Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- pfctl -sa
- TRANSLATION RULES:
- no nat proto carp all
- nat-anchor "natearly/*" all
- nat-anchor "natrules/*" all
- nat on lagg0_vlan2000 inet from <tonatsubnets> to any port = isakmp -> 192.168.0.10 static-port
- nat on lagg0_vlan2000 inet from <tonatsubnets> to any -> 192.168.0.10 port 1024:65535
- no rdr proto carp all
- rdr-anchor "relayd/*" all
- rdr-anchor "tftp-proxy/*" all
- rdr-anchor "miniupnpd" all
- FILTER RULES:
- scrub on lagg0_vlan2000 all fragment reassemble
- scrub on lagg0_vlan1007 all fragment reassemble
- scrub on lagg0_vlan2010 all fragment reassemble
- scrub on lagg0_vlan1005 all fragment reassemble
- scrub on lagg0_vlan1008 all fragment reassemble
- scrub on lagg0_vlan1006 all fragment reassemble
- anchor "relayd/*" all
- anchor "openvpn/*" all
- anchor "ipsec/*" all
- block drop in log quick inet from 169.254.0.0/16 to any label "Block IPv4 link-local"
- block drop in log quick inet from any to 169.254.0.0/16 label "Block IPv4 link-local"
- block drop in log inet all label "Default deny rule IPv4"
- block drop out log inet all label "Default deny rule IPv4"
- block drop in log inet6 all label "Default deny rule IPv6"
- block drop out log inet6 all label "Default deny rule IPv6"
- pass quick inet6 proto ipv6-icmp all icmp6-type unreach keep state
- pass quick inet6 proto ipv6-icmp all icmp6-type toobig keep state
- pass quick inet6 proto ipv6-icmp all icmp6-type neighbrsol keep state
- pass quick inet6 proto ipv6-icmp all icmp6-type neighbradv keep state
- pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type echorep keep state
- pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routersol keep state
- pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routeradv keep state
- pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type neighbrsol keep state
- pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type neighbradv keep state
- pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type echorep keep state
- pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routersol keep state
- pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routeradv keep state
- pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type neighbrsol keep state
- pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type neighbradv keep state
- pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type echoreq keep state
- pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routersol keep state
- pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routeradv keep state
- pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type neighbrsol keep state
- pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type neighbradv keep state
- pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type echoreq keep state
- pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type routersol keep state
- pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type routeradv keep state
- pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type neighbrsol keep state
- pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type neighbradv keep state
- pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type echoreq keep state
- pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routersol keep state
- pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routeradv keep state
- pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type neighbrsol keep state
- pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type neighbradv keep state
- block drop log quick inet proto tcp from any port = 0 to any label "Block traffic from port 0"
- block drop log quick inet proto udp from any port = 0 to any label "Block traffic from port 0"
- block drop log quick inet proto tcp from any to any port = 0 label "Block traffic to port 0"
- block drop log quick inet proto udp from any to any port = 0 label "Block traffic to port 0"
- block drop log quick inet6 proto tcp from any port = 0 to any label "Block traffic from port 0"
- block drop log quick inet6 proto udp from any port = 0 to any label "Block traffic from port 0"
- block drop log quick inet6 proto tcp from any to any port = 0 label "Block traffic to port 0"
- block drop log quick inet6 proto udp from any to any port = 0 label "Block traffic to port 0"
- block drop log quick from <snort2c> to any label "Block snort2c hosts"
- block drop log quick from any to <snort2c> label "Block snort2c hosts"
- block drop in log quick proto carp from (self) to any
- pass quick proto carp all no state
- block drop in log quick proto tcp from <sshlockout> to (self) port = rsh-spx label "sshlockout"
- block drop in log quick proto tcp from <webConfiguratorlockout> to (self) port = https label "webConfiguratorlockout"
- block drop in log quick from <virusprot> to any label "virusprot overload table"
- block drop in log quick on lagg0_vlan2000 from <bogons> to any label "block bogon IPv4 networks from WAN"
- block drop in log quick on lagg0_vlan2000 from <bogonsv6> to any label "block bogon IPv6 networks from WAN"
- block drop in log on ! lagg0_vlan2000 inet from 192.168.0.0/24 to any
- block drop in log inet from 192.168.0.10 to any
- block drop in log inet from 192.168.0.12 to any
- block drop in log on lagg0_vlan2000 inet6 from fe80::ec4:7aff:feac:9c73 to any
- block drop in log on ! lagg0_vlan1007 inet from 10.10.7.0/24 to any
- block drop in log inet from 10.10.7.10 to any
- block drop in log on lagg0_vlan1007 inet6 from fe80::ec4:7aff:feac:9c73 to any
- block drop in log on ! lagg0_vlan2010 inet from 172.19.0.0/20 to any
- block drop in log inet from 172.19.3.10 to any
- block drop in log inet from 172.19.3.12 to any
- block drop in log on lagg0_vlan2010 inet6 from fe80::ec4:7aff:feac:9c73 to any
- block drop in log on ! lagg0_vlan1008 inet from 10.10.8.0/24 to any
- block drop in log inet from 10.10.8.10 to any
- block drop in log inet from 10.10.8.12 to any
- block drop in log on lagg0_vlan1008 inet6 from fe80::ec4:7aff:feac:9c73 to any
- pass in on lo0 inet all flags S/SA keep state label "pass IPv4 loopback"
- pass out on lo0 inet all flags S/SA keep state label "pass IPv4 loopback"
- pass in on lo0 inet6 all flags S/SA keep state label "pass IPv6 loopback"
- pass out on lo0 inet6 all flags S/SA keep state label "pass IPv6 loopback"
- pass out inet all flags S/SA keep state allow-opts label "let out anything IPv4 from firewall host itself"
- pass out inet6 all flags S/SA keep state allow-opts label "let out anything IPv6 from firewall host itself"
- pass out route-to (lagg0_vlan2000 192.168.0.5) inet from 192.168.0.10 to ! 192.168.0.0/24 flags S/SA keep state allow-opts label "let out anything from firewall host itself"
- pass out route-to (lagg0_vlan2000 192.168.0.5) inet from 192.168.0.12 to ! 192.168.0.0/24 flags S/SA keep state allow-opts label "let out anything from firewall host itself"
- pass in quick on lagg0_vlan1007 proto tcp from any to (lagg0_vlan1007) port = https flags S/SA keep state label "anti-lockout rule"
- pass in quick on lagg0_vlan1007 proto tcp from any to (lagg0_vlan1007) port = http flags S/SA keep state label "anti-lockout rule"
- pass in quick on lagg0_vlan1007 proto tcp from any to (lagg0_vlan1007) port = rsh-spx flags S/SA keep state label "anti-lockout rule"
- anchor "userrules/*" all
- pass out quick on lagg0_vlan2000 inet from <BACKUP_SERVERS> to any flags S/SA keep state allow-opts label "USER_RULE: TEST ROUTING"
- pass in quick on openvpn inet all flags S/SA keep state label "USER_RULE: TEMP"
- pass in quick on openvpn inet from any to (self) flags S/SA keep state label "USER_RULE: TEMP"
- pass in quick on lagg0_vlan2000 reply-to (lagg0_vlan2000 192.168.0.5) inet proto tcp from any to (self) port = https flags S/SA keep state label "USER_RULE: Easy Rule: Passed from Firewall Log View"
- pass in quick on lagg0_vlan2000 reply-to (lagg0_vlan2000 192.168.0.5) inet proto tcp from <ITOP_PUBLIC_IP> to (self) port = rsh-spx flags S/SA keep state label "USER_RULE"
- pass in quick on lagg0_vlan2000 reply-to (lagg0_vlan2000 192.168.0.5) inet proto tcp from <ITOP_PUBLIC_IP> to (self) port = https flags S/SA keep state label "USER_RULE"
- pass in quick on lagg0_vlan2000 reply-to (lagg0_vlan2000 192.168.0.5) inet proto tcp from any to (self) port = rsh-spx flags S/SA keep state label "USER_RULE: Easy Rule: Passed from Firewall Log View"
- pass in quick on lagg0_vlan1007 inet proto carp from any to (self) keep state label "USER_RULE: CARP ALLOWED"
- pass in quick on lagg0_vlan1007 inet proto pfsync from any to (self) keep state label "USER_RULE: PFSYNC ALLOWED"
- pass in quick on lagg0_vlan2010 inet proto tcp from any to (self) port = http flags S/SA keep state label "USER_RULE: WEB INTERFACE"
- pass in quick on lagg0_vlan2010 inet proto tcp from any to (self) port = https flags S/SA keep state label "USER_RULE: WEB INTERFACE"
- pass in quick on lagg0_vlan2010 inet proto tcp from any to (self) port = rsh-spx flags S/SA keep state label "USER_RULE: SSH"
- pass in quick on lagg0_vlan2010 inet proto icmp from any to (self) keep state label "USER_RULE"
- pass in quick on lagg0_vlan2010 inet from any to <HQ_LANS> flags S/SA keep state label "USER_RULE: oldlan2hqlans"
- block drop in quick on lagg0_vlan2010 inet from any to <LANs_RFC1918> label "USER_RULE: LAST RULE-1"
- pass in quick on lagg0_vlan1008 route-to (lagg0_vlan2000 192.168.0.1) inet from <BACKUP_SERVERS> to any flags S/SA keep state allow-opts label "USER_RULE: TEST ROUTING"
- pass in quick on lagg0_vlan1008 route-to (lagg0_vlan2000 192.168.0.1) inet proto tcp from <BACKUP_SERVERS> to any flags any keep state allow-opts label "USER_RULE: TEST ROUTING"
- pass in quick on lagg0_vlan1008 inet all flags S/SA keep state label "USER_RULE: TEMP"
- pass in quick on lagg0_vlan1008 inet proto tcp from any to (self) port = http flags S/SA keep state label "USER_RULE"
- pass in quick on lagg0_vlan1008 inet proto tcp from any to (self) port = https flags S/SA keep state label "USER_RULE"
- pass in quick on lagg0_vlan1008 inet proto tcp from any to (self) port = domain flags S/SA keep state label "USER_RULE"
- pass in quick on lagg0_vlan1008 inet proto udp from any to (self) port = domain keep state label "USER_RULE"
- pass in quick on lagg0_vlan1008 inet proto icmp from any to (self) keep state label "USER_RULE: Ping Allowed"
- pass in quick on lagg0_vlan1008 inet from <SUBNET_SERVERS> to any flags S/SA keep state label "USER_RULE: servers2all"
- block drop in quick on lagg0_vlan1008 inet from any to <LANs_RFC1918> label "USER_RULE: LAST RULE-1"
- pass in quick on lagg0_vlan1008 inet all flags S/SA keep state label "USER_RULE: LAST RULE, FULL NET ACCESS"
- pass quick on lagg0_vlan1008 inet proto tcp from 10.10.8.0/24 to 10.0.0.0/8 flags any keep state (sloppy) label "pass traffic between statically routed subnets"
- pass quick on lagg0_vlan1008 inet from 10.10.8.0/24 to 10.0.0.0/8 flags S/SA keep state (sloppy) label "pass traffic between statically routed subnets"
- pass quick on lagg0_vlan1008 inet proto tcp from 10.0.0.0/8 to 10.10.8.0/24 flags any keep state (sloppy) label "pass traffic between statically routed subnets"
- pass quick on lagg0_vlan1008 inet from 10.0.0.0/8 to 10.10.8.0/24 flags S/SA keep state (sloppy) label "pass traffic between statically routed subnets"
- anchor "tftp-proxy/*" all
- No queue in use
- STATES:
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:49682 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:45483 (10.10.3.30:49682) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:33817 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:34163 (10.10.3.30:33817) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:42768 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:36604 (10.10.3.30:42768) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:32853 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:30371 (10.10.3.30:32853) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:40778 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:23727 (10.10.3.30:40778) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:53099 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:34174 (10.10.3.30:53099) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:56118 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:33146 (10.10.3.30:56118) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:55475 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:3541 (10.10.3.30:55475) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:55644 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:52608 (10.10.3.30:55644) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:44473 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:2663 (10.10.3.30:44473) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 10.10.8.12:443 <- 172.19.11.2:52890 FIN_WAIT_2:FIN_WAIT_2
- lagg0_vlan1008 udp 194.221.66.114:53 <- 10.10.3.50:31315 SINGLE:MULTIPLE
- lagg0_vlan2000 udp 192.168.0.10:59538 (10.10.3.50:31315) -> 194.221.66.114:53 MULTIPLE:SINGLE
- lagg0_vlan1007 pfsync 10.10.7.10 -> 10.10.7.11 MULTIPLE:MULTIPLE
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:54426 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:22675 (10.10.3.30:54426) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:52815 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:55394 (10.10.3.30:52815) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:33199 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:50074 (10.10.3.30:33199) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:48268 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:62666 (10.10.3.30:48268) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:51822 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:20998 (10.10.3.30:51822) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 udp 193.108.88.0:53 <- 10.10.3.50:17702 SINGLE:MULTIPLE
- lagg0_vlan2000 udp 192.168.0.10:15262 (10.10.3.50:17702) -> 193.108.88.0:53 MULTIPLE:SINGLE
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:35545 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:44257 (10.10.3.30:35545) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:58439 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:55507 (10.10.3.30:58439) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:51542 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:47390 (10.10.3.30:51542) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 23.218.167.129:443 <- 10.10.3.20:60914 TIME_WAIT:TIME_WAIT
- lagg0_vlan2000 tcp 192.168.0.10:33721 (10.10.3.20:60914) -> 23.218.167.129:443 TIME_WAIT:TIME_WAIT
- lagg0_vlan1008 tcp 10.10.8.10:443 <- 10.10.3.51:34972 FIN_WAIT_2:FIN_WAIT_2
- lagg0_vlan1008 tcp 10.10.8.10:222 <- 10.10.3.51:60678 TIME_WAIT:TIME_WAIT
- lo0 udp ::1[39005] -> ::1[123] MULTIPLE:SINGLE
- lagg0_vlan1008 icmp 10.10.8.10:20774 -> 10.10.8.1:20774 0:0
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:55922 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:54324 (10.10.3.30:55922) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:34555 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:30244 (10.10.3.30:34555) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:53168 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:35399 (10.10.3.30:53168) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:37774 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:59643 (10.10.3.30:37774) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:47903 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:43195 (10.10.3.30:47903) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:58843 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:40712 (10.10.3.30:58843) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:40252 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:37455 (10.10.3.30:40252) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 10.10.8.12:443 <- 172.19.11.2:52891 FIN_WAIT_2:FIN_WAIT_2
- lagg0_vlan1008 udp 10.10.8.12:53 <- 10.10.3.10:51154 SINGLE:MULTIPLE
- lagg0_vlan1008 tcp 23.218.167.129:443 <- 10.10.3.20:60917 TIME_WAIT:TIME_WAIT
- lagg0_vlan2000 tcp 192.168.0.10:18458 (10.10.3.20:60917) -> 23.218.167.129:443 TIME_WAIT:TIME_WAIT
- lagg0_vlan2000 icmp 192.168.0.11:4090 -> 192.168.0.1:4090 0:0
- lagg0_vlan2000 icmp 192.168.0.11:4402 -> 192.168.0.5:4402 0:0
- lagg0_vlan1008 tcp 10.10.8.11:443 <- 10.10.3.51:36452 TIME_WAIT:TIME_WAIT
- lo0 udp ::1[123] <- ::1[39005] SINGLE:MULTIPLE
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:56125 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:44063 (10.10.3.30:56125) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:54530 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:12366 (10.10.3.30:54530) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:37219 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:28616 (10.10.3.30:37219) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:54748 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:53855 (10.10.3.30:54748) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:38435 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:18786 (10.10.3.30:38435) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 udp 10.10.8.12:53 <- 10.10.3.51:60602 SINGLE:MULTIPLE
- lo0 udp ::1[123] <- ::1[29028] SINGLE:MULTIPLE
- lagg0_vlan2000 udp 192.168.0.11:49892 (172.19.3.12:123) -> 51.255.138.215:123 MULTIPLE:SINGLE
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:51668 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:15112 (10.10.3.30:51668) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:41059 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:8825 (10.10.3.30:41059) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:34742 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:6888 (10.10.3.30:34742) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:47055 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:49239 (10.10.3.30:47055) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:44098 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:28439 (10.10.3.30:44098) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan2010 ipv6-icmp ff02::1:ffa4:453b <- fe80::2d30:b10:9a79:5a25 NO_TRAFFIC:NO_TRAFFIC
- lagg0_vlan1008 udp 10.10.8.12:53 <- 10.10.3.10:46168 SINGLE:MULTIPLE
- lagg0_vlan1008 tcp 10.10.8.10:222 <- 172.19.11.2:41878 ESTABLISHED:ESTABLISHED
- lagg0_vlan1008 icmp 10.10.8.11:3893 -> 10.10.8.1:3893 0:0
- lagg0_vlan2000 icmp 192.168.0.10:21101 -> 192.168.0.1:21101 0:0
- lagg0_vlan2000 icmp 192.168.0.10:21565 -> 192.168.0.5:21565 0:0
- lagg0_vlan1008 tcp 10.10.8.12:443 <- 172.19.11.2:52877 ESTABLISHED:ESTABLISHED
- lagg0_vlan1008 tcp 10.10.8.12:443 <- 172.19.11.2:52880 ESTABLISHED:ESTABLISHED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:44635 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:56500 (10.10.3.30:44635) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:45326 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:42705 (10.10.3.30:45326) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:57117 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:4120 (10.10.3.30:57117) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:52932 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:51637 (10.10.3.30:52932) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:53039 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:18188 (10.10.3.30:53039) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:46771 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:13525 (10.10.3.30:46771) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lo0 udp ::1[29028] -> ::1[123] MULTIPLE:SINGLE
- lagg0_vlan2010 ipv6-icmp ff02::1:ff79:5a25 <- fe80::816a:38e0:98a4:453b NO_TRAFFIC:NO_TRAFFIC
- lagg0_vlan2000 tcp 192.168.0.12:12954 -> 91.183.38.102:1194 ESTABLISHED:ESTABLISHED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:54296 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:16891 (10.10.3.30:54296) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:60997 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:28929 (10.10.3.30:60997) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:42645 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:56964 (10.10.3.30:42645) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:43942 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:40233 (10.10.3.30:43942) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 8.8.8.8:80 <- 10.10.3.30:58766 CLOSED:SYN_SENT
- lagg0_vlan2000 tcp 192.168.0.10:3349 (10.10.3.30:58766) -> 8.8.8.8:80 SYN_SENT:CLOSED
- lagg0_vlan1008 tcp 10.10.8.12:443 <- 172.19.11.2:52889 FIN_WAIT_2:FIN_WAIT_2
- INFO:
- Status: Enabled for 43 days 01:43:13 Debug: Urgent
- Interface Stats for lagg0_vlan1007 IPv4 IPv6
- Bytes In 1491371988 0
- Bytes Out 1069517599 0
- Packets In
- Passed 3655037 0
- Blocked 0 0
- Packets Out
- Passed 1321008 0
- Blocked 0 0
- State Table Total Rate
- current entries 127
- searches 132477290 35.6/s
- inserts 2007639 0.5/s
- removals 2007512 0.5/s
- Counters
- match 33033863 8.9/s
- bad-offset 0 0.0/s
- fragment 1 0.0/s
- short 0 0.0/s
- normalize 0 0.0/s
- memory 0 0.0/s
- bad-timestamp 0 0.0/s
- congestion 0 0.0/s
- ip-option 38 0.0/s
- proto-cksum 0 0.0/s
- state-mismatch 14 0.0/s
- state-insert 12 0.0/s
- state-limit 0 0.0/s
- src-limit 0 0.0/s
- synproxy 0 0.0/s
- divert 0 0.0/s
- LABEL COUNTERS:
- Block IPv4 link-local 33026423 10120 1546658 10120 1546658 0 0 0
- Block IPv4 link-local 17205429 0 0 0 0 0 0 0
- Default deny rule IPv4 17205030 9101051 1329748849 9101051 1329748849 0 0 0
- Default deny rule IPv4 29196135 180 40657 0 0 180 40657 0
- Default deny rule IPv6 33016960 3654441 494708470 3654441 494708470 0 0 0
- Default deny rule IPv6 15814255 0 0 0 0 0 0 0
- Block traffic from port 0 32907506 0 0 0 0 0 0 0
- Block traffic from port 0 32907298 0 0 0 0 0 0 0
- Block traffic to port 0 29136182 0 0 0 0 0 0 0
- Block traffic to port 0 29136080 0 0 0 0 0 0 0
- Block traffic from port 0 32908210 0 0 0 0 0 0 0
- Block traffic from port 0 32906806 0 0 0 0 0 0 0
- Block traffic to port 0 3774376 0 0 0 0 0 0 0
- Block traffic to port 0 3774376 0 0 0 0 0 0 0
- Block snort2c hosts 32907056 0 0 0 0 0 0 0
- Block snort2c hosts 32905221 0 0 0 0 0 0 0
- sshlockout 21772216 0 0 0 0 0 0 0
- webConfiguratorlockout 322127 0 0 0 0 0 0 0
- virusprot overload table 20915021 0 0 0 0 0 0 0
- block bogon IPv4 networks from WAN 20913611 0 0 0 0 0 0 0
- block bogon IPv6 networks from WAN 20912476 0 0 0 0 0 0 0
- pass IPv4 loopback 20873874 2566 267272 1283 82552 1283 184720 0
- pass IPv4 loopback 856601 0 0 0 0 0 0 0
- pass IPv6 loopback 123410 120844 30931540 60422 3625320 60422 27306220 2
- pass IPv6 loopback 122127 0 0 0 0 0 0 0
- let out anything IPv4 from firewall host itself 21666925 8009569 3588013633 4190650 2965522869 3818919 622490764 0
- let out anything IPv6 from firewall host itself 855683 120854 30932640 60422 27306220 60432 3626420 2
- let out anything from firewall host itself 29742 146373 86627099 83512 81704145 62861 4922954 54
- let out anything from firewall host itself 28323 0 0 0 0 0 0 0
- anti-lockout rule 21774206 0 0 0 0 0 0 0
- anti-lockout rule 21773011 0 0 0 0 0 0 0
- anti-lockout rule 21773011 0 0 0 0 0 0 0
- USER_RULE: TEST ROUTING 471122 0 0 0 0 0 0 0
- USER_RULE: TEMP 20919897 2256951 729516623 1166028 147261457 1090923 582255166 0
- USER_RULE: TEMP 153 0 0 0 0 0 0 0
- USER_RULE: Easy Rule: Passed from Firewall Log View 20863668 0 0 0 0 0 0 0
- USER_RULE 13 0 0 0 0 0 0 0
- USER_RULE 13 0 0 0 0 0 0 0
- USER_RULE: Easy Rule: Passed from Firewall Log View 13 0 0 0 0 0 0 0
- USER_RULE: CARP ALLOWED 20195630 0 0 0 0 0 0 0
- USER_RULE: PFSYNC ALLOWED 0 0 0 0 0 0 0 0
- USER_RULE: WEB INTERFACE 20193728 70 4880 34 1924 36 2956 0
- USER_RULE: WEB INTERFACE 3334 1784 1402871 623 75727 1161 1327144 0
- USER_RULE: SSH 3305 258 29797 113 9464 145 20333 0
- USER_RULE 16286897 4 280 2 140 2 140 0
- USER_RULE: oldlan2hqlans 16260519 0 0 0 0 0 0 0
- USER_RULE: LAST RULE-1 16260395 5292894 781678237 5292894 781678237 0 0 0
- USER_RULE: TEST ROUTING 7779 6390 3247252 2902 177416 3488 3069836 52
- USER_RULE: TEST ROUTING 0 0 0 0 0 0 0 0
- USER_RULE: TEMP 7692338 11718427 9691798768 4194184 278608151 7524243 9413190617 18
- USER_RULE 76 0 0 0 0 0 0 0
- USER_RULE 9 0 0 0 0 0 0 0
- USER_RULE 9 0 0 0 0 0 0 0
- USER_RULE 9 0 0 0 0 0 0 0
- USER_RULE: Ping Allowed 9 0 0 0 0 0 0 0
- USER_RULE: servers2all 67 0 0 0 0 0 0 0
- USER_RULE: LAST RULE-1 67 67 5048 67 5048 0 0 0
- USER_RULE: LAST RULE, FULL NET ACCESS 0 0 0 0 0 0 0 0
- pass traffic between statically routed subnets 790146 0 0 0 0 0 0 0
- pass traffic between statically routed subnets 219 816 27188 408 14070 408 13118 0
- pass traffic between statically routed subnets 126401 0 0 0 0 0 0 0
- pass traffic between statically routed subnets 188 0 0 0 0 0 0 0
- TIMEOUTS:
- tcp.first 120s
- tcp.opening 30s
- tcp.established 86400s
- tcp.closing 900s
- tcp.finwait 45s
- tcp.closed 90s
- tcp.tsdiff 30s
- udp.first 60s
- udp.single 30s
- udp.multiple 60s
- icmp.first 20s
- icmp.error 10s
- other.first 60s
- other.single 30s
- other.multiple 60s
- frag 30s
- interval 10s
- adaptive.start 487200 states
- adaptive.end 974400 states
- src.track 0s
- LIMITS:
- states hard limit 812000
- src-nodes hard limit 812000
- frags hard limit 5000
- table-entries hard limit 200000
- TABLES:
- BACKUP_SERVERS
- HQ_LANS
- ITOP_PUBLIC_IP
- LANs_RFC1918
- SUBNET_SERVERS
- bogons
- bogonsv6
- snort2c
- sshlockout
- tonatsubnets
- virusprot
- webConfiguratorlockout
- OS FINGERPRINTS:
- 710 fingerprints loaded
Advertisement
Add Comment
Please, Sign In to add comment