@0(0) scrub on igb0 all fragment reassemble [ Evaluations: 258109 Packets: 106022 Bytes: 11452982 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @1(0) scrub on igb1 all fragment reassemble [ Evaluations: 152077 Packets: 3567 Bytes: 222712 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @2(0) scrub on lagg0 all fragment reassemble [ Evaluations: 148510 Packets: 111872 Bytes: 12010819 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @3(0) scrub on ix0 all fragment reassemble [ Evaluations: 36635 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @4(0) scrub on lagg0.90 all fragment reassemble [ Evaluations: 36635 Packets: 191 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @0(0) anchor "relayd/*" all [ Evaluations: 1002 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @1(0) anchor "openvpn/*" all [ Evaluations: 1002 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @2(0) anchor "ipsec/*" all [ Evaluations: 1002 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @3(1000000001) pass in quick on lo0 inet6 all flags S/SA keep state label "pass IPv6 loopback" [ Evaluations: 1406069 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @4(1000000002) pass out quick on lo0 inet6 all flags S/SA keep state label "pass IPv6 loopback" [ Evaluations: 53167 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @5(1000000003) block drop in log quick inet6 all label "Block all IPv6" [ Evaluations: 1299735 Packets: 381686 Bytes: 40090346 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @6(1000000004) block drop out log quick inet6 all label "Block all IPv6" [ Evaluations: 378369 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @7(1000000101) block drop in log quick inet from 169.254.0.0/16 to any label "Block IPv4 link-local" [ Evaluations: 1024384 Packets: 57 Bytes: 11050 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @8(1000000102) block drop in log quick inet from any to 169.254.0.0/16 label "Block IPv4 link-local" [ Evaluations: 592790 Packets: 18 Bytes: 9707 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @9(1000000103) block drop in log inet all label "Default deny rule IPv4" [ Evaluations: 592772 Packets: 102834 Bytes: 7959344 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @10(1000000104) block drop out log inet all label "Default deny rule IPv4" [ Evaluations: 1024308 Packets: 3709 Bytes: 319448 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @11(1000000105) block drop in log inet6 all label "Default deny rule IPv6" [ Evaluations: 1024309 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @12(1000000106) block drop out log inet6 all label "Default deny rule IPv6" [ Evaluations: 431537 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @13(1000000107) block drop log quick inet proto tcp from any port = 0 to any label "Block traffic from port 0" [ Evaluations: 1024309 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @14(1000000107) block drop log quick inet proto udp from any port = 0 to any label "Block traffic from port 0" [ Evaluations: 1023948 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @15(1000000108) block drop log quick inet proto tcp from any to any port = 0 label "Block traffic to port 0" [ Evaluations: 1024309 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @16(1000000108) block drop log quick inet proto udp from any to any port = 0 label "Block traffic to port 0" [ Evaluations: 1023948 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @17(1000000109) block drop log quick from to any label "Block snort2c hosts" [ Evaluations: 1024309 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @18(1000000110) block drop log quick from any to label "Block snort2c hosts" [ Evaluations: 1024306 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @19(1000000201) block drop in log quick proto carp from (self:13) to any [ Evaluations: 677150 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @20(1000000202) pass quick proto carp all no state [ Evaluations: 288356 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @21(1000000301) block drop in log quick proto tcp from to (self:13) port = ssh label "sshguard" [ Evaluations: 1024309 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @22(1000000351) block drop in log quick proto tcp from to (self:13) port = https label "GUI Lockout" [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @23(1000000400) block drop in log quick from to any label "virusprot overload table" [ Evaluations: 592948 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @24(1000000561) pass in quick on igb0 proto udp from any port = bootps to any port = bootpc keep state label "allow dhcp client out SPECTRUM" [ Evaluations: 592767 Packets: 418 Bytes: 139419 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @25(1000000562) pass out quick on igb0 proto udp from any port = bootpc to any port = bootps keep state label "allow dhcp client out SPECTRUM" [ Evaluations: 433808 Packets: 38 Bytes: 12749 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @26(11000) block drop in log quick on igb0 from to any label "block bogon IPv4 networks from SPECTRUM" [ Evaluations: 256297 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @27(1000001570) block drop in log on ! igb0 inet from 47.SPC.RNG.0/21 to any [ Evaluations: 798702 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @28(1000001570) block drop in log inet from 47.SPC.MY.IP to any [ Evaluations: 798547 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @29(1000001570) block drop in log on igb0 inet6 from fe80::290:bff:fe7c:8ca to any [ Evaluations: 798547 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @30(12000) block drop in log quick on igb0 inet from 10.0.0.0/8 to any label "Block private networks from SPECTRUM block 10/8" [ Evaluations: 30688 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @31(12000) block drop in log quick on igb0 inet from 127.0.0.0/8 to any label "Block private networks from SPECTRUM block 127/8" [ Evaluations: 30688 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @32(12000) block drop in log quick on igb0 inet from 172.16.0.0/12 to any label "Block private networks from SPECTRUM block 172.16/12" [ Evaluations: 30688 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @33(12000) block drop in log quick on igb0 inet from 192.168.0.0/16 to any label "Block private networks from SPECTRUM block 192.168/16" [ Evaluations: 30688 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @34(12000) block drop in log quick on igb0 inet6 from fc00::/7 to any label "Block ULA networks from SPECTRUM block fc00::/7" [ Evaluations: 30688 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @35(11000) block drop in log quick on igb1 from to any label "block bogon IPv4 networks from DSL_XTREME" [ Evaluations: 256447 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @36(1000002620) block drop in log on ! igb1 inet from 99.DSX.RNG.0/24 to any [ Evaluations: 592531 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @37(1000002620) block drop in log inet from 99.DSX.MY.IP to any [ Evaluations: 592531 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @38(1000002620) block drop in log on igb1 inet6 from fe80::290:bff:fe7c:8cb to any [ Evaluations: 592531 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @39(12000) block drop in log quick on igb1 inet from 10.0.0.0/8 to any label "Block private networks from DSL_XTREME block 10/8" [ Evaluations: 30688 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @40(12000) block drop in log quick on igb1 inet from 127.0.0.0/8 to any label "Block private networks from DSL_XTREME block 127/8" [ Evaluations: 30688 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @41(12000) block drop in log quick on igb1 inet from 172.16.0.0/12 to any label "Block private networks from DSL_XTREME block 172.16/12" [ Evaluations: 30688 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @42(12000) block drop in log quick on igb1 inet from 192.168.0.0/16 to any label "Block private networks from DSL_XTREME block 192.168/16" [ Evaluations: 30688 Packets: 1 Bytes: 36 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @43(12000) block drop in log quick on igb1 inet6 from fc00::/7 to any label "Block ULA networks from DSL_XTREME block fc00::/7" [ Evaluations: 30687 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @44(1000003670) block drop in log on ! lagg0 inet from 192.168.0.0/24 to any [ Evaluations: 590395 Packets: 10 Bytes: 1870 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @45(1000003670) block drop in log on ! lagg0 inet from 10.10.10.1 to any [ Evaluations: 590088 Packets: 10 Bytes: 1870 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @46(1000003670) block drop in log inet from 192.168.0.1 to any [ Evaluations: 590395 Packets: 10 Bytes: 1870 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @47(1000003670) block drop in log inet from 10.10.10.1 to any [ Evaluations: 590395 Packets: 10 Bytes: 1870 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @48(1000003670) block drop in log on lagg0 inet6 from fe80::290:bff:fe7c:8ce to any [ Evaluations: 590395 Packets: 10 Bytes: 1870 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @49(1000003691) pass in quick on lagg0 inet proto udp from any port = bootpc to 255.255.255.255 port = bootps keep state label "allow access to DHCP server" [ Evaluations: 466084 Packets: 1899 Bytes: 676638 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @50(1000003692) pass in quick on lagg0 inet proto udp from any port = bootpc to 192.168.0.1 port = bootps keep state label "allow access to DHCP server" [ Evaluations: 1452 Packets: 2945 Bytes: 1026982 States: 1 ] [ Inserted: pid 6126 State Creations: 6 ] @51(1000003693) pass out quick on lagg0 inet proto udp from 192.168.0.1 port = bootps to any port = bootpc keep state label "allow access to DHCP server" [ Evaluations: 674387 Packets: 361 Bytes: 117954 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @52(1000004720) block drop in log on ! ix0 inet from 192.168.2.0/24 to any [ Evaluations: 1019588 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @53(1000004720) block drop in log inet from 192.168.2.1 to any [ Evaluations: 1019227 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @54(1000004720) block drop in log on ix0 inet6 from fe80::290:bff:fe7c:8cc to any [ Evaluations: 1019227 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @55(1000005770) block drop in log on ! lagg0.90 inet from 192.168.90.0/24 to any [ Evaluations: 588400 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @56(1000005770) block drop in log inet from 192.168.90.1 to any [ Evaluations: 588400 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @57(1000005770) block drop in log on lagg0.90 inet6 from fe80::290:bff:fe7c:8ce to any [ Evaluations: 588400 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @58(1000005791) pass in quick on lagg0.90 inet proto udp from any port = bootpc to 255.255.255.255 port = bootps keep state label "allow access to DHCP server" [ Evaluations: 12553 Packets: 17 Bytes: 5876 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @59(1000005792) pass in quick on lagg0.90 inet proto udp from any port = bootpc to 192.168.90.1 port = bootps keep state label "allow access to DHCP server" [ Evaluations: 14 Packets: 28 Bytes: 9400 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @60(1000005793) pass out quick on lagg0.90 inet proto udp from 192.168.90.1 port = bootps to any port = bootpc keep state label "allow access to DHCP server" [ Evaluations: 440576 Packets: 15 Bytes: 4920 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @61(1000007911) pass in on lo0 inet all flags S/SA keep state label "pass IPv4 loopback" [ Evaluations: 1019548 Packets: 15920977 Bytes: 1648600763 States: 19 ] [ Inserted: pid 6126 State Creations: 29 ] @62(1000007912) pass out on lo0 inet all flags S/SA keep state label "pass IPv4 loopback" [ Evaluations: 106334 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @63(1000007913) pass out inet all flags S/SA keep state allow-opts label "let out anything IPv4 from firewall host itself" [ Evaluations: 966380 Packets: 15937396 Bytes: 1654187647 States: 18 ] [ Inserted: pid 6126 State Creations: 29 ] @64(1000008011) pass out route-to (igb0 47.SPC.MY.GW) inet from 47.SPC.MY.IP to ! 47.SPC.RNG.0/21 flags S/SA keep state allow-opts label "let out anything from firewall host itself" [ Evaluations: 431177 Packets: 54145211 Bytes: 52642921601 States: 99 ] [ Inserted: pid 6126 State Creations: 206 ] @65(1000008012) pass out route-to (igb1 99.DSX.MY.GW) inet from 99.DSX.MY.IP to ! 99.DSX.RNG.0/24 flags S/SA keep state allow-opts label "let out anything from firewall host itself" [ Evaluations: 431177 Packets: 6376565 Bytes: 5086719838 States: 44 ] [ Inserted: pid 6126 State Creations: 121 ] @66(10000) pass in quick on lagg0 proto tcp from any to (lagg0:3) port = https flags S/SA keep state label "anti-lockout rule" [ Evaluations: 1020046 Packets: 459182 Bytes: 130724727 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @67(10000) pass in quick on lagg0 proto tcp from any to (lagg0:3) port = http flags S/SA keep state label "anti-lockout rule" [ Evaluations: 1019316 Packets: 459182 Bytes: 130724727 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @68(0) anchor "userrules/*" all [ Evaluations: 730 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @69(1770001239) pass quick on lagg0 inet proto icmp from any to 10.10.10.1 icmp-type echoreq keep state label "USER_RULE: pfB_DNSBL_Ping" [ Evaluations: 673741 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @70(1770001239) pass quick on ix0 inet proto icmp from any to 10.10.10.1 icmp-type echoreq keep state label "USER_RULE: pfB_DNSBL_Ping" [ Evaluations: 673435 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @71(1770001239) pass quick on lagg0.90 inet proto icmp from any to 10.10.10.1 icmp-type echoreq keep state label "USER_RULE: pfB_DNSBL_Ping" [ Evaluations: 673435 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @72(1770001466) pass quick on lagg0 inet proto tcp from any to 10.10.10.1 port = 8081 flags S/SA keep state label "USER_RULE: pfB_DNSBL_Permit" [ Evaluations: 664377 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @73(1770001466) pass quick on lagg0 inet proto tcp from any to 10.10.10.1 port = 8443 flags S/SA keep state label "USER_RULE: pfB_DNSBL_Permit" [ Evaluations: 663655 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @74(1770001466) pass quick on lagg0 inet proto udp from any to 10.10.10.1 port = 8081 keep state label "USER_RULE: pfB_DNSBL_Permit" [ Evaluations: 663814 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @75(1770001466) pass quick on lagg0 inet proto udp from any to 10.10.10.1 port = 8443 keep state label "USER_RULE: pfB_DNSBL_Permit" [ Evaluations: 663655 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @76(1770001466) pass quick on ix0 inet proto tcp from any to 10.10.10.1 port = 8081 flags S/SA keep state label "USER_RULE: pfB_DNSBL_Permit" [ Evaluations: 664085 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @77(1770001466) pass quick on ix0 inet proto tcp from any to 10.10.10.1 port = 8443 flags S/SA keep state label "USER_RULE: pfB_DNSBL_Permit" [ Evaluations: 663655 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @78(1770001466) pass quick on ix0 inet proto udp from any to 10.10.10.1 port = 8081 keep state label "USER_RULE: pfB_DNSBL_Permit" [ Evaluations: 663655 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @79(1770001466) pass quick on ix0 inet proto udp from any to 10.10.10.1 port = 8443 keep state label "USER_RULE: pfB_DNSBL_Permit" [ Evaluations: 663655 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @80(1770001466) pass quick on lagg0.90 inet proto tcp from any to 10.10.10.1 port = 8081 flags S/SA keep state label "USER_RULE: pfB_DNSBL_Permit" [ Evaluations: 664085 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @81(1770001466) pass quick on lagg0.90 inet proto tcp from any to 10.10.10.1 port = 8443 flags S/SA keep state label "USER_RULE: pfB_DNSBL_Permit" [ Evaluations: 663655 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @82(1770001466) pass quick on lagg0.90 inet proto udp from any to 10.10.10.1 port = 8081 keep state label "USER_RULE: pfB_DNSBL_Permit" [ Evaluations: 663655 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @83(1770001466) pass quick on lagg0.90 inet proto udp from any to 10.10.10.1 port = 8443 keep state label "USER_RULE: pfB_DNSBL_Permit" [ Evaluations: 663655 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @84(1770005154) block return log quick on lagg0 inet from any to label "USER_RULE: pfB_PRI1_v4 auto rule" [ Evaluations: 673741 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @85(1770005154) block return log quick on ix0 inet from any to label "USER_RULE: pfB_PRI1_v4 auto rule" [ Evaluations: 673435 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @86(1770005154) block return log quick on lagg0.90 inet from any to label "USER_RULE: pfB_PRI1_v4 auto rule" [ Evaluations: 673435 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @87(1586704425) pass in quick on LOCAL_NETS route-to (igb0 47.SPC.MY.GW) inet proto tcp from any to 192.168.100.1 flags S/SA keep state label "USER_RULE: Spectrum Modem Interface Connection" [ Evaluations: 672241 Packets: 4145 Bytes: 2608574 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @88(1586704425) pass in quick on LOCAL_NETS route-to (igb0 47.SPC.MY.GW) inet proto udp from any to 192.168.100.1 keep state label "USER_RULE: Spectrum Modem Interface Connection" [ Evaluations: 671678 Packets: 4145 Bytes: 2608574 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @89(1586704583) pass in quick on LOCAL_NETS route-to (igb1 99.DSX.MY.GW) inet proto tcp from any to 192.168.1.254 flags S/SA keep state label "USER_RULE: DSL-X Modem Interface Connection" [ Evaluations: 299481 Packets: 660 Bytes: 216563 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @90(1586704583) pass in quick on LOCAL_NETS route-to (igb1 99.DSX.MY.GW) inet proto udp from any to 192.168.1.254 keep state label "USER_RULE: DSL-X Modem Interface Connection" [ Evaluations: 299347 Packets: 660 Bytes: 216563 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @91(1586726603) pass in quick on LOCAL_NETS inet proto tcp from <_LOCAL_NETS:2> to (self:7) port = https flags S/SA keep state label "USER_RULE: Management Interface" [ Evaluations: 107882 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @92(1586726603) pass in quick on LOCAL_NETS inet proto tcp from <_LOCAL_NETS:2> to (self:7) port = http flags S/SA keep state label "USER_RULE: Management Interface" [ Evaluations: 107581 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @93(1586726603) pass in quick on LOCAL_NETS inet proto udp from <_LOCAL_NETS:2> to (self:7) port = https keep state label "USER_RULE: Management Interface" [ Evaluations: 107748 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @94(1586726603) pass in quick on LOCAL_NETS inet proto udp from <_LOCAL_NETS:2> to (self:7) port = http keep state label "USER_RULE: Management Interface" [ Evaluations: 107628 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @95(10000001) pass in quick on LOCAL_NETS inet from <_WEB_ACCS:17> to flags S/SA keep state label "NEGATE_ROUTE: Negate policy routing for destination" [ Evaluations: 299189 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @96(1586747664) pass in quick on LOCAL_NETS route-to { (igb0 47.SPC.MY.GW), (igb0 47.SPC.MY.GW), (igb0 47.SPC.MY.GW), (igb0 47.SPC.MY.GW), (igb0 47.SPC.MY.GW) } round-robin inet from <_WEB_ACCS:17> to any flags S/SA keep state label "USER_RULE: Schedule bypass - Enable for Special Occasions" [ Evaluations: 1604 Packets: 232792 Bytes: 216670917 States: 86 ] [ Inserted: pid 6126 State Creations: 177 ] @97(10000002) pass in quick on LOCAL_NETS inet from <_ACCS_XCPTN:2> to flags S/SA keep state label "NEGATE_ROUTE: Negate policy routing for destination" [ Evaluations: 249307 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @98(1586710355) pass in quick on LOCAL_NETS route-to { (igb0 47.SPC.MY.GW), (igb0 47.SPC.MY.GW), (igb0 47.SPC.MY.GW), (igb0 47.SPC.MY.GW), (igb0 47.SPC.MY.GW) } round-robin inet from <_ACCS_XCPTN:2> to any flags S/SA keep state label "USER_RULE: Access Exception Devices" [ Evaluations: 14702 Packets: 1776909 Bytes: 1439570696 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @99(1586552588) block drop in quick on LOCAL_NETS inet from <_WEB_ACCS:17> to any label "USER_RULE" [ Evaluations: 44477 Packets: 36257 Bytes: 3389087 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @100(10000003) pass in quick on LOCAL_NETS inet from <_PREF_SPECTRUM:10> to flags S/SA keep state label "NEGATE_ROUTE: Negate policy routing for destination" [ Evaluations: 152260 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @101(1586553819) pass in quick on LOCAL_NETS route-to { (igb0 47.SPC.MY.GW), (igb0 47.SPC.MY.GW), (igb0 47.SPC.MY.GW), (igb0 47.SPC.MY.GW), (igb0 47.SPC.MY.GW) } round-robin inet from <_PREF_SPECTRUM:10> to any flags S/SA keep state label "USER_RULE: Spectrum Preferred LOCAL_NETS to any rule" [ Evaluations: 38928 Packets: 1090692 Bytes: 894180851 States: 10 ] [ Inserted: pid 6126 State Creations: 19 ] @102(10000004) pass in quick on LOCAL_NETS inet from <_PREF_DSL_X:22> to flags S/SA keep state label "NEGATE_ROUTE: Negate policy routing for destination" [ Evaluations: 111029 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @103(1586553907) pass in quick on LOCAL_NETS route-to (igb1 99.DSX.MY.GW) inet from <_PREF_DSL_X:22> to any flags S/SA keep state label "USER_RULE: DSL-X Preferred LOCAL_NETS to any rule" [ Evaluations: 104798 Packets: 4638234 Bytes: 3690934060 States: 46 ] [ Inserted: pid 6126 State Creations: 88 ] @104(10000005) pass in quick on LOCAL_NETS inet from <_BAL_SPCTRM_DSL_X:8> to flags S/SA keep state label "NEGATE_ROUTE: Negate policy routing for destination" [ Evaluations: 129 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @105(1586553946) pass in quick on LOCAL_NETS route-to { (igb0 47.SPC.MY.GW), (igb0 47.SPC.MY.GW), (igb0 47.SPC.MY.GW), (igb0 47.SPC.MY.GW), (igb0 47.SPC.MY.GW), (igb1 99.DSX.MY.GW) } round-robin sticky-address inet from <_BAL_SPCTRM_DSL_X:8> to any flags S/SA keep state label "USER_RULE: Balance Spectrum / DSL-X - LOCAL_NETS to any rule" [ Evaluations: 7553 Packets: 11375 Bytes: 1792932 States: 1 ] [ Inserted: pid 6126 State Creations: 5 ] @106(1586743170) pass in quick on lagg0 inet proto tcp from any to 127.0.0.1 port = 8443 flags S/SA keep state label "USER_RULE: NAT pfB DNSBL - DO NOT EDIT" [ Evaluations: 242183 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ] @107(0) anchor "tftp-proxy/*" all [ Evaluations: 441 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 6126 State Creations: 0 ]