewall_nat_out_edit.php made changes kenjreno@192.168.5.122 /firewall_nat_out_edit.php made changes opt3 1 Redirect Servers Network to .146 wan inet kenjreno@192.168.5.122 /firewall_nat_out_edit.php made changes 71.83.99.146 1 kenjreno@192.168.5.122 /firewall_nat_out_edit.php made changes any 1 Allow Network Tailscale wan inet wanip 1 udp kenjreno@192.168.5.122 /firewall_nat_out_edit.php made changes kenjreno@192.168.5.122 /firewall_nat_out_edit.php made changes
tcp/udp lan inet Redirect DNS through Firewall nat_67ba16b66c8d54.75523749 127.0.0.1 53 1 lanip 1 53 disable kenjreno@192.168.5.1 /firewall_nat_edit.php made changes kenjreno@192.168.5.1 /firewall_nat_edit.php made changes tcp wan inet Allow Incoming eMail nat_67ad709fc3e844.04299527 Host_Mailserver Ports_eMail 1
71.83.99.147
Ports_eMail
kenjreno@192.168.5.122 /firewall_nat_edit.php made changes kenjreno@192.168.5.122 /firewall_nat_edit.php made changes
tcp/udp wan inet Allow Access to DNS nat_67ad70c9eb5df5.72660733 Host_Docker Ports_DNS 1
71.83.99.146
Ports_DNS
kenjreno@192.168.5.122 /firewall_nat_edit.php made changes kenjreno@192.168.5.122 /firewall_nat_edit.php made changes
tcp/udp wan inet Allow access to Websites nat_67ad70ef6b4af5.38110229 Host_Docker Ports_Websites 1
71.83.99.146
Ports_Websites
kenjreno@192.168.5.122 /firewall_nat_edit.php made changes kenjreno@192.168.5.122 /firewall_nat_edit.php made changes
tcp wan inet Allow access to MQTT nat_67ad71168ffc22.83998313 Host_MQTT Ports_MQTT 1
71.83.99.146
Ports_MQTT
kenjreno@192.168.5.122 /firewall_nat_edit.php made changes kenjreno@192.168.5.122 /firewall_nat_edit.php made changes
tcp wan inet Allow 3CX/PBX Admin nat_67ad718f3644f0.76381559 192.168.5.48 5001 1 wanip 5001 kenjreno@192.168.5.237 /firewall_nat_edit.php made changes kenjreno@192.168.5.122 /firewall_nat_edit.php made changes udp wan inet Wireguard to HA nat_67ad71da0b9fd7.03700729 192.168.10.49 51830 1 wanip 51830 kenjreno@192.168.5.122 /firewall_nat_edit.php made changes kenjreno@192.168.5.122 /firewall_nat_edit.php made changes tcp wan inet Allow SSH to Gitea nat_67ad720729fe94.53585994 Host_Docker 2222 1
71.83.99.146
2222
kenjreno@192.168.5.122 /firewall_nat_edit.php made changes kenjreno@192.168.5.122 /firewall_nat_edit.php made changes
tcp wan inet Allow SSH to Filesvr nat_67ad72502b3fe2.67681864 192.168.10.7 22
Net_AllowExternal
71.83.99.146
10007
kenjreno@192.168.5.122 /firewall_nat_edit.php made changes kenjreno@192.168.5.122 /firewall_nat_edit.php made changes
tcp wan inet Allow SSH to Ansible nat_67ad728a17fd21.09599110 192.168.10.109 22
Net_AllowExternal
71.83.99.146
10116
ken@192.168.5.122 /firewall_nat_edit.php made changes kenjreno@192.168.5.122 /firewall_nat_edit.php made changes
tcp wan inet Allow SSH to Ansible Too nat_67ad72c091c571.24304504 1 192.168.10.120 22
Net_AllowExternal
71.83.99.146
10072
kenjreno@192.168.5.122 /firewall_nat_edit.php made changes kenjreno@192.168.5.122 /firewall_nat_edit.php made changes
tcp wan inet Allow SSH to pve1 nat_67ad72fc43d419.05197582 1 192.168.10.122 22
Net_AllowExternal
71.83.99.146
10122
kenjreno@192.168.5.122 /firewall_nat_edit.php made changes kenjreno@192.168.5.122 /firewall_nat_edit.php made changes
tcp wan inet Allow Plex nat_67ad7333d67b29.89717724 192.168.10.57 32400 1
71.83.99.146
17758
kenjreno@192.168.5.122 /firewall_nat_edit.php made changes kenjreno@192.168.5.122 /firewall_nat_edit.php made changes
tcp wan inet Allow Plex nat_67ad736c89baf8.57850463 192.168.5.102 32400 1 wanip 26476 kenjreno@192.168.5.122 /firewall_nat_edit.php made changes kenjreno@192.168.5.122 /firewall_nat_edit.php made changes
pass wan inet keep state Allow HE Tunnel Broker in 1 igmp
66.220.2.74/32
1 kenjreno@192.168.5.122 /firewall_rules_edit.php made changes kenjreno@192.168.5.122 /firewall_rules_edit.php made changes
pass nat_67ad709fc3e844.04299527 1 wan keep state tcp inet
Host_Mailserver
Ports_eMail
Allow Incoming eMail kenjreno@192.168.5.122 /firewall_nat_edit.php made changes
pass nat_67ad70c9eb5df5.72660733 1 wan keep state tcp/udp inet
Host_Docker
Ports_DNS
Allow Access to DNS kenjreno@192.168.5.122 /firewall_nat_edit.php made changes
pass nat_67ad71168ffc22.83998313 1 wan keep state tcp inet
Host_MQTT
Ports_MQTT
Allow access to MQTT kenjreno@192.168.5.122 /firewall_nat_edit.php made changes
pass nat_67ad70ef6b4af5.38110229 1 wan keep state tcp/udp inet
Host_Docker
Ports_Websites
Allow access to Websites kenjreno@192.168.5.122 /firewall_nat_edit.php made changes
pass wan inet keep state Allow to HAProxy in 1 tcp/udp 1 wanip Ports_Websites ken@192.168.5.122 /firewall_rules_edit.php made changes ken@192.168.5.122 /firewall_rules_edit.php made changes pass wan inet keep state Allow Wireguard Traffic in 1 udp 1 (self) 51820-51821 kenjreno@192.168.5.122 /firewall_rules_edit.php made changes kenjreno@192.168.5.122 /firewall_rules_edit.php made changes pass nat_67ad718f3644f0.76381559 1 wan keep state tcp inet
192.168.5.48
5001
Allow 3CX/PBX Admin kenjreno@192.168.5.122 /firewall_nat_edit.php made changes
pass nat_67ad71da0b9fd7.03700729 1 wan keep state udp inet
192.168.10.49
51830
Wireguard to HA kenjreno@192.168.5.122 /firewall_nat_edit.php made changes
pass nat_67ad720729fe94.53585994 1 wan keep state tcp inet
Host_Docker
2222
Allow SSH to Gitea kenjreno@192.168.5.122 /firewall_nat_edit.php made changes
pass nat_67ad72502b3fe2.67681864
Net_AllowExternal
wan keep state tcp inet
192.168.10.7
22
Allow SSH to Filesvr kenjreno@192.168.5.122 /firewall_nat_edit.php made changes
pass nat_67ad728a17fd21.09599110
Net_AllowExternal
wan keep state tcp inet
192.168.10.109
22
Allow SSH to Ansible kenjreno@192.168.5.122 /firewall_nat_edit.php made changes
pass nat_67ad72c091c571.24304504
Net_AllowExternal
wan keep state tcp inet
192.168.10.120
22
1 Allow SSH to Ansible Too kenjreno@192.168.5.122 /firewall_nat_edit.php made changes
pass nat_67ad72fc43d419.05197582
Net_AllowExternal
wan keep state tcp inet
192.168.10.122
22
1 Allow SSH to pve1 kenjreno@192.168.5.122 /firewall_nat_edit.php made changes
pass nat_67ad7333d67b29.89717724 1 wan keep state tcp inet
192.168.10.57
32400
Allow Plex kenjreno@192.168.5.122 /firewall_nat_edit.php made changes
pass nat_67ad736c89baf8.57850463 1 wan keep state tcp inet
192.168.5.102
32400
Allow Plex kenjreno@192.168.5.122 /firewall_nat_edit.php made changes
pass wan inet keep state Allow Tailscale in 1 udp 1 1 ken@192.168.5.1 /firewall_rules_edit.php made changes ken@192.168.5.1 /firewall_rules_edit.php made changes pass inet Default allow LAN to any rule lan lan pass inet6 Default allow LAN IPv6 to any rule lan lan pass lan inet keep state Allow to Server Network in 1 lan opt3 kenjreno@192.168.5.237 /firewall_rules_edit.php made changes kenjreno@192.168.5.122 /firewall_rules_edit.php made changes pass nat_67ba16b66c8d54.75523749 1 lan keep state tcp/udp inet
127.0.0.1
53
Redirect DNS through Firewall kenjreno@192.168.5.1 /firewall_nat_edit.php made changes
pass lan inet keep state Allow MQTT Dashboard in 1 tcp 1 (self) 18083 ken@192.168.5.122 /firewall_rules_edit.php made changes ken@192.168.5.122 /firewall_rules_edit.php made changes pass opt3 inet keep state Allow Servers -> LAN Network v4 in 1 opt3 lan kenjreno@192.168.5.122 /firewall_rules_edit.php made changes kenjreno@192.168.5.122 /firewall_rules_edit.php made changes pass opt3 inet keep state Allow Servers to Any v4 in 1 opt3 1 kenjreno@192.168.5.122 /firewall_rules_edit.php made changes kenjreno@192.168.5.122 /firewall_rules_edit.php made changes pass opt3 inet6 keep state Allow IPv6 to Tunnel Broker TUNNELBROKER_TUNNELV6 in 1 1 1 kenjreno@192.168.5.122 /firewall_rules_edit.php made changes kenjreno@192.168.5.122 /firewall_rules_edit.php made changes pass opt4 inet keep state Allow DNS Access in 1 tcp/udp opt4 (self) Ports_DNS ken@192.168.5.122 /firewall_rules_edit.php made changes ken@192.168.5.122 /firewall_rules_edit.php made changes pass opt5 inet keep state Allow Tailscale in 1 opt5 1 kenjreno@192.168.5.223 /firewall_rules_edit.php made changes kenjreno@192.168.5.223 /firewall_rules_edit.php made changes pass opt7 inet keep state Allow DNS Access in 1 tcp/udp opt7 (self) Ports_DNS ken@192.168.5.122 /firewall_rules_edit.php made changes ken@192.168.5.122 /firewall_rules_edit.php made changes pass opt8 inet46 keep state Allow Tunnelbroker in 1 opt3 1 kenjreno@192.168.5.122 /firewall_rules_edit.php made changes kenjreno@192.168.5.122 /firewall_rules_edit.php made changes 1 pass opt11 inet keep state Allow Servers to Any v4 in 1 opt11 1 ken@192.168.5.122 /firewall_rules_edit.php made changes ken@192.168.5.122 /firewall_rules_edit.php made changes block opt11 inet keep state Deny LAN/Server Access in 1 opt11
lan,opt3
ken@192.168.5.122 /firewall_rules_edit.php made changes ken@192.168.5.122 /firewall_rules_edit.php made changes 1
pass opt11 inet keep state Allow Kubernetes to Any in 1 opt11 1 ken@192.168.5.122 /firewall_rules_edit.php made changes ken@192.168.5.122 /firewall_rules_edit.php made changes pass opt11 inet6 keep state Allow Kubernetes to Any in 1 opt11 1 ken@192.168.5.122 /firewall_rules_edit.php made changes ken@192.168.5.122 /firewall_rules_edit.php made changes
0.us.pool.ntp.org on ken@192.168.5.100 /diag_backup.php made changes 0 WAN_GW WAN Gateway wan inet 71.83.99.145 1 0 0 0 1.1.1.1 0 255 1 0 WAN_DHCP6 Interface WAN_DHCP6 Gateway wan inet6 1 0 0 0 2606:4700:4700::1111 0 254 1 0 TailNet opt5 inet 100.124.217.85 0 0 1 0 100.100.100.100 0 255 1 0 TUNNELBROKER_TUNNELV6 Interface TUNNELBROKER_TUNNELV6 Gateway opt8 inet6 0 0 0 0 2001:4860:4860::8888 0 250 1 0 0 0 1 0 1 120 120 smtp.rail-city.com 587 no-reply@coldsprings.dev 91JVutYHdKsGMoT.q24c 1 auto 1 0 root 2812 5 1 1 ken@blkdoor.com 0 1 $HOST system 300 30
25cdb1b0-d08d-466c-9dca-6e600270c781,bf58b664-8857-48b4-b90c-d6614d11902c,3f18dfca-35b0-46e3-916e-4d9f9514305d,0ba94dc4-6478-455c-b8b1-1b0450ef9354 1 RootFs filesystem / 300 30
0e9ba43e-ec98-4077-b642-1fa069e54ea7 0 carp_status_change custom /usr/local/opnsense/scripts/OPNsense/Monit/carp_status 300 30
e2656eba-4fbd-426a-a6cb-a5f268a0521f 0 gateway_alert custom /usr/local/opnsense/scripts/OPNsense/Monit/gateway_alert 300 30
59ce17ee-a315-49de-8d6e-134fd9ba7913 Ping NetworkPing failed ping alert NetworkLink NetworkInterface failed link alert NetworkSaturation NetworkInterface saturation is greater than 75% alert MemoryUsage SystemResource memory usage is greater than 75% alert CPUUsage SystemResource cpu usage is greater than 75% alert LoadAvg1 SystemResource loadavg (1min) is greater than 4 alert LoadAvg5 SystemResource loadavg (5min) is greater than 3 alert LoadAvg15 SystemResource loadavg (15min) is greater than 2 alert SpaceUsage SpaceUsage space usage is greater than 75% alert ChangedStatus ProgramStatus changed status alert NonZeroStatus ProgramStatus status != 0 alert 1 127.0.0.1 19999 lan,opt1,opt2,wan v9 0 1800 15 https://download.maxmind.com/app/geoip_download?edition_id=GeoLite2-Country-CSV&license_key=2I5sILOXRtFxiGIG&suffix=zip 1 Host_Docker host 0 192.168.10.30 Docker Host 1 Host_Mailserver host 0 192.168.10.25 2001:470:1f05:a::19 Mail Server 1 Host_MQTT host 0 192.168.5.45 MQTT Host 1 Net_AllowExternal network 0 71.83.99.145/29 167.154.0.0/16 Allow External Networks 1 RFC1918 network 0 192.168.0.0/16 172.16.0.0/12 10.0.0.0/8 Local Subnets 1 Ports_eMail port 0 25 465 587 143 995 110 993 4190 Mail Ports 1 Ports_MQTT port 0 8883 8084 MQTT Secure Ports 1 Ports_Websites port 0 80 443 Allow access Websites 1 Ports_DNS port 0 53 853 Allow Access to DNS 0 1 TravelRouter vita5XJUJiADjeUy2tL8nXoJaYtBy22D4FFEGTUQaAY= 192.168.5.0/24,192.168.10.0/24 25 1 1 roadwarrior 0 6B5oRTErX9I7n1U/wtI5vuT/XD7wEb6tE11ga0EFUBM= qDqz9Up+GrkdyA7Z/gN9OFkd2NYBAaCRCt2WBI8kj0s= 51820 0 b4a304b1-860c-4888-a69d-94f3156e3247 0 0 lan 1 lan,opt3,opt5 abuse.ch.sslblacklist.rules 1 abuse.ch.sslipblacklist.rules 1 abuse.ch.urlhaus.rules 1 0 0 0 wan 192.168.0.0/16,10.0.0.0/8,172.16.0.0/12 W0D23 4 0 0 0 0 0 0 0 0 0 127.0.0.1 8000 0 opt4,lan 4000 1 raw 0 2 192.168.5.0/24 1 192.168.5.159 home.arpa 192.168.5.159 192.168.5.1 home.arpa 192.168.5.159 192.168.5.1 1 192.168.5.50 - 192.168.5.229 Home 192.168.3.0/24 1 camera camera 192.168.3.1 1 192.168.3.50 - 192.168.3.100 Cameras 4ac08e5c-0a9c-487e-8ef1-0ea444448e77 192.168.5.10 00:25:90:f3:5a:aa zoey Proxmox - Zoey 4ac08e5c-0a9c-487e-8ef1-0ea444448e77 192.168.5.12 00:25:90:F2:19:68 roxy Proxmox - Roxy 4ac08e5c-0a9c-487e-8ef1-0ea444448e77 192.168.5.14 0C:C4:7A:32:F9:20 gizmo Proxmox - Gizmo 4ac08e5c-0a9c-487e-8ef1-0ea444448e77 192.168.5.49 BC:24:11:E9:44:9A haos_5 Home Assistant - Home Net 4ac08e5c-0a9c-487e-8ef1-0ea444448e77 192.168.5.48 BC:24:11:C1:27:60 pbx 3CX PBX 4ac08e5c-0a9c-487e-8ef1-0ea444448e77 192.168.5.16 0C:C4:7A:95:C8:F6 jonah Proxmox - Jonah 4ac08e5c-0a9c-487e-8ef1-0ea444448e77 192.168.5.24 1C:87:2C:41:19:5F joe Proxmox - Joe/pve1 4ac08e5c-0a9c-487e-8ef1-0ea444448e77 192.168.5.26 D8:9E:F3:47:12:AF suzie Proxmox - Suzie 4ac08e5c-0a9c-487e-8ef1-0ea444448e77 192.168.5.20 0C:C4:7A:63:9A:B8 lacey Proxmox - Lacey/pve2 0 0 4000 1 0 2 1 1 31 0 0 16 32 4 1000 1 0 0 1 0 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 ipsec 0 1 0 1 10 41641 1 1 1 0 0 192.168.5.0/24 Home 192.168.10.0/24 Coldsprings https://headscale.rail-city.net a9a6571c76c60a47c3613ea57be273536691de956beaa64d AcmeClient 1 0 0 * * * root acmeclient cron-auto-renew AcmeClient Cronjob for Certificate AutoRenewal cron 1 0 */2 * * * root system remote backup Backup Configurations Remotely cron 1 0 3 * * 4 root zfs scrub zroot Scrub ZFS cron 1 42 2 * * 3 root syslog archive Rotate Logs cron 1 24 1 * * * root firmware poll Firmwarwe Check cron 1 0 0 3 * * root ids update Update Intrusion Rules cron 1 32 5 * * * root zfs trim zroot Daily ZFS Trim 1 0 1 53 1 opt4,opt7,opt11,lan,opt3 1 0 0 1 home.arpa 1 0 0 0 0 transparent 0 1 1 0 0 1 1 0 0 0 0 0 0 0 0 0 1 0 0.0.0.0/8,10.0.0.0/8,100.64.0.0/10,169.254.0.0/16,172.16.0.0/12,192.0.2.0/24,192.168.0.0/16,198.18.0.0/15,198.51.100.0/24,203.0.113.0/24,233.252.0.0/24,::1/128,2001:db8::/32,fc00::/8,fd00::/8,fe80::/10 0 allow 0
1 forward sunvalley.dev 192.168.10.30 53 0 0 Sunvalley 1 filesvr coldsprings.dev A 192.168.10.7 TrueNAS Scale File Server 1 pbs coldsprings.dev A 192.168.5.36 Proxmox Backup Server 1 zoey coldsprings.dev A 192.168.5.10 1 roxy coldsprings.dev A 192.168.5.12 1 gizmo coldsprings.dev A 192.168.5.14 1 jonah coldasprings.dev A 192.168.5.16 1 lacey coldsprings.dev A 192.168.5.20 1 pve1 coldsprings.dev A 192.168.5.24 1 foggy coldsprings.dev A 192.168.5.22 1 susie coldsprings.dev A 192.168.5.26 1 rooney coldsprings.dev A 192.168.7.28 1 misty coldsprings.dev A 192.168.7.30 1 mqtt coldsprings.dev A 192.168.10.49 1 docker coldsprings.dev A 192.168.10.30 Docker Server 1 fw coldsprings.dev A 192.168.10.1 Main Firewall 1 dbnp coldsprings.dev A 192.168.10.29 NonProd MySQL Server 1 dbsvr coldsprings.dev A 192.168.10.9 Production MySQL Server 1 kube coldsprings.dev A 192.168.10.240 KubeCtl Channel 1 office coldsprings.dev A 192.168.10.30 Collabora Office 1 haos coldsprings.dev A 192.168.10.49 Home Assistant 1 docker sunvalley.dev A 192.168.7.52 Sun Valley Docker Service 1 zoey nas A 192.168.215.10 1 roxy nas A 192.168.215.12 1 filesvr nas A 192.168.215.7 1 gizmo nas A 192.168.215.14 1 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 adminer coldsprings.dev 1 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 ca coldsprings.dev Smallstep-ca 1 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 frigate coldsprings.dev Frigate 1 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 gitlab coldsprings.dev 1 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 graylog coldsprings.dev 1 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 heimdall coldsprings.dev 1 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 homarr coldsprings.dev 1 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 jellyfin coldsprings.dev 1 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 portainer coldsprings.dev 1 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 postfixadmin coldsprings.dev 1 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 pwm coldsprings.dev 1 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 signallapi coldsprings.dev 1 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 sonarr coldsprings.dev 1 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 tautulli coldsprings.dev 1 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 traefik coldsprings.dev 1 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 unifi coldsprings.dev 1 846fd7b0-1a71-4881-aac3-67300443130b myspeedtest sunvalley.dev My Speed Test 1 846fd7b0-1a71-4881-aac3-67300443130b myspeedtest sunvalley.dev MySpeedTest 1 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 railcloud coldsprings.dev 1 8a3dbb9a-4f3f-4bfd-ae37-3036955dee46 minio coldsprings.dev Minio S3 Service 1 1 b4879549-d595-47bb-bcff-7ec158b94b84 43580 43581 600 0 normal 0 67a951a8c761b1.57922271 1 LEProduction Let's Encrypt Production letsencrypt@blkdoor.com letsencrypt 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 200 1739149868 67a95223cb8428.09564898 1 LEStaging Let's Encrypt Staging/Dev letsencrypt@blkdoor.com letsencrypt_test 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 200 1739149871 67a95302cb4297.16727540 1 rno1.rail-city.net Firewall Certificate rno1.rail-city.net 5f44d980-1238-4f71-b092-29340ef2a5be 8200f583-9c30-40ab-ac16-8bc3afdcf99b key_ec384 0 9fabe4b7-2d20-437d-94f3-c10d74eabcf1 1 60 none 67a9532677f13 1747582234 200 1747582234 67a952c254adc9.13558747 1 PowerDNS PowerDNS dns01 opnsense 1 1 acme 1 dns_pdns 0 1 1 cloudflare https://api.loopia.se/RPCSERV localhost 443 0 http://192.168.10.30:8081 localhost 61beccca-d8ea-4e90-817e-8d00e39ca10c plain https://identity.xxxx.conoha.io/v2.0 67a9517633ce87.60895539 1 Restart UI Restart Main GUI configd_restart_gui 22 22 5000 http 1 root 8006 pam acme localhost http /usr/local/share/java/unifi/data/keystore acme 1 67ab79845c74d1.92930317 1 Truenas Truenas Certificate acme_truenas 22 22 5000 http 1 root 8006 pam acme 4-iDLtqiAJ9FCcRiAUcP8rQEUZN3C7HMbhn3GNXHvRfyWdtL33j2s5CHNlpdP7Zedg filesvr.coldsprings.dev https /usr/local/share/java/unifi/data/keystore acme 1 67c9c18f4b8be4.95405282 1 Restart HAProxy Restart HA Proxy Service configd_restart_haproxy 22 22 5000 http 1 root 8006 pam acme localhost http /usr/local/share/java/unifi/data/keystore acme 1 0 0 60s 0 0 1 0 1024 1024 0 10000 2 ipv4 ignore 4096 16384 2 0 0 1 300 3600 0 prefer-client-ciphers TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256 TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256 5000 30s 30s 30s 3 x-1 last,libc 127.0.0.1 local0 info 0 8822 0 0 0 *:8404 /metrics 0 4 60 0 10 0 0 0 0 0 0.0.0.0 9100 1 1 1 1 1 1 1 0 1 1 0 0 0 0 0 1 Migrated route redistribution (bgp) connected 0 1 Metallb
192.168.10.240
0
0 0 0 0 0 1 Migrated route redistribution (bgp) connected 0 64512 0 1 1 192.168.10.0/24 1 MetalLB
192.168.10.230
64513 opt3 1 0 0 0 0 0 1 0 0 0
1 k8s-Control-01
192.168.10.241
64513 opt3 1 0 0 0 0 0 1 0 0 0
1 k8s-Control-02
192.168.10.242
64513 opt3 1 0 0 0 0 0 1 0 0 0
1 k8s-Control-03
192.168.10.243
64513 opt3 1 0 0 0 0 0 1 0 0 0
1 k8s-Worker-01
192.168.10.244
64513 opt3 1 0 0 0 0 0 1 0 0 0
1 k8s-Worker-02
192.168.10.245
64513 opt3 1 0 0 0 0 0 1 0 0 0
1 k8s-Worker-03
192.168.10.246
64513 opt3 1 0 0 0 0 0 1 0 0 0
1 Migrated route redistribution (bgp) connected
0 2 1 traditional 0 1 0 notifications 1
1 ag 1 coldsprings.dev 192.168.10.11 0 0.0.0.0:5353 1 250 1 0 1 1 0 1 0 0 2500 30 240 0 0 1.1.1.1:53 0 1 512 600 86400 60 600 1 peap secp384r1 0 67a9532677f13 0 1.2 0 0 0 0 0 0 0 0 0 0 files 0 0 0 0 0 127.0.0.1 3306 radius radpass radius 0 0 LDAPS 0 dc=example,dc=domain,dc=com (uid=%{%{Stripped-User-Name}:-%{User-Name}}) (objectClass=posixGroup) vtnet1 10 0 Servers vlan00 vtnet1 3 4 Cameras vlan01 vtnet1 2 5 Phones vlan02 vtnet1 70 0 Christmas vlan03 vtnet1 30 0 Guest vlan04 vtnet1 40 0 IoT vlan05 vtnet1 146 0 Kubernetes Cluster vlan06 wan ipalias 71.83.99.148 29 0 0 1 0 0 71-83-99-148-Spectrum wan ipalias 71.83.99.149 29 0 0 1 0 0 71-83-99-149-Spectrum wan ipalias 71.83.99.146 29 0 0 1 0 0 71-83-99-146-Spectrum wan ipalias 71.83.99.147 29 0 0 1 0 0 71-83-99-147-Spectrum lo0 ipalias 127.4.4.3 32 0 0 1 0 0 HAProxy SSL Server wan gif0 72.52.104.74 2001:470:1f04:a::2 2001:470:1f04:a::1 64 Tunnel Broker 0 0 Trust lan,opt3 0 0 Zone for Trusted Networks Untrust wan,opt4 0 0 Zone for Untrusted Networks 0 0 1400 0 67a9532676509 E6 (ACME Client) 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 67a9feb38e684 Dynaip Root CA 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 67a9fee03f391 Dynaip Intermediate CA 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 LS0tLS1CRUdJTiBSU0EgUFJJVkFURSBLRVktLS0tLQpNSUlKS1FJQkFBS0NBZ0VBcjFuanVUT0d1OHh4R3AvSTM5THFENDIyWi9CZEFXenZ1MlZ3TWdsMGtGVEd6bndUCmtKa1I0bmllT0tCdzBpZ1F3SnBLbjRTQXhnazY2QzMyU2JDYUE3T1FLeUdjelR0dE52UnJQbmpsTm0yaDNwNzcKaGxTUmFkL2FycXRldk9qZFQ0TGQ5dFluMFFkdlZpLyswUTlETmZmK3JOdlJ2akVwRW5vOFBLNFBFNjR3dGZUWAp1ektMRDFwODlNUVRicEZ4alJBd3ZvaTFvZkI1akp0bVpZdzQ2eFM1RmlpZzlmUmYzbEY1WUJrdXVieUg5a1R1CmgyS2lnR3Z6U3hENEcwYk53aUJORTFJYnU4ckIzUUdEUkkveUM4TDdpUUJEZlFtZUwrb3dQZ2ViTVVpVFU4TkkKSFJ1NDllejZ2QmFnM09oSmswaHBVQmN6emE5aXVVK1ZVOE5vUGZHcVhaRTM2T2lIaWlhejRqMllZdjVNU0VjMwpBaW55eExwRUFpcW1sMFJyOE9KRlVKNlpzamtjTWZmK2JraXJQN0EyM09jbzY3V1lpdkJNci9WdVhrc3FFRVgwCkp6dUR3bC9rNUt6VGQ0QTU2RDZ0enBoSVNoWTVhNEtxbXVhaWZMbEJxRk5yUm1ucFg5YXZ6ZHJpQk16c1dna1AKOHlob0pDSkhId3ZKS2RhODQ5bE81Y3pPNzREK0M2cjhFeXFHSDUrUEtPVWJoRlhOL1NrRzNuRHY4c0VoUTN3RAo0VUF6enUzUTRvT2dnMUhIUEhTbWd3ZE1yK1NmdXp6WXdDbWt6WGkzVVBhUm9nL0kwQmhRWUhWQklYUWJDYXNTCit5cDZoRmFWWlZCUVdvVTRwMzRRUWp2N1E2WjFkYWpMeDRQNWNkVkFxWFU5NWIxVWhQREl2Z213YzVjQ0F3RUEKQVFLQ0FnRUFvZjA1aVhyWFNpQllrRTd5SkF0VlhSNytWbERQcXFSM1p6Z1RpTFlCYitCUmRLbGM3YVRxeDd2RAo5dTRJcTZ5RnBWZ2ovZTlMZ3ljOXV3WFMwMHFKVFVnUnREYXVBMDZWMjBHNjNSQ1VOMDdhVGEyekVPcUpGelRNCmNiWXdvL1cvbFZlQk5DbXN5TWJFak90enpLLzcyQnlNc2lXMFFxNXBrZjlJTElwanRUdWpGa1RsRXJOamtjQjMKVlNyYUJMZnFIWFhLZ2dvTE9Wbk5BQjhEWG1aR29xMFhPeWczWWwvcVBKZ3B0NlFyN1R3RW9uWVZvUTUycm9xTApURnFWeWFVRUtnVHJEeUU0SzZqb3BRRmp3ZS8wbS9iNXBodVBQVENvYVAxQXFkMGUrazFnaE80UGJZeVJ0dWJBCnp3ZGNmaGM4K1FuWStEc25DU212Mng5eEJOdXRMSnVkd1NwTHFheHJLN0Y5T1ZoTmEyeDBFQm5tRk1ZN09KMUgKQTFzMDdoYjN3cWdnUDVLMkxoVS9oMTg5WlEzbXFSQ3FHby9lYlJJTG1oMWRvWTY0cHFEOTg1Sm5LVmg2RXFFdQpodVliTlJRcDh3dTl4WHdzQjhtMktkS0syU2FnTHdrQ0VCMVp1KzNzR0VQbGJrT1FSc2txdTFqbTV6NzNyODY4CkVDRmFEVTVHT2hZWTFVVExYdUp4b1Jnc3FURHg3SHNKaG1oVDEzS3JNWHB2S3BkeHZsVzcybm1ZL3FNK3MzMHQKVWp4bnZRWlYvUnlIYnNnVlhUbEhSRGlDbC9tL20yNWpsRHpPalpjZXExdk5Sck05S09vK2N3NEV4UkFacjdaSQprNkk1Y1FaeDJQL2ZGUnhYWXZyMTlwYjBYN0YvZk9tUGVIVFJwS2J6dndLazlyQkYvd2tDZ2dFQkFPV1k4ZjRECmppS2ZwWFBGSzB0d2pMaHFaK1BjQmRhVmhWM21TaXVaUm5NMC9qUkV6ZzBIY1Fxd0IvL2lVUzA4OUdRSmhuRjMKVXloK3VOSHVteS9ScW9wOWFiZHRsNWEybUZPdUVFZXBKaTFjTVJuMFZxUDMxb3Rqb0hDbzZoRkRCZm04bEJXaQo0SGRIQ1ZsOTd6eXhZcFpuR0ZjNGJNOG5UZkViUU82TmVBd1B4czE5OE55WU1IMUVsWndKNE1MejcxZXN2VElvCmQ4S0kwc0F5cFZIYVpXZ1lhOGRyYjA5U2pXRVNqU0o5NzNHY3FjQmJSeVFXVnhyZ1lrOWNwc0paNXBQeXliL0QKR0F4cWdWV2ZmWFFSWGlpUEJLMG5XdVdjaThabU1wcmp3OWlta3FGS3FDTVJSOGR2Yjg5N0UxSTJKSzZ4dEh6YwppV1hKOG1NRytYSVF0VDBDZ2dFQkFNT0VBSmVScG01MWZsZnhJQ0l6SHBtc3FmdEFYb2RtSWN4R3gvM01tRFNyCjVQZXNmaldXZG5ZcTI2QlpzZUxwT09rK21OdkJNZG1OUFE0VG1TUDJ1QldDdE94Z1J6ck9iWmRSeExudFp3NWMKbFZzSi8xczlZcm9oUnNDVTZwM21MSFJQRXN3MmZleWMzN3dHb0FWT1FJb1BEKzJRRUhDMVgxRTZOeFVLd0pHTwpoeVhrbzNFVmxZd2pqK2Mza2hsaUd3elg0Yk9icFJNWGpJK0lkV1AwZDBHeFp4TnRsSzlIY2VYWFJWZWZEQmEzCmdnbTN5dVRodzgxTEFtRzVhTEo4N0ZLcDY2SDUrY3o5ZFZlNDhydHJKNEduLzEva3B5L3QyWEU4U1FzL2FEVnQKZEFZU0FEQ3piR2lZUVdmL254L3p2WHgrcTBiR1FLZjJ1Z1VjcjRJcm9XTUNnZ0VBVmY4Q2JOVWlFTC9oTmNxZApHOFdOUDZuRFBlcDBXVnBwdUxFQUNQS0JHN2UybXhkR1lrVHVSMFdGeVljWVJxeDFFVjhyOXlYdGhOWnFIVitVCnlzVnFiakxwUE9ZVWlFUGVMRUdmSVdndXY0Q3ZkM3c0VTNRSjdPMms4MjJoTmxQM1VnSWJLVHQzZmRXaW45MTIKbFRJUHJpdnhSd0lBWjFyZWE3ZDhpNTE3WUhFc1VsMmdzTTlrSWhkbFBpdkkvdHhsUWw2V0FzcDdpT2E4b1hhVwp5MkRVNkxkMDd4M0RkRitFU3Q2cTlFZGRQeDJoeTBXbEVOUTVUZnpMZGRSTE5iSjhsZCt6UjFzb2o4WDRxWHh5CmZkM2ZlYXVQNGRkQ3lZdm9JcWkydmFNZ0FPN3JMdlNLbzQvZVpjbk1oRmNoOW9JSEhWTzhPYVJVNWtaTXZtQ24KWDl6NE5RS0NBUUI5SHp3Vnc4TmtDMU1veW9wSytMWUxtTUZMcHIwWUg1ZGZtS2lpVnMzTlgzaHZ2SGNrcWo3egpqcWZ4TFpXMjVwUmlTSW9na0xuclJRVWV2aElTUHZFOTZ1RUlLUEZNeEJERWR6TFQzZ2RHM0o5RW5OaEx0clE0Cjg5VElxRVNoZWsxV3ZjZ0U0cGFoMXg4andJV2wvNWMwQTBHcFFib1R0eTdoMThTcWRiQVpOc0pzMEs1OFQxamUKVDEvbms5dXUzT2I4eUNlTC92NmNna1NWRXJvMWxweS9jTjNMUkNTVUs3L0xYSUhtK2tVTlFMRTZzT0ZxcXNUWQoyN2tSZTB0eWRwbnlxUVhBS2k3Z0xoQnJiRlFDOXlkWVJZQWNDVU9wVzZqOVc1eFBVMnZJVFZ5a0NkOFBTN1FFCkYvUTdydzVScjNYRGQzajdHU01GbXRNZk5HVnBnNnlMQW9JQkFRQ2JGQitaSnFmOWJKQXdNWUdlODNVOTQxZG8KMldDYU5yNVl3SlFNdi81MnQvUklmak90NkY2K1BERDVDK3E0MjFmQnU3ajVCemFmMVlwNWl5Q240RHpRdlJ2TQpOd2huTWNjSjluVW9nTEhlaUJkaEtEL0FKVXlkejhYUnJ6Tk40ZGRhYSsxNkZlU3hUS2FxOWRaU21GbEZtZ1VYCnM4VUxDVGQ5aDNVbHF3eUVqY2UxNTBQOThEK2w5ZG5Ra2crTzFlWm5zcnRFZ1VSTEJBaUpXYXk1bVdmcU04UVgKUVQvM1VSdWo5MWFwV0dSaGYydEpkV3ZyQU1HczNlUlhYbk1RTThLMG5mbStzVi8rMkxBVUVSTUQwakxBR0dSWgpQTERzN3RRTjRGOVJ3ZlkwRmtBSVRjZnp1cVJxL2c1RW1TZ3g0QnR1ZVZNTXg4TWI4eTF3ckQzeXJsbTEKLS0tLS1FTkQgUlNBIFBSSVZBVEUgS0VZLS0tLS0= 67a9feb38e684 hmac-md5 fdcf:39d9:630d:284b::0 fdcf:39d9:630d:284b:ffff:ffff:ffff:ffff 48 hmac-md5 fd36:94be:70a6:32a4::0 fd36:94be:70a6:32a4:ffff:ffff:ffff:ffff 48 hmac-md5 fd93:1100:2856:1234::1000:0 fd93:1100:2856:1234::1fff:ffff 64 assist medium 200 600 67a9532677f13 rno1.rail-city.net (ACME Client) 67a9532676509 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 LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1JR2tBZ0VCQkRCYWFXN011MmpOTCtjQndXZnArbXNKMW1QVzNQaVpldHFBYlE1NVdLeklnMU1LR2NETDJiUm4KNjB2SFhkT2FJYXlnQndZRks0RUVBQ0toWkFOaUFBVG84cmtGdGRXRDVnTU9ZQ0xIbm90SmVlR08rc3JTV1VIVwpycysrNy9iaEptSnFLTnhoblhGRW85TzJMM3ZxakorR3E4bmdzOVFJaTM3eXNJcFJ5UVo4M09aUEhabnUxZW9zCi9zbWtESmVxdDBqL0w1OHNpS0VsdldISkYwOERIa3M9Ci0tLS0tRU5EIEVDIFBSSVZBVEUgS0VZLS0tLS0K 0 1 1 1 1 0 1 0 0 0 0 1 lan 0 0 0 0 1 0 0 1 0 0 1080 1443 letsencrypt@blkdoor.com 0 1 10 h1,h2,h3 0 0 10 0 0