<?xml version="1.0"?>
<pfsense>
	<version>9.7</version>
	<lastchange/>
	<theme>pfsense_ng</theme>
	<sysctl>
		<item>
			<descr><![CDATA[Enable mounting the FS read only with more checks.]]></descr>
			<tunable>vfs.forcesync</tunable>
			<value>default</value>
		</item>
		<item>
			<descr><![CDATA[Disable the pf ftp proxy handler.]]></descr>
			<tunable>debug.pfftpproxy</tunable>
			<value>default</value>
		</item>
		<item>
			<descr><![CDATA[Increase UFS read-ahead speeds to match current state of hard drives and NCQ. More information here: http://ivoras.sharanet.org/blog/tree/2010-11-19.ufs-read-ahead.html]]></descr>
			<tunable>vfs.read_max</tunable>
			<value>default</value>
		</item>
		<item>
			<descr><![CDATA[Set the ephemeral port range to be lower.]]></descr>
			<tunable>net.inet.ip.portrange.first</tunable>
			<value>default</value>
		</item>
		<item>
			<descr><![CDATA[Drop packets to closed TCP ports without returning a RST]]></descr>
			<tunable>net.inet.tcp.blackhole</tunable>
			<value>default</value>
		</item>
		<item>
			<descr><![CDATA[Do not send ICMP port unreachable messages for closed UDP ports]]></descr>
			<tunable>net.inet.udp.blackhole</tunable>
			<value>default</value>
		</item>
		<item>
			<descr><![CDATA[Randomize the ID field in IP packets (default is 0: sequential IP IDs)]]></descr>
			<tunable>net.inet.ip.random_id</tunable>
			<value>default</value>
		</item>
		<item>
			<descr><![CDATA[Drop SYN-FIN packets (breaks RFC1379, but nobody uses it anyway)]]></descr>
			<tunable>net.inet.tcp.drop_synfin</tunable>
			<value>default</value>
		</item>
		<item>
			<descr><![CDATA[Enable sending IPv4 redirects]]></descr>
			<tunable>net.inet.ip.redirect</tunable>
			<value>default</value>
		</item>
		<item>
			<descr><![CDATA[Enable sending IPv6 redirects]]></descr>
			<tunable>net.inet6.ip6.redirect</tunable>
			<value>default</value>
		</item>
		<item>
			<descr><![CDATA[Enable privacy settings for IPv6 (RFC 4941)]]></descr>
			<tunable>net.inet6.ip6.use_tempaddr</tunable>
			<value>default</value>
		</item>
		<item>
			<descr><![CDATA[Prefer privacy addresses and use them over the normal addresses]]></descr>
			<tunable>net.inet6.ip6.prefer_tempaddr</tunable>
			<value>default</value>
		</item>
		<item>
			<descr><![CDATA[Generate SYN cookies for outbound SYN-ACK packets]]></descr>
			<tunable>net.inet.tcp.syncookies</tunable>
			<value>default</value>
		</item>
		<item>
			<descr><![CDATA[Maximum incoming/outgoing TCP datagram size (receive)]]></descr>
			<tunable>net.inet.tcp.recvspace</tunable>
			<value>default</value>
		</item>
		<item>
			<descr><![CDATA[Maximum incoming/outgoing TCP datagram size (send)]]></descr>
			<tunable>net.inet.tcp.sendspace</tunable>
			<value>default</value>
		</item>
		<item>
			<descr><![CDATA[IP Fastforwarding]]></descr>
			<tunable>net.inet.ip.fastforwarding</tunable>
			<value>default</value>
		</item>
		<item>
			<descr><![CDATA[Do not delay ACK to try and piggyback it onto a data packet]]></descr>
			<tunable>net.inet.tcp.delayed_ack</tunable>
			<value>default</value>
		</item>
		<item>
			<descr><![CDATA[Maximum outgoing UDP datagram size]]></descr>
			<tunable>net.inet.udp.maxdgram</tunable>
			<value>default</value>
		</item>
		<item>
			<descr><![CDATA[Handling of non-IP packets which are not passed to pfil (see if_bridge(4))]]></descr>
			<tunable>net.link.bridge.pfil_onlyip</tunable>
			<value>default</value>
		</item>
		<item>
			<descr><![CDATA[Set to 0 to disable filtering on the incoming and outgoing member interfaces.]]></descr>
			<tunable>net.link.bridge.pfil_member</tunable>
			<value>default</value>
		</item>
		<item>
			<descr><![CDATA[Set to 1 to enable filtering on the bridge interface]]></descr>
			<tunable>net.link.bridge.pfil_bridge</tunable>
			<value>default</value>
		</item>
		<item>
			<descr><![CDATA[Allow unprivileged access to tap(4) device nodes]]></descr>
			<tunable>net.link.tap.user_open</tunable>
			<value>default</value>
		</item>
		<item>
			<descr><![CDATA[Randomize PID's (see src/sys/kern/kern_fork.c: sysctl_kern_randompid())]]></descr>
			<tunable>kern.randompid</tunable>
			<value>default</value>
		</item>
		<item>
			<descr><![CDATA[Maximum size of the IP input queue]]></descr>
			<tunable>net.inet.ip.intr_queue_maxlen</tunable>
			<value>default</value>
		</item>
		<item>
			<descr><![CDATA[Disable CTRL+ALT+Delete reboot from keyboard.]]></descr>
			<tunable>hw.syscons.kbd_reboot</tunable>
			<value>default</value>
		</item>
		<item>
			<descr><![CDATA[Enable TCP Inflight mode]]></descr>
			<tunable>net.inet.tcp.inflight.enable</tunable>
			<value>default</value>
		</item>
		<item>
			<descr><![CDATA[Enable TCP extended debugging]]></descr>
			<tunable>net.inet.tcp.log_debug</tunable>
			<value>default</value>
		</item>
		<item>
			<descr><![CDATA[Set ICMP Limits]]></descr>
			<tunable>net.inet.icmp.icmplim</tunable>
			<value>default</value>
		</item>
		<item>
			<descr><![CDATA[TCP Offload Engine]]></descr>
			<tunable>net.inet.tcp.tso</tunable>
			<value>default</value>
		</item>
		<item>
			<descr><![CDATA[UDP Checksums]]></descr>
			<tunable>net.inet.udp.checksum</tunable>
			<value>default</value>
		</item>
		<item>
			<descr><![CDATA[Maximum socket buffer size]]></descr>
			<tunable>kern.ipc.maxsockbuf</tunable>
			<value>default</value>
		</item>
	</sysctl>
	<system>
		<optimization>normal</optimization>
		<hostname>pfsense</hostname>
		<domain>localdomain</domain>
		<group>
			<name>all</name>
			<description><![CDATA[All Users]]></description>
			<scope>system</scope>
			<gid>1998</gid>
			<member>0</member>
		</group>
		<group>
			<name>admins</name>
			<description><![CDATA[System Administrators]]></description>
			<scope>system</scope>
			<gid>1999</gid>
			<member>0</member>
			<priv>page-all</priv>
		</group>
		<user>
			<name>admin</name>
			<descr><![CDATA[System Administrator]]></descr>
			<scope>system</scope>
			<groupname>admins</groupname>
			<password>$1$dSJImFph$GvZ7.1UbuWu.Yb8etC0re.</password>
			<uid>0</uid>
			<priv>user-shell-access</priv>
		</user>
		<nextuid>2000</nextuid>
		<nextgid>2000</nextgid>
		<timezone>Asia/Jerusalem</timezone>
		<time-update-interval/>
		<timeservers>0.pfsense.pool.ntp.org</timeservers>
		<webgui>
			<protocol>http</protocol>
			<ssl-certref>5200f0f044bfe</ssl-certref>
			<port/>
			<max_procs>2</max_procs>
		</webgui>
		<disablesegmentationoffloading/>
		<disablelargereceiveoffloading/>
		<ipv6allow/>
		<powerd_ac_mode>hadp</powerd_ac_mode>
		<powerd_battery_mode>hadp</powerd_battery_mode>
		<bogons>
			<interval>monthly</interval>
		</bogons>
		<serialspeed>9600</serialspeed>
		<enablesshd>enabled</enablesshd>
		<language>en_US</language>
		<dnsserver>10.61.240.121</dnsserver>
		<dnsserver>10.61.240.131</dnsserver>
		<dns1gw>none</dns1gw>
		<dns2gw>none</dns2gw>
		<dns3gw>none</dns3gw>
		<dns4gw>none</dns4gw>
		<firmware>
			<alturl>
				<enable/>
				<firmwareurl>http://snapshots.pfsense.org/FreeBSD_RELENG_8_3/amd64/pfSense_RELENG_2_1/.updaters</firmwareurl>
			</alturl>
			<allowinvalidsig/>
		</firmware>
		<gitsync>
			<repositoryurl/>
			<branch/>
		</gitsync>
		<lb_use_sticky/>
		<srctrack/>
		<thermal_hardware>coretemp</thermal_hardware>
		<use_mfs_tmp_size/>
		<use_mfs_var_size/>
		<scrubnodf>enabled</scrubnodf>
		<scrubrnid>enabled</scrubrnid>
		<maximumstates/>
		<aliasesresolveinterval/>
		<maximumtables/>
		<maximumtableentries/>
		<enablenatreflectionpurenat>yes</enablenatreflectionpurenat>
		<enablebinatreflection>yes</enablebinatreflection>
		<enablenatreflectionhelper>yes</enablenatreflectionhelper>
		<reflectiontimeout/>
		<disablescrub>yes</disablescrub>
	</system>
	<interfaces>
		<wan>
			<enable/>
			<if>lagg1</if>
			<ipaddr>10.165.128.211</ipaddr>
			<ipaddrv6/>
			<subnet>24</subnet>
			<gateway>GW_WAN_2</gateway>
			<media/>
			<mediaopt/>
			<dhcp6-duid/>
			<dhcp6-ia-pd-len>0</dhcp6-ia-pd-len>
			<subnetv6/>
			<gatewayv6/>
			<descr><![CDATA[WAN]]></descr>
		</wan>
		<lan>
			<descr><![CDATA[LAN]]></descr>
			<if>bce1</if>
			<ipaddr>192.168.100.1</ipaddr>
			<subnet>24</subnet>
			<gateway/>
			<ipaddrv6/>
			<subnetv6/>
			<gatewayv6/>
			<enable/>
		</lan>
	</interfaces>
	<staticroutes/>
	<dhcpd/>
	<pptpd>
		<mode/>
		<redir/>
		<localip/>
		<remoteip/>
	</pptpd>
	<dnsmasq>
		<enable/>
	</dnsmasq>
	<snmpd>
		<syslocation/>
		<syscontact/>
		<rocommunity>public</rocommunity>
	</snmpd>
	<diag>
		<ipv6nat/>
	</diag>
	<bridge/>
	<syslog>
		<reverse/>
		<nentries>500</nentries>
		<nologdefaultblock/>
		<nologbogons/>
		<nologprivatenets/>
		<filterdescriptions>2</filterdescriptions>
	</syslog>
	<filter>
		<rule>
			<id/>
			<type>pass</type>
			<interface>wan</interface>
			<ipprotocol>inet</ipprotocol>
			<tag/>
			<tagged/>
			<max/>
			<max-src-nodes/>
			<max-src-conn/>
			<max-src-states/>
			<statetimeout/>
			<statetype>keep state</statetype>
			<os/>
			<source>
				<any/>
			</source>
			<destination>
				<any/>
			</destination>
			<descr/>
			<updated>
				<time>1375794641</time>
				<username>admin@192.168.100.3</username>
			</updated>
			<created>
				<time>1375794641</time>
				<username>admin@192.168.100.3</username>
			</created>
		</rule>
		<rule>
			<id/>
			<type>pass</type>
			<interface>lan</interface>
			<ipprotocol>inet</ipprotocol>
			<tag/>
			<tagged/>
			<max/>
			<max-src-nodes/>
			<max-src-conn/>
			<max-src-states/>
			<statetimeout/>
			<statetype>keep state</statetype>
			<os/>
			<source>
				<any/>
			</source>
			<destination>
				<any/>
			</destination>
			<descr><![CDATA[Default allow LAN to any rule]]></descr>
			<updated>
				<time>1375859627</time>
				<username>admin@192.168.100.3</username>
			</updated>
		</rule>
		<rule>
			<id/>
			<type>pass</type>
			<interface>lan</interface>
			<ipprotocol>inet6</ipprotocol>
			<tag/>
			<tagged/>
			<max/>
			<max-src-nodes/>
			<max-src-conn/>
			<max-src-states/>
			<statetimeout/>
			<statetype>keep state</statetype>
			<os/>
			<source>
				<any/>
			</source>
			<destination>
				<any/>
			</destination>
			<descr><![CDATA[Default allow LAN IPv6 to any rule]]></descr>
			<updated>
				<time>1375859638</time>
				<username>admin@192.168.100.3</username>
			</updated>
		</rule>
	</filter>
	<ipsec/>
	<aliases/>
	<proxyarp/>
	<cron>
		<item>
			<minute>0</minute>
			<hour>*</hour>
			<mday>*</mday>
			<month>*</month>
			<wday>*</wday>
			<who>root</who>
			<command>/usr/bin/nice -n20 newsyslog</command>
		</item>
		<item>
			<minute>1,31</minute>
			<hour>0-5</hour>
			<mday>*</mday>
			<month>*</month>
			<wday>*</wday>
			<who>root</who>
			<command>/usr/bin/nice -n20 adjkerntz -a</command>
		</item>
		<item>
			<minute>1</minute>
			<hour>3</hour>
			<mday>1</mday>
			<month>*</month>
			<wday>*</wday>
			<who>root</who>
			<command>/usr/bin/nice -n20 /etc/rc.update_bogons.sh</command>
		</item>
		<item>
			<minute>*/60</minute>
			<hour>*</hour>
			<mday>*</mday>
			<month>*</month>
			<wday>*</wday>
			<who>root</who>
			<command>/usr/bin/nice -n20 /usr/local/sbin/expiretable -v -t 3600 sshlockout</command>
		</item>
		<item>
			<minute>1</minute>
			<hour>1</hour>
			<mday>*</mday>
			<month>*</month>
			<wday>*</wday>
			<who>root</who>
			<command>/usr/bin/nice -n20 /etc/rc.dyndns.update</command>
		</item>
		<item>
			<minute>*/60</minute>
			<hour>*</hour>
			<mday>*</mday>
			<month>*</month>
			<wday>*</wday>
			<who>root</who>
			<command>/usr/bin/nice -n20 /usr/local/sbin/expiretable -v -t 3600 virusprot</command>
		</item>
		<item>
			<minute>30</minute>
			<hour>12</hour>
			<mday>*</mday>
			<month>*</month>
			<wday>*</wday>
			<who>root</who>
			<command>/usr/bin/nice -n20 /etc/rc.update_urltables</command>
		</item>
	</cron>
	<wol/>
	<rrd>
		<enable/>
	</rrd>
	<load_balancer>
		<monitor_type>
			<name>ICMP</name>
			<type>icmp</type>
			<descr><![CDATA[ICMP]]></descr>
			<options/>
		</monitor_type>
		<monitor_type>
			<name>TCP</name>
			<type>tcp</type>
			<descr><![CDATA[Generic TCP]]></descr>
			<options/>
		</monitor_type>
		<monitor_type>
			<name>HTTP</name>
			<type>http</type>
			<descr><![CDATA[Generic HTTP]]></descr>
			<options>
				<path>/</path>
				<host/>
				<code>200</code>
			</options>
		</monitor_type>
		<monitor_type>
			<name>HTTPS</name>
			<type>https</type>
			<descr><![CDATA[Generic HTTPS]]></descr>
			<options>
				<path>/</path>
				<host/>
				<code>200</code>
			</options>
		</monitor_type>
		<monitor_type>
			<name>SMTP</name>
			<type>send</type>
			<descr><![CDATA[Generic SMTP]]></descr>
			<options>
				<send/>
				<expect>220 *</expect>
			</options>
		</monitor_type>
	</load_balancer>
	<widgets>
		<sequence>system_information-container:col1:show,captive_portal_status-container:col1:close,carp_status-container:col1:close,cpu_graphs-container:col1:close,gateways-container:col1:close,gmirror_status-container:col1:close,installed_packages-container:col1:close,interface_statistics-container:col1:close,interfaces-container:col2:show,ipsec-container:col2:close,load_balancer_status-container:col2:close,log-container:col2:close,picture-container:col2:close,rss-container:col2:close,services_status-container:col2:close,traffic_graphs-container:col2:show,dyn_dns_status-container:col2:none,openvpn-container:col2:none,smart_status-container:col2:none,thermal_sensors-container:col2:show,wake_on_lan-container:col2:none</sequence>
	</widgets>
	<revision>
		<time>1376201857</time>
		<description><![CDATA[(system): Installed iperf package.]]></description>
		<username>(system)</username>
	</revision>
	<openvpn/>
	<l7shaper>
		<container/>
	</l7shaper>
	<dnshaper/>
	<cert>
		<refid>5200f0f044bfe</refid>
		<descr><![CDATA[webConfigurator default]]></descr>
		<crt>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</crt>
		<prv>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</prv>
	</cert>
	<gateways>
		<gateway_item>
			<interface>wan</interface>
			<gateway>10.165.128.210</gateway>
			<name>GW_WAN_2</name>
			<weight>1</weight>
			<ipprotocol>inet</ipprotocol>
			<interval/>
			<descr><![CDATA[Interface wan Gateway]]></descr>
			<defaultgw/>
		</gateway_item>
	</gateways>
	<dhcpdv6/>
	<wizardtemp>
		<system>
			<hostname>pfSense</hostname>
			<domain>localdomain</domain>
		</system>
		<wangateway>192.168.100.3</wangateway>
	</wizardtemp>
	<ppps/>
	<shaper/>
	<laggs>
		<lagg>
			<members>ix0,ix1</members>
			<descr><![CDATA[LAN]]></descr>
			<laggif>lagg0</laggif>
			<proto>lacp</proto>
		</lagg>
		<lagg>
			<members>ix2,ix3</members>
			<descr><![CDATA[WAN]]></descr>
			<laggif>lagg1</laggif>
			<proto>lacp</proto>
		</lagg>
	</laggs>
	<nat>
		<advancedoutbound>
			<rule>
				<source>
					<network>192.168.100.0/24</network>
				</source>
				<dstport>500</dstport>
				<descr><![CDATA[Auto created rule for ISAKMP - LAN to WAN]]></descr>
				<target/>
				<interface>wan</interface>
				<destination>
					<any/>
				</destination>
				<staticnatport/>
				<created>
					<time>1375795317</time>
					<username>Manual Outbound NAT Switch</username>
				</created>
			</rule>
			<rule>
				<source>
					<network>192.168.100.0/24</network>
				</source>
				<sourceport/>
				<descr><![CDATA[Auto created rule for LAN to WAN]]></descr>
				<target/>
				<interface>wan</interface>
				<destination>
					<any/>
				</destination>
				<natport/>
				<created>
					<time>1375795317</time>
					<username>Manual Outbound NAT Switch</username>
				</created>
			</rule>
			<rule>
				<source>
					<network>127.0.0.0/8</network>
				</source>
				<dstport/>
				<descr><![CDATA[Auto created rule for localhost to WAN]]></descr>
				<target/>
				<interface>wan</interface>
				<destination>
					<any/>
				</destination>
				<natport>1024:65535</natport>
				<created>
					<time>1375795317</time>
					<username>Manual Outbound NAT Switch</username>
				</created>
			</rule>
			<enable/>
		</advancedoutbound>
	</nat>
	<installedpackages>
		<package>
			<name>iperf</name>
			<website>http://dast.nlanr.net/Projects/Iperf/</website>
			<descr><![CDATA[Iperf is a tool for testing network throughput, loss, and jitter.]]></descr>
			<category>Network Management</category>
			<config_file>http://www.pfsense.com/packages/config/iperf.xml</config_file>
			<depends_on_package_base_url>http://files.pfsense.org/packages/amd64/8/All/</depends_on_package_base_url>
			<depends_on_package>iperf-2.0.5.tbz</depends_on_package>
			<depends_on_package_pbi>iperf-2.0.5-amd64.pbi</depends_on_package_pbi>
			<version>2.0.5</version>
			<status>Beta</status>
			<pkginfolink>http://doc.pfsense.org/index.php/Iperf_package</pkginfolink>
			<required_version>1.2.1</required_version>
			<configurationfile>iperf.xml</configurationfile>
			<build_port_path>/usr/ports/benchmarks/iperf</build_port_path>
		</package>
		<menu>
			<name>iperf</name>
			<tooltiptext>Run iperf in client or server mode.</tooltiptext>
			<section>Diagnostics</section>
			<configfile>iperf.xml</configfile>
		</menu>
		<tab>
			<text>Client</text>
			<url>/pkg_edit.php?xml=iperf.xml&amp;id=0</url>
			<active/>
		</tab>
		<service>
			<name>iperf</name>
			<executable>iperf</executable>
		</service>
	</installedpackages>
	<dhcrelay/>
	<dhcrelay6/>
</pfsense>
