Project

General

Profile

Bug #13585 » pfctl_VVSR.txt

Keith Townsend, 10/30/2022 10:55 AM

 
1
@0 scrub on em0 inet all fragment reassemble
2
  [ Evaluations: 697605    Packets: 353441    Bytes: 92920688    States: 0     ]
3
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
4
  [ Last Active Time: N/A ]
5
@1 scrub on em0 inet6 all fragment reassemble
6
  [ Evaluations: 188       Packets: 188       Bytes: 0           States: 0     ]
7
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
8
  [ Last Active Time: N/A ]
9
@2 scrub on em1 inet all fragment reassemble
10
  [ Evaluations: 343976    Packets: 336014    Bytes: 91717767    States: 0     ]
11
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
12
  [ Last Active Time: N/A ]
13
@3 scrub on em1 inet6 all fragment reassemble
14
  [ Evaluations: 400       Packets: 400       Bytes: 0           States: 0     ]
15
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
16
  [ Last Active Time: N/A ]
17
@4 scrub on ovpnc1 inet all fragment reassemble
18
  [ Evaluations: 7562      Packets: 2157      Bytes: 400         States: 0     ]
19
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
20
  [ Last Active Time: N/A ]
21
@5 scrub on ovpnc1 inet6 all fragment reassemble
22
  [ Evaluations: 5         Packets: 5         Bytes: 0           States: 0     ]
23
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
24
  [ Last Active Time: N/A ]
25
@6 scrub on ovpnc2 inet all fragment reassemble
26
  [ Evaluations: 5400      Packets: 1076      Bytes: 0           States: 0     ]
27
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
28
  [ Last Active Time: N/A ]
29
@7 scrub on ovpnc2 inet6 all fragment reassemble
30
  [ Evaluations: 5         Packets: 5         Bytes: 0           States: 0     ]
31
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
32
  [ Last Active Time: N/A ]
33
@8 scrub on tun_wg0 inet all max-mss 1380 fragment reassemble
34
  [ Evaluations: 4319      Packets: 2082      Bytes: 0           States: 0     ]
35
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
36
  [ Last Active Time: N/A ]
37
@9 scrub on tun_wg0 inet6 all max-mss 1360 fragment reassemble
38
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
39
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
40
  [ Last Active Time: N/A ]
41
@10 scrub on tun_wg1 inet all max-mss 1380 fragment reassemble
42
  [ Evaluations: 2237      Packets: 2073      Bytes: 0           States: 0     ]
43
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
44
  [ Last Active Time: N/A ]
45
@11 scrub on tun_wg1 inet6 all max-mss 1360 fragment reassemble
46
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
47
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
48
  [ Last Active Time: N/A ]
49
@0 anchor "openvpn/*" all
50
  [ Evaluations: 12305     Packets: 0         Bytes: 0           States: 0     ]
51
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
52
  [ Last Active Time: N/A ]
53
@1 anchor "ipsec/*" all
54
  [ Evaluations: 12305     Packets: 0         Bytes: 0           States: 0     ]
55
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
56
  [ Last Active Time: N/A ]
57
@2 pass in quick on lo0 inet6 all flags S/SA keep state label "pass IPv6 loopback" ridentifier 1000000001
58
  [ Evaluations: 12305     Packets: 0         Bytes: 0           States: 0     ]
59
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
60
  [ Last Active Time: N/A ]
61
@3 pass out quick on lo0 inet6 all flags S/SA keep state label "pass IPv6 loopback" ridentifier 1000000002
62
  [ Evaluations: 45        Packets: 0         Bytes: 0           States: 0     ]
63
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
64
  [ Last Active Time: N/A ]
65
@4 block drop in log quick inet6 all label "Block all IPv6" ridentifier 1000000003
66
  [ Evaluations: 12224     Packets: 587       Bytes: 93462       States: 0     ]
67
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
68
  [ Last Active Time: N/A ]
69
@5 block drop out log quick inet6 all label "Block all IPv6" ridentifier 1000000004
70
  [ Evaluations: 3819      Packets: 13        Bytes: 1040        States: 0     ]
71
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
72
  [ Last Active Time: N/A ]
73
@6 block drop in log quick inet from 169.254.0.0/16 to any label "Block IPv4 link-local" ridentifier 1000000101
74
  [ Evaluations: 11705     Packets: 0         Bytes: 0           States: 0     ]
75
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
76
  [ Last Active Time: N/A ]
77
@7 block drop in log quick inet from any to 169.254.0.0/16 label "Block IPv4 link-local" ridentifier 1000000102
78
  [ Evaluations: 7854      Packets: 0         Bytes: 0           States: 0     ]
79
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
80
  [ Last Active Time: N/A ]
81
@8 block drop in log inet all label "Default deny rule IPv4" ridentifier 1000000103
82
  [ Evaluations: 7854      Packets: 2873      Bytes: 477217      States: 0     ]
83
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
84
  [ Last Active Time: Sun Oct 30 10:51:37 2022 ]
85
@9 block drop out log inet all label "Default deny rule IPv4" ridentifier 1000000104
86
  [ Evaluations: 11705     Packets: 0         Bytes: 0           States: 0     ]
87
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
88
  [ Last Active Time: N/A ]
89
@10 block drop in log inet6 all label "Default deny rule IPv6" ridentifier 1000000105
90
  [ Evaluations: 11705     Packets: 0         Bytes: 0           States: 0     ]
91
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
92
  [ Last Active Time: N/A ]
93
@11 block drop out log inet6 all label "Default deny rule IPv6" ridentifier 1000000106
94
  [ Evaluations: 3851      Packets: 0         Bytes: 0           States: 0     ]
95
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
96
  [ Last Active Time: N/A ]
97
@12 block drop log quick inet proto tcp from any port = 0 to any label "Block traffic from port 0" ridentifier 1000000107
98
  [ Evaluations: 11705     Packets: 0         Bytes: 0           States: 0     ]
99
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
100
  [ Last Active Time: N/A ]
101
@13 block drop log quick inet proto udp from any port = 0 to any label "Block traffic from port 0" ridentifier 1000000107
102
  [ Evaluations: 3706      Packets: 0         Bytes: 0           States: 0     ]
103
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
104
  [ Last Active Time: N/A ]
105
@14 block drop log quick inet proto tcp from any to any port = 0 label "Block traffic to port 0" ridentifier 1000000108
106
  [ Evaluations: 11705     Packets: 0         Bytes: 0           States: 0     ]
107
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
108
  [ Last Active Time: N/A ]
109
@15 block drop log quick inet proto udp from any to any port = 0 label "Block traffic to port 0" ridentifier 1000000108
110
  [ Evaluations: 3706      Packets: 0         Bytes: 0           States: 0     ]
111
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
112
  [ Last Active Time: N/A ]
113
@16 block drop log quick from <snort2c:0> to any label "Block snort2c hosts" ridentifier 1000000109
114
  [ Evaluations: 11705     Packets: 0         Bytes: 0           States: 0     ]
115
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
116
  [ Last Active Time: N/A ]
117
@17 block drop log quick from any to <snort2c:0> label "Block snort2c hosts" ridentifier 1000000110
118
  [ Evaluations: 11705     Packets: 0         Bytes: 0           States: 0     ]
119
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
120
  [ Last Active Time: N/A ]
121
@18 block drop in log quick proto tcp from <sshguard:0> to (self:14) port = ssh label "sshguard" ridentifier 1000000301
122
  [ Evaluations: 11705     Packets: 0         Bytes: 0           States: 0     ]
123
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
124
  [ Last Active Time: N/A ]
125
@19 block drop in log quick proto tcp from <sshguard:0> to (self:14) port = 8282 label "GUI Lockout" ridentifier 1000000351
126
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
127
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
128
  [ Last Active Time: N/A ]
129
@20 block drop in log quick from <virusprot:0> to any label "virusprot overload table" ridentifier 1000000400
130
  [ Evaluations: 7854      Packets: 0         Bytes: 0           States: 0     ]
131
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
132
  [ Last Active Time: N/A ]
133
@21 pass in quick on em0 proto udp from any port = bootps to any port = bootpc keep state label "allow dhcp replies in WAN" ridentifier 1000000461
134
  [ Evaluations: 7854      Packets: 2         Bytes: 730         States: 0     ]
135
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
136
  [ Last Active Time: N/A ]
137
@22 pass out quick on em0 proto udp from any port = bootpc to any port = bootps keep state label "allow dhcp client out WAN" ridentifier 1000000462
138
  [ Evaluations: 4916      Packets: 0         Bytes: 0           States: 0     ]
139
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
140
  [ Last Active Time: N/A ]
141
@23 block drop in log on ! em0 inet from 70.188.246.0/23 to any ridentifier 1000001470
142
  [ Evaluations: 11704     Packets: 0         Bytes: 0           States: 0     ]
143
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
144
  [ Last Active Time: N/A ]
145
@24 block drop in log inet from 70.188.246.181 to any ridentifier 1000001470
146
  [ Evaluations: 10793     Packets: 0         Bytes: 0           States: 0     ]
147
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
148
  [ Last Active Time: N/A ]
149
@25 block drop in log on em0 inet6 from fe80::6a05:caff:fe2e:339d to any ridentifier 1000001470
150
  [ Evaluations: 7853      Packets: 0         Bytes: 0           States: 0     ]
151
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
152
  [ Last Active Time: N/A ]
153
@26 block drop in log on ! em1 inet from 192.168.22.0/24 to any ridentifier 1000002520
154
  [ Evaluations: 7853      Packets: 0         Bytes: 0           States: 0     ]
155
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
156
  [ Last Active Time: N/A ]
157
@27 block drop in log inet from 192.168.22.1 to any ridentifier 1000002520
158
  [ Evaluations: 7853      Packets: 1         Bytes: 52          States: 0     ]
159
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
160
  [ Last Active Time: N/A ]
161
@28 block drop in log on em1 inet6 from fe80::6a05:caff:fe2f:153c to any ridentifier 1000002520
162
  [ Evaluations: 7853      Packets: 0         Bytes: 0           States: 0     ]
163
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
164
  [ Last Active Time: N/A ]
165
@29 block drop in log on ! ovpnc1 inet6 from fdda:d0d0:cafe:1197::/64 to any ridentifier 1000003570
166
  [ Evaluations: 2809      Packets: 0         Bytes: 0           States: 0     ]
167
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
168
  [ Last Active Time: N/A ]
169
@30 block drop in log on ovpnc1 inet6 from fe80::6a05:caff:fe2e:339d to any ridentifier 1000003570
170
  [ Evaluations: 10        Packets: 0         Bytes: 0           States: 0     ]
171
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
172
  [ Last Active Time: N/A ]
173
@31 block drop in log inet6 from fdda:d0d0:cafe:1197::1002 to any ridentifier 1000003570
174
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
175
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
176
  [ Last Active Time: N/A ]
177
@32 block drop in log on ! ovpnc1 inet from 10.11.0.0/16 to any ridentifier 1000003570
178
  [ Evaluations: 7132      Packets: 0         Bytes: 0           States: 0     ]
179
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
180
  [ Last Active Time: N/A ]
181
@33 block drop in log inet from 10.11.0.4 to any ridentifier 1000003570
182
  [ Evaluations: 7132      Packets: 0         Bytes: 0           States: 0     ]
183
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
184
  [ Last Active Time: N/A ]
185
@34 block drop in log on ! ovpnc2 inet6 from fdda:d0d0:cafe:1196::/64 to any ridentifier 1000004620
186
  [ Evaluations: 7132      Packets: 0         Bytes: 0           States: 0     ]
187
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
188
  [ Last Active Time: N/A ]
189
@35 block drop in log on ovpnc2 inet6 from fe80::6a05:caff:fe2e:339d to any ridentifier 1000004620
190
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
191
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
192
  [ Last Active Time: N/A ]
193
@36 block drop in log inet6 from fdda:d0d0:cafe:1196::1001 to any ridentifier 1000004620
194
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
195
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
196
  [ Last Active Time: N/A ]
197
@37 block drop in log on ! ovpnc2 inet from 10.10.0.0/16 to any ridentifier 1000004620
198
  [ Evaluations: 7132      Packets: 0         Bytes: 0           States: 0     ]
199
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
200
  [ Last Active Time: N/A ]
201
@38 block drop in log inet from 10.10.0.3 to any ridentifier 1000004620
202
  [ Evaluations: 7132      Packets: 0         Bytes: 0           States: 0     ]
203
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
204
  [ Last Active Time: N/A ]
205
@39 block drop in log on ! tun_wg0 inet from 10.65.82.233 to any ridentifier 1000005670
206
  [ Evaluations: 7853      Packets: 0         Bytes: 0           States: 0     ]
207
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
208
  [ Last Active Time: N/A ]
209
@40 block drop in log inet from 10.65.82.233 to any ridentifier 1000005670
210
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
211
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
212
  [ Last Active Time: N/A ]
213
@41 block drop in log on ! tun_wg1 inet from 10.64.137.39 to any ridentifier 1000006720
214
  [ Evaluations: 7853      Packets: 0         Bytes: 0           States: 0     ]
215
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
216
  [ Last Active Time: N/A ]
217
@42 block drop in log inet from 10.64.137.39 to any ridentifier 1000006720
218
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
219
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
220
  [ Last Active Time: N/A ]
221
@43 pass in on lo0 inet all flags S/SA keep state label "pass IPv4 loopback" ridentifier 1000009911
222
  [ Evaluations: 7853      Packets: 72        Bytes: 5892        States: 0     ]
223
  [ Inserted: uid 0 pid 9864 State Creations: 1     ]
224
  [ Last Active Time: Sun Oct 30 10:44:28 2022 ]
225
@44 pass out on lo0 inet all flags S/SA keep state label "pass IPv4 loopback" ridentifier 1000009912
226
  [ Evaluations: 3887      Packets: 0         Bytes: 0           States: 0     ]
227
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
228
  [ Last Active Time: N/A ]
229
@45 pass out inet all flags S/SA keep state allow-opts label "let out anything IPv4 from firewall host itself" ridentifier 1000009913
230
  [ Evaluations: 11668     Packets: 13437     Bytes: 2665431     States: 146   ]
231
  [ Inserted: uid 0 pid 9864 State Creations: 765   ]
232
  [ Last Active Time: Sun Oct 30 10:51:37 2022 ]
233
@46 pass out route-to (em0 70.188.246.1) inet from 70.188.246.181 to ! 70.188.246.0/23 flags S/SA keep state allow-opts label "let out anything from firewall host itself" ridentifier 1000010011
234
  [ Evaluations: 3851      Packets: 142041    Bytes: 96408550    States: 410   ]
235
  [ Inserted: uid 0 pid 9864 State Creations: 1963  ]
236
  [ Last Active Time: Sun Oct 30 10:51:37 2022 ]
237
@47 pass out route-to (ovpnc1 10.11.0.4) inet from 10.11.0.4 to ! 10.11.0.0/16 flags S/SA keep state allow-opts label "let out anything from firewall host itself" ridentifier 1000010012
238
  [ Evaluations: 3401      Packets: 16        Bytes: 464         States: 0     ]
239
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
240
  [ Last Active Time: N/A ]
241
@48 pass out route-to (ovpnc1 fdda:d0d0:cafe:1197::) inet6 from fdda:d0d0:cafe:1197::1002 to ! fdda:d0d0:cafe:1197::/64 flags S/SA keep state allow-opts label "let out anything from firewall host itself" ridentifier 1000010013
242
  [ Evaluations: 3401      Packets: 0         Bytes: 0           States: 0     ]
243
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
244
  [ Last Active Time: N/A ]
245
@49 pass out route-to (ovpnc2 10.10.0.3) inet from 10.10.0.3 to ! 10.10.0.0/16 flags S/SA keep state allow-opts label "let out anything from firewall host itself" ridentifier 1000010014
246
  [ Evaluations: 3401      Packets: 14        Bytes: 406         States: 0     ]
247
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
248
  [ Last Active Time: N/A ]
249
@50 pass out route-to (ovpnc2 fdda:d0d0:cafe:1196::) inet6 from fdda:d0d0:cafe:1196::1001 to ! fdda:d0d0:cafe:1196::/64 flags S/SA keep state allow-opts label "let out anything from firewall host itself" ridentifier 1000010015
250
  [ Evaluations: 3401      Packets: 0         Bytes: 0           States: 0     ]
251
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
252
  [ Last Active Time: N/A ]
253
@51 pass out route-to (tun_wg0 10.65.82.233) inet from 10.65.82.233 to ! 10.65.82.233 flags S/SA keep state allow-opts label "let out anything from firewall host itself" ridentifier 1000010016
254
  [ Evaluations: 3851      Packets: 12        Bytes: 348         States: 0     ]
255
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
256
  [ Last Active Time: N/A ]
257
@52 pass out route-to (tun_wg1 10.64.137.39) inet from 10.64.137.39 to ! 10.64.137.39 flags S/SA keep state allow-opts label "let out anything from firewall host itself" ridentifier 1000010017
258
  [ Evaluations: 3851      Packets: 12        Bytes: 516         States: 0     ]
259
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
260
  [ Last Active Time: N/A ]
261
@53 pass in quick on em1 proto tcp from any to (em1:2) port = 8282 flags S/SA keep state label "anti-lockout rule" ridentifier 10001
262
  [ Evaluations: 11704     Packets: 232       Bytes: 145924      States: 2     ]
263
  [ Inserted: uid 0 pid 9864 State Creations: 4     ]
264
  [ Last Active Time: Sun Oct 30 10:51:37 2022 ]
265
@54 pass in quick on em1 proto tcp from any to (em1:2) port = ssh flags S/SA keep state label "anti-lockout rule" ridentifier 10001
266
  [ Evaluations: 1138      Packets: 0         Bytes: 0           States: 0     ]
267
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
268
  [ Last Active Time: N/A ]
269
@55 anchor "userrules/*" all
270
  [ Evaluations: 11699     Packets: 0         Bytes: 0           States: 0     ]
271
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
272
  [ Last Active Time: N/A ]
273
@56 pass in quick on WireGuard inet all flags S/SA keep state label "USER_RULE" label "id:1623716891" ridentifier 1623716891
274
  [ Evaluations: 11699     Packets: 0         Bytes: 0           States: 0     ]
275
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
276
  [ Last Active Time: N/A ]
277
@57 pass in quick on openvpn inet all flags S/SA keep state label "USER_RULE: OpenVPN Remote VPN2 wizard" label "id:1523287278" ridentifier 1523287278
278
  [ Evaluations: 11697     Packets: 0         Bytes: 0           States: 0     ]
279
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
280
  [ Last Active Time: N/A ]
281
@58 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to 70.188.246.181 port = 51820 keep state label "USER_RULE: Pass traffic to WireGuard" label "id:1613233168" ridentifier 1613233168
282
  [ Evaluations: 11688     Packets: 4         Bytes: 416         States: 0     ]
283
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
284
  [ Last Active Time: N/A ]
285
@59 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto icmp all keep state label "USER_RULE: Allow Pings" label "id:1419280969" ridentifier 1419280969
286
  [ Evaluations: 3032      Packets: 0         Bytes: 0           States: 0     ]
287
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
288
  [ Last Active Time: N/A ]
289
@60 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto tcp from any to 70.188.246.181 port = 8282 flags S/SA keep state label "USER_RULE: Allow remote admin of Pfsense" label "id:1419280970" ridentifier 1419280970
290
  [ Evaluations: 3032      Packets: 0         Bytes: 0           States: 0     ]
291
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
292
  [ Last Active Time: N/A ]
293
@61 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to 70.188.246.181 port = 8282 keep state label "USER_RULE: Allow remote admin of Pfsense" label "id:1419280970" ridentifier 1419280970
294
  [ Evaluations: 1064      Packets: 0         Bytes: 0           States: 0     ]
295
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
296
  [ Last Active Time: N/A ]
297
@62 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto tcp from any to <BrandiIP:1> port = ms-wbt-server flags S/SA keep state label "USER_RULE: NAT Remote Desktop Brandi" label "id:1419280971" ridentifier 1419280971
298
  [ Evaluations: 3032      Packets: 764       Bytes: 155781      States: 13    ]
299
  [ Inserted: uid 0 pid 9864 State Creations: 47    ]
300
  [ Last Active Time: Sun Oct 30 10:51:22 2022 ]
301
@63 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to <BrandiIP:1> port = ms-wbt-server keep state label "USER_RULE: NAT Remote Desktop Brandi" label "id:1419280971" ridentifier 1419280971
302
  [ Evaluations: 1064      Packets: 0         Bytes: 0           States: 0     ]
303
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
304
  [ Last Active Time: N/A ]
305
@64 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto tcp from any to <KeithIP:1> port = 3390 flags S/SA keep state label "USER_RULE: NAT Remote Desktop Keith" label "id:1419280972" ridentifier 1419280972
306
  [ Evaluations: 2979      Packets: 12186     Bytes: 2361644     States: 133   ]
307
  [ Inserted: uid 0 pid 9864 State Creations: 685   ]
308
  [ Last Active Time: Sun Oct 30 10:51:37 2022 ]
309
@65 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to <KeithIP:1> port = 3390 keep state label "USER_RULE: NAT Remote Desktop Keith" label "id:1419280972" ridentifier 1419280972
310
  [ Evaluations: 1064      Packets: 0         Bytes: 0           States: 0     ]
311
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
312
  [ Last Active Time: N/A ]
313
@66 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to 70.188.246.181 port = openvpn keep state label "USER_RULE: OpenVPN Remote VPN1 wizard" label "id:1434767411" ridentifier 1434767411
314
  [ Evaluations: 2209      Packets: 0         Bytes: 0           States: 0     ]
315
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
316
  [ Last Active Time: N/A ]
317
@67 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to <KeithIP:1> port = discard keep state label "USER_RULE: NAT WOL KEITH-PC" label "id:1464092460" ridentifier 1464092460
318
  [ Evaluations: 1064      Packets: 0         Bytes: 0           States: 0     ]
319
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
320
  [ Last Active Time: N/A ]
321
@68 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto tcp from any to <Emby:1> port = 8096 flags S/SA keep state label "USER_RULE: NAT Emby" label "id:1464092462" ridentifier 1464092462
322
  [ Evaluations: 2209      Packets: 0         Bytes: 0           States: 0     ]
323
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
324
  [ Last Active Time: N/A ]
325
@69 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to <Emby:1> port = 8096 keep state label "USER_RULE: NAT Emby" label "id:1464092462" ridentifier 1464092462
326
  [ Evaluations: 1064      Packets: 0         Bytes: 0           States: 0     ]
327
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
328
  [ Last Active Time: N/A ]
329
@70 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto tcp from any to <Emby:1> port = 8920 flags S/SA keep state label "USER_RULE: NAT Emby" label "id:1469705408" ridentifier 1469705408
330
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
331
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
332
  [ Last Active Time: N/A ]
333
@71 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to <Emby:1> port = 8920 keep state label "USER_RULE: NAT Emby" label "id:1469705408" ridentifier 1469705408
334
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
335
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
336
  [ Last Active Time: N/A ]
337
@72 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto tcp from any to <Buffalo_NAS:1> port = 9000 flags S/SA keep state label "USER_RULE: NAT Buffalo NAS" label "id:1523759741" ridentifier 1523759741
338
  [ Evaluations: 2209      Packets: 0         Bytes: 0           States: 0     ]
339
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
340
  [ Last Active Time: N/A ]
341
@73 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to <Buffalo_NAS:1> port = 9000 keep state label "USER_RULE: NAT Buffalo NAS" label "id:1523759741" ridentifier 1523759741
342
  [ Evaluations: 1064      Packets: 0         Bytes: 0           States: 0     ]
343
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
344
  [ Last Active Time: N/A ]
345
@74 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto tcp from any to <UbuntuServer:1> port = 8443 flags S/SA keep state label "USER_RULE: NAT OpenConnect" label "id:1531746831" ridentifier 1531746831
346
  [ Evaluations: 2209      Packets: 0         Bytes: 0           States: 0     ]
347
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
348
  [ Last Active Time: N/A ]
349
@75 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to <UbuntuServer:1> port = 8443 keep state label "USER_RULE: NAT OpenConnect" label "id:1531746831" ridentifier 1531746831
350
  [ Evaluations: 1064      Packets: 0         Bytes: 0           States: 0     ]
351
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
352
  [ Last Active Time: N/A ]
353
@76 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto tcp from any to <UbuntuServer:1> port = 9925 flags S/SA keep state label "USER_RULE: NAT Mealie Access" label "id:1626641131" ridentifier 1626641131
354
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
355
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
356
  [ Last Active Time: N/A ]
357
@77 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to <UbuntuServer:1> port = 9925 keep state label "USER_RULE: NAT Mealie Access" label "id:1626641131" ridentifier 1626641131
358
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
359
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
360
  [ Last Active Time: N/A ]
361
@78 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto tcp from any to <ProxMox:1> port = 8006 flags S/SA keep state label "USER_RULE: NAT Proxmox Access" label "id:1644072538" ridentifier 1644072538
362
  [ Evaluations: 2209      Packets: 0         Bytes: 0           States: 0     ]
363
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
364
  [ Last Active Time: N/A ]
365
@79 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to <ProxMox:1> port = 8006 keep state label "USER_RULE: NAT Proxmox Access" label "id:1644072538" ridentifier 1644072538
366
  [ Evaluations: 1064      Packets: 0         Bytes: 0           States: 0     ]
367
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
368
  [ Last Active Time: N/A ]
369
@80 pass in quick on em1 route-to (em0 70.188.246.1) inet proto tcp from any to any port = smtp flags S/SA keep state label "USER_RULE: Send SMTP Mail out the correct gateway" label "id:1419280982" label "gw:WAN" ridentifier 1419280982
370
  [ Evaluations: 7924      Packets: 0         Bytes: 0           States: 0     ]
371
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
372
  [ Last Active Time: N/A ]
373
@81 pass in quick on em1 route-to (em0 70.188.246.1) inet proto tcp from any to any port = smtps flags S/SA keep state label "USER_RULE: Send Cox Mail out the correct gateway" label "id:1517069208" label "gw:WAN" ridentifier 1517069208
374
  [ Evaluations: 3057      Packets: 0         Bytes: 0           States: 0     ]
375
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
376
  [ Last Active Time: N/A ]
377
@82 pass in quick on em1 route-to (em0 70.188.246.1) inet from <KeithIP:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Keith" label "id:1419280987" label "gw:WAN" ridentifier 1419280987
378
  [ Evaluations: 4769      Packets: 15720     Bytes: 11633834    States: 67    ]
379
  [ Inserted: uid 0 pid 9864 State Creations: 322   ]
380
  [ Last Active Time: Sun Oct 30 10:51:37 2022 ]
381
@83 pass in quick on em1 route-to (em0 70.188.246.1) inet from <BrandiIP:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Brandi" label "id:1522603106" label "gw:WAN" ridentifier 1522603106
382
  [ Evaluations: 4380      Packets: 2166      Bytes: 704239      States: 13    ]
383
  [ Inserted: uid 0 pid 9864 State Creations: 41    ]
384
  [ Last Active Time: Sun Oct 30 10:51:30 2022 ]
385
@84 pass in quick on em1 route-to (em0 70.188.246.1) inet from <House_PC:1> to any flags S/SA keep state label "USER_RULE: Allow Access - HOME_PC" label "id:1427673108" label "gw:WAN" ridentifier 1427673108
386
  [ Evaluations: 4271      Packets: 4614      Bytes: 1361444     States: 73    ]
387
  [ Inserted: uid 0 pid 9864 State Creations: 345   ]
388
  [ Last Active Time: Sun Oct 30 10:51:35 2022 ]
389
@85 pass in quick on em1 route-to (em0 70.188.246.1) inet from <Kodi:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Kodi Media Center" label "id:1419280998" label "gw:WAN" ridentifier 1419280998
390
  [ Evaluations: 3875      Packets: 0         Bytes: 0           States: 0     ]
391
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
392
  [ Last Active Time: N/A ]
393
@86 pass in quick on em1 route-to (em0 70.188.246.1) inet from <Bedroom_Chromecast:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Bedroom Chromecast" label "id:1528506444" label "gw:WAN" ridentifier 1528506444
394
  [ Evaluations: 3875      Packets: 2992      Bytes: 2909960     States: 1     ]
395
  [ Inserted: uid 0 pid 9864 State Creations: 50    ]
396
  [ Last Active Time: Sun Oct 30 10:51:03 2022 ]
397
@87 pass in quick on em1 route-to (em0 70.188.246.1) inet from <Emby:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Emby" label "id:1522005928" label "gw:WAN" ridentifier 1522005928
398
  [ Evaluations: 3808      Packets: 310       Bytes: 50465       States: 0     ]
399
  [ Inserted: uid 0 pid 9864 State Creations: 28    ]
400
  [ Last Active Time: Sun Oct 30 10:50:56 2022 ]
401
@88 pass in quick on em1 route-to (em0 70.188.246.1) inet from <Google_Nest_Hub:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Google Home Hub" label "id:1560961857" label "gw:WAN" ridentifier 1560961857
402
  [ Evaluations: 3777      Packets: 858       Bytes: 276273      States: 12    ]
403
  [ Inserted: uid 0 pid 9864 State Creations: 72    ]
404
  [ Last Active Time: Sun Oct 30 10:51:37 2022 ]
405
@89 pass in quick on em1 route-to (em0 70.188.246.1) inet from <Google_Home_MBR:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Google Home MBR" label "id:1526210099" label "gw:WAN" ridentifier 1526210099
406
  [ Evaluations: 3655      Packets: 1435      Bytes: 938140      States: 5     ]
407
  [ Inserted: uid 0 pid 9864 State Creations: 56    ]
408
  [ Last Active Time: Sun Oct 30 10:51:35 2022 ]
409
@90 pass in quick on em1 route-to (em0 70.188.246.1) inet from <Google_Home_Mini_BR:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Google Home BR" label "id:1526210125" label "gw:WAN" ridentifier 1526210125
410
  [ Evaluations: 3572      Packets: 0         Bytes: 0           States: 0     ]
411
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
412
  [ Last Active Time: N/A ]
413
@91 pass in quick on em1 route-to (em0 70.188.246.1) inet from <Google_Home_Mini_BP:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Google Home BP" label "id:1560727664" label "gw:WAN" ridentifier 1560727664
414
  [ Evaluations: 3572      Packets: 634       Bytes: 142329      States: 8     ]
415
  [ Inserted: uid 0 pid 9864 State Creations: 69    ]
416
  [ Last Active Time: Sun Oct 30 10:51:37 2022 ]
417
@92 pass in quick on em1 route-to (em0 70.188.246.1) inet from <Google_Home_Mini_LR:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Google Home Mini LR" label "id:1537098804" label "gw:WAN" ridentifier 1537098804
418
  [ Evaluations: 3490      Packets: 1446      Bytes: 935897      States: 7     ]
419
  [ Inserted: uid 0 pid 9864 State Creations: 61    ]
420
  [ Last Active Time: Sun Oct 30 10:51:37 2022 ]
421
@93 pass in quick on em1 route-to (em0 70.188.246.1) inet from <Smartthings_Hub:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Smartthings Hub" label "id:1527633093" label "gw:WAN" ridentifier 1527633093
422
  [ Evaluations: 3405      Packets: 924       Bytes: 207734      States: 12    ]
423
  [ Inserted: uid 0 pid 9864 State Creations: 79    ]
424
  [ Last Active Time: Sun Oct 30 10:51:36 2022 ]
425
@94 pass in quick on em1 route-to (em0 70.188.246.1) inet from <ArloHome:1> to any flags S/SA keep state label "USER_RULE: Allow Access - ArloHome" label "id:1543081952" label "gw:WAN" ridentifier 1543081952
426
  [ Evaluations: 3317      Packets: 69529     Bytes: 58628227    States: 133   ]
427
  [ Inserted: uid 0 pid 9864 State Creations: 657   ]
428
  [ Last Active Time: Sun Oct 30 10:51:37 2022 ]
429
@95 pass in quick on em1 route-to (em0 70.188.246.1) inet from <ArloRemote:1> to any flags S/SA keep state label "USER_RULE: Allow Access - ArloRemote" label "id:1579270767" label "gw:WAN" ridentifier 1579270767
430
  [ Evaluations: 2566      Packets: 440       Bytes: 109144      States: 2     ]
431
  [ Inserted: uid 0 pid 9864 State Creations: 33    ]
432
  [ Last Active Time: Sun Oct 30 10:51:35 2022 ]
433
@96 pass in quick on em1 route-to (em0 70.188.246.1) inet from <ArloBridge:1> to any flags S/SA keep state label "USER_RULE: Allow Access - ArloBridge" label "id:1579645172" label "gw:WAN" ridentifier 1579645172
434
  [ Evaluations: 2527      Packets: 147       Bytes: 22840       States: 1     ]
435
  [ Inserted: uid 0 pid 9864 State Creations: 6     ]
436
  [ Last Active Time: Sun Oct 30 10:51:35 2022 ]
437
@97 pass in quick on em1 route-to (em0 70.188.246.1) inet from <ArloVDB:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Arlo Video Doorbell" label "id:1574788520" label "gw:WAN" ridentifier 1574788520
438
  [ Evaluations: 2521      Packets: 0         Bytes: 0           States: 0     ]
439
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
440
  [ Last Active Time: N/A ]
441
@98 pass in quick on em1 route-to (em0 70.188.246.1) inet from <Hue_Hub:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Hue Hub" label "id:1527633127" label "gw:WAN" ridentifier 1527633127
442
  [ Evaluations: 2521      Packets: 370       Bytes: 72524       States: 0     ]
443
  [ Inserted: uid 0 pid 9864 State Creations: 10    ]
444
  [ Last Active Time: Sun Oct 30 10:51:01 2022 ]
445
@99 pass in quick on em1 route-to (em0 70.188.246.1) inet from <August_Connect:1> to any flags S/SA keep state label "USER_RULE: Allow Access - August_Connect" label "id:1581975806" label "gw:WAN" ridentifier 1581975806
446
  [ Evaluations: 2497      Packets: 413       Bytes: 62116       States: 3     ]
447
  [ Inserted: uid 0 pid 9864 State Creations: 11    ]
448
  [ Last Active Time: Sun Oct 30 10:51:37 2022 ]
449
@100 pass in quick on em1 route-to (em0 70.188.246.1) inet from <Isaac_PC:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Isaacs PC" label "id:1613838127" label "gw:WAN" ridentifier 1613838127
450
  [ Evaluations: 2486      Packets: 1064      Bytes: 383189      States: 4     ]
451
  [ Inserted: uid 0 pid 9864 State Creations: 38    ]
452
  [ Last Active Time: Sun Oct 30 10:51:26 2022 ]
453
@101 pass in quick on em1 route-to (em0 70.188.246.1) inet from <Isaac_Phone:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Isaacs Phone" label "id:1528647414" label "gw:WAN" ridentifier 1528647414
454
  [ Evaluations: 2391      Packets: 0         Bytes: 0           States: 0     ]
455
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
456
  [ Last Active Time: N/A ]
457
@102 pass in quick on em1 route-to (em0 70.188.246.1) inet from <Eric_PC:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Erics PC" label "id:1613838488" label "gw:WAN" ridentifier 1613838488
458
  [ Evaluations: 2391      Packets: 12212     Bytes: 4459813     States: 32    ]
459
  [ Inserted: uid 0 pid 9864 State Creations: 95    ]
460
  [ Last Active Time: Sun Oct 30 10:51:37 2022 ]
461
@103 pass in quick on em1 route-to (em0 70.188.246.1) inet from <Eric_TV:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Eric TV" label "id:1521592795" label "gw:WAN" ridentifier 1521592795
462
  [ Evaluations: 2067      Packets: 0         Bytes: 0           States: 0     ]
463
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
464
  [ Last Active Time: N/A ]
465
@104 pass in quick on em1 route-to (em0 70.188.246.1) inet from 192.168.22.0/24 to any flags S/SA keep state label "USER_RULE: Default allow LAN to any rule" label "id:1419281000" label "gw:WAN" ridentifier 1419281000
466
  [ Evaluations: 2067      Packets: 24636     Bytes: 12872849    States: 180   ]
467
  [ Inserted: uid 0 pid 9864 State Creations: 1177  ]
468
  [ Last Active Time: Sun Oct 30 10:51:37 2022 ]
469
@105 pass in quick on ovpnc1 reply-to (ovpnc1 10.11.0.4) inet all flags S/SA keep state label "USER_RULE" label "id:1623886753" ridentifier 1623886753
470
  [ Evaluations: 2624      Packets: 0         Bytes: 0           States: 0     ]
471
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
472
  [ Last Active Time: N/A ]
473
@106 pass in quick on tun_wg1 reply-to (tun_wg1 10.64.137.39) inet all flags S/SA keep state label "USER_RULE" label "id:1648767261" ridentifier 1648767261
474
  [ Evaluations: 2955      Packets: 0         Bytes: 0           States: 0     ]
475
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
476
  [ Last Active Time: N/A ]
477
@107 anchor "tftp-proxy/*" all
478
  [ Evaluations: 6761      Packets: 0         Bytes: 0           States: 0     ]
479
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
480
  [ Last Active Time: N/A ]
481
@108 anchor "miniupnpd" all
482
  [ Evaluations: 6761      Packets: 0         Bytes: 0           States: 0     ]
483
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
484
  [ Last Active Time: N/A ]
(2-2/3)