@0 scrub on em0 inet all fragment reassemble
  [ Evaluations: 697605    Packets: 353441    Bytes: 92920688    States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@1 scrub on em0 inet6 all fragment reassemble
  [ Evaluations: 188       Packets: 188       Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@2 scrub on em1 inet all fragment reassemble
  [ Evaluations: 343976    Packets: 336014    Bytes: 91717767    States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@3 scrub on em1 inet6 all fragment reassemble
  [ Evaluations: 400       Packets: 400       Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@4 scrub on ovpnc1 inet all fragment reassemble
  [ Evaluations: 7562      Packets: 2157      Bytes: 400         States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@5 scrub on ovpnc1 inet6 all fragment reassemble
  [ Evaluations: 5         Packets: 5         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@6 scrub on ovpnc2 inet all fragment reassemble
  [ Evaluations: 5400      Packets: 1076      Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@7 scrub on ovpnc2 inet6 all fragment reassemble
  [ Evaluations: 5         Packets: 5         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@8 scrub on tun_wg0 inet all max-mss 1380 fragment reassemble
  [ Evaluations: 4319      Packets: 2082      Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@9 scrub on tun_wg0 inet6 all max-mss 1360 fragment reassemble
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@10 scrub on tun_wg1 inet all max-mss 1380 fragment reassemble
  [ Evaluations: 2237      Packets: 2073      Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@11 scrub on tun_wg1 inet6 all max-mss 1360 fragment reassemble
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@0 anchor "openvpn/*" all
  [ Evaluations: 12305     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@1 anchor "ipsec/*" all
  [ Evaluations: 12305     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@2 pass in quick on lo0 inet6 all flags S/SA keep state label "pass IPv6 loopback" ridentifier 1000000001
  [ Evaluations: 12305     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@3 pass out quick on lo0 inet6 all flags S/SA keep state label "pass IPv6 loopback" ridentifier 1000000002
  [ Evaluations: 45        Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@4 block drop in log quick inet6 all label "Block all IPv6" ridentifier 1000000003
  [ Evaluations: 12224     Packets: 587       Bytes: 93462       States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@5 block drop out log quick inet6 all label "Block all IPv6" ridentifier 1000000004
  [ Evaluations: 3819      Packets: 13        Bytes: 1040        States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@6 block drop in log quick inet from 169.254.0.0/16 to any label "Block IPv4 link-local" ridentifier 1000000101
  [ Evaluations: 11705     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@7 block drop in log quick inet from any to 169.254.0.0/16 label "Block IPv4 link-local" ridentifier 1000000102
  [ Evaluations: 7854      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@8 block drop in log inet all label "Default deny rule IPv4" ridentifier 1000000103
  [ Evaluations: 7854      Packets: 2873      Bytes: 477217      States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: Sun Oct 30 10:51:37 2022 ]
@9 block drop out log inet all label "Default deny rule IPv4" ridentifier 1000000104
  [ Evaluations: 11705     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@10 block drop in log inet6 all label "Default deny rule IPv6" ridentifier 1000000105
  [ Evaluations: 11705     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@11 block drop out log inet6 all label "Default deny rule IPv6" ridentifier 1000000106
  [ Evaluations: 3851      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@12 block drop log quick inet proto tcp from any port = 0 to any label "Block traffic from port 0" ridentifier 1000000107
  [ Evaluations: 11705     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@13 block drop log quick inet proto udp from any port = 0 to any label "Block traffic from port 0" ridentifier 1000000107
  [ Evaluations: 3706      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@14 block drop log quick inet proto tcp from any to any port = 0 label "Block traffic to port 0" ridentifier 1000000108
  [ Evaluations: 11705     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@15 block drop log quick inet proto udp from any to any port = 0 label "Block traffic to port 0" ridentifier 1000000108
  [ Evaluations: 3706      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@16 block drop log quick from <snort2c:0> to any label "Block snort2c hosts" ridentifier 1000000109
  [ Evaluations: 11705     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@17 block drop log quick from any to <snort2c:0> label "Block snort2c hosts" ridentifier 1000000110
  [ Evaluations: 11705     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@18 block drop in log quick proto tcp from <sshguard:0> to (self:14) port = ssh label "sshguard" ridentifier 1000000301
  [ Evaluations: 11705     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@19 block drop in log quick proto tcp from <sshguard:0> to (self:14) port = 8282 label "GUI Lockout" ridentifier 1000000351
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@20 block drop in log quick from <virusprot:0> to any label "virusprot overload table" ridentifier 1000000400
  [ Evaluations: 7854      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@21 pass in quick on em0 proto udp from any port = bootps to any port = bootpc keep state label "allow dhcp replies in WAN" ridentifier 1000000461
  [ Evaluations: 7854      Packets: 2         Bytes: 730         States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@22 pass out quick on em0 proto udp from any port = bootpc to any port = bootps keep state label "allow dhcp client out WAN" ridentifier 1000000462
  [ Evaluations: 4916      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@23 block drop in log on ! em0 inet from 70.188.246.0/23 to any ridentifier 1000001470
  [ Evaluations: 11704     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@24 block drop in log inet from 70.188.246.181 to any ridentifier 1000001470
  [ Evaluations: 10793     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@25 block drop in log on em0 inet6 from fe80::6a05:caff:fe2e:339d to any ridentifier 1000001470
  [ Evaluations: 7853      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@26 block drop in log on ! em1 inet from 192.168.22.0/24 to any ridentifier 1000002520
  [ Evaluations: 7853      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@27 block drop in log inet from 192.168.22.1 to any ridentifier 1000002520
  [ Evaluations: 7853      Packets: 1         Bytes: 52          States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@28 block drop in log on em1 inet6 from fe80::6a05:caff:fe2f:153c to any ridentifier 1000002520
  [ Evaluations: 7853      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@29 block drop in log on ! ovpnc1 inet6 from fdda:d0d0:cafe:1197::/64 to any ridentifier 1000003570
  [ Evaluations: 2809      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@30 block drop in log on ovpnc1 inet6 from fe80::6a05:caff:fe2e:339d to any ridentifier 1000003570
  [ Evaluations: 10        Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@31 block drop in log inet6 from fdda:d0d0:cafe:1197::1002 to any ridentifier 1000003570
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@32 block drop in log on ! ovpnc1 inet from 10.11.0.0/16 to any ridentifier 1000003570
  [ Evaluations: 7132      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@33 block drop in log inet from 10.11.0.4 to any ridentifier 1000003570
  [ Evaluations: 7132      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@34 block drop in log on ! ovpnc2 inet6 from fdda:d0d0:cafe:1196::/64 to any ridentifier 1000004620
  [ Evaluations: 7132      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@35 block drop in log on ovpnc2 inet6 from fe80::6a05:caff:fe2e:339d to any ridentifier 1000004620
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@36 block drop in log inet6 from fdda:d0d0:cafe:1196::1001 to any ridentifier 1000004620
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@37 block drop in log on ! ovpnc2 inet from 10.10.0.0/16 to any ridentifier 1000004620
  [ Evaluations: 7132      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@38 block drop in log inet from 10.10.0.3 to any ridentifier 1000004620
  [ Evaluations: 7132      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@39 block drop in log on ! tun_wg0 inet from 10.65.82.233 to any ridentifier 1000005670
  [ Evaluations: 7853      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@40 block drop in log inet from 10.65.82.233 to any ridentifier 1000005670
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@41 block drop in log on ! tun_wg1 inet from 10.64.137.39 to any ridentifier 1000006720
  [ Evaluations: 7853      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@42 block drop in log inet from 10.64.137.39 to any ridentifier 1000006720
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@43 pass in on lo0 inet all flags S/SA keep state label "pass IPv4 loopback" ridentifier 1000009911
  [ Evaluations: 7853      Packets: 72        Bytes: 5892        States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 1     ]
  [ Last Active Time: Sun Oct 30 10:44:28 2022 ]
@44 pass out on lo0 inet all flags S/SA keep state label "pass IPv4 loopback" ridentifier 1000009912
  [ Evaluations: 3887      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@45 pass out inet all flags S/SA keep state allow-opts label "let out anything IPv4 from firewall host itself" ridentifier 1000009913
  [ Evaluations: 11668     Packets: 13437     Bytes: 2665431     States: 146   ]
  [ Inserted: uid 0 pid 9864 State Creations: 765   ]
  [ Last Active Time: Sun Oct 30 10:51:37 2022 ]
@46 pass out route-to (em0 70.188.246.1) inet from 70.188.246.181 to ! 70.188.246.0/23 flags S/SA keep state allow-opts label "let out anything from firewall host itself" ridentifier 1000010011
  [ Evaluations: 3851      Packets: 142041    Bytes: 96408550    States: 410   ]
  [ Inserted: uid 0 pid 9864 State Creations: 1963  ]
  [ Last Active Time: Sun Oct 30 10:51:37 2022 ]
@47 pass out route-to (ovpnc1 10.11.0.4) inet from 10.11.0.4 to ! 10.11.0.0/16 flags S/SA keep state allow-opts label "let out anything from firewall host itself" ridentifier 1000010012
  [ Evaluations: 3401      Packets: 16        Bytes: 464         States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@48 pass out route-to (ovpnc1 fdda:d0d0:cafe:1197::) inet6 from fdda:d0d0:cafe:1197::1002 to ! fdda:d0d0:cafe:1197::/64 flags S/SA keep state allow-opts label "let out anything from firewall host itself" ridentifier 1000010013
  [ Evaluations: 3401      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@49 pass out route-to (ovpnc2 10.10.0.3) inet from 10.10.0.3 to ! 10.10.0.0/16 flags S/SA keep state allow-opts label "let out anything from firewall host itself" ridentifier 1000010014
  [ Evaluations: 3401      Packets: 14        Bytes: 406         States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@50 pass out route-to (ovpnc2 fdda:d0d0:cafe:1196::) inet6 from fdda:d0d0:cafe:1196::1001 to ! fdda:d0d0:cafe:1196::/64 flags S/SA keep state allow-opts label "let out anything from firewall host itself" ridentifier 1000010015
  [ Evaluations: 3401      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@51 pass out route-to (tun_wg0 10.65.82.233) inet from 10.65.82.233 to ! 10.65.82.233 flags S/SA keep state allow-opts label "let out anything from firewall host itself" ridentifier 1000010016
  [ Evaluations: 3851      Packets: 12        Bytes: 348         States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@52 pass out route-to (tun_wg1 10.64.137.39) inet from 10.64.137.39 to ! 10.64.137.39 flags S/SA keep state allow-opts label "let out anything from firewall host itself" ridentifier 1000010017
  [ Evaluations: 3851      Packets: 12        Bytes: 516         States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@53 pass in quick on em1 proto tcp from any to (em1:2) port = 8282 flags S/SA keep state label "anti-lockout rule" ridentifier 10001
  [ Evaluations: 11704     Packets: 232       Bytes: 145924      States: 2     ]
  [ Inserted: uid 0 pid 9864 State Creations: 4     ]
  [ Last Active Time: Sun Oct 30 10:51:37 2022 ]
@54 pass in quick on em1 proto tcp from any to (em1:2) port = ssh flags S/SA keep state label "anti-lockout rule" ridentifier 10001
  [ Evaluations: 1138      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@55 anchor "userrules/*" all
  [ Evaluations: 11699     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@56 pass in quick on WireGuard inet all flags S/SA keep state label "USER_RULE" label "id:1623716891" ridentifier 1623716891
  [ Evaluations: 11699     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@57 pass in quick on openvpn inet all flags S/SA keep state label "USER_RULE: OpenVPN Remote VPN2 wizard" label "id:1523287278" ridentifier 1523287278
  [ Evaluations: 11697     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@58 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to 70.188.246.181 port = 51820 keep state label "USER_RULE: Pass traffic to WireGuard" label "id:1613233168" ridentifier 1613233168
  [ Evaluations: 11688     Packets: 4         Bytes: 416         States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@59 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto icmp all keep state label "USER_RULE: Allow Pings" label "id:1419280969" ridentifier 1419280969
  [ Evaluations: 3032      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@60 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto tcp from any to 70.188.246.181 port = 8282 flags S/SA keep state label "USER_RULE: Allow remote admin of Pfsense" label "id:1419280970" ridentifier 1419280970
  [ Evaluations: 3032      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@61 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to 70.188.246.181 port = 8282 keep state label "USER_RULE: Allow remote admin of Pfsense" label "id:1419280970" ridentifier 1419280970
  [ Evaluations: 1064      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@62 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto tcp from any to <BrandiIP:1> port = ms-wbt-server flags S/SA keep state label "USER_RULE: NAT Remote Desktop Brandi" label "id:1419280971" ridentifier 1419280971
  [ Evaluations: 3032      Packets: 764       Bytes: 155781      States: 13    ]
  [ Inserted: uid 0 pid 9864 State Creations: 47    ]
  [ Last Active Time: Sun Oct 30 10:51:22 2022 ]
@63 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to <BrandiIP:1> port = ms-wbt-server keep state label "USER_RULE: NAT Remote Desktop Brandi" label "id:1419280971" ridentifier 1419280971
  [ Evaluations: 1064      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@64 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto tcp from any to <KeithIP:1> port = 3390 flags S/SA keep state label "USER_RULE: NAT Remote Desktop Keith" label "id:1419280972" ridentifier 1419280972
  [ Evaluations: 2979      Packets: 12186     Bytes: 2361644     States: 133   ]
  [ Inserted: uid 0 pid 9864 State Creations: 685   ]
  [ Last Active Time: Sun Oct 30 10:51:37 2022 ]
@65 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to <KeithIP:1> port = 3390 keep state label "USER_RULE: NAT Remote Desktop Keith" label "id:1419280972" ridentifier 1419280972
  [ Evaluations: 1064      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@66 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to 70.188.246.181 port = openvpn keep state label "USER_RULE: OpenVPN Remote VPN1 wizard" label "id:1434767411" ridentifier 1434767411
  [ Evaluations: 2209      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@67 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to <KeithIP:1> port = discard keep state label "USER_RULE: NAT WOL KEITH-PC" label "id:1464092460" ridentifier 1464092460
  [ Evaluations: 1064      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@68 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto tcp from any to <Emby:1> port = 8096 flags S/SA keep state label "USER_RULE: NAT Emby" label "id:1464092462" ridentifier 1464092462
  [ Evaluations: 2209      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@69 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to <Emby:1> port = 8096 keep state label "USER_RULE: NAT Emby" label "id:1464092462" ridentifier 1464092462
  [ Evaluations: 1064      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@70 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto tcp from any to <Emby:1> port = 8920 flags S/SA keep state label "USER_RULE: NAT Emby" label "id:1469705408" ridentifier 1469705408
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@71 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to <Emby:1> port = 8920 keep state label "USER_RULE: NAT Emby" label "id:1469705408" ridentifier 1469705408
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@72 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto tcp from any to <Buffalo_NAS:1> port = 9000 flags S/SA keep state label "USER_RULE: NAT Buffalo NAS" label "id:1523759741" ridentifier 1523759741
  [ Evaluations: 2209      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@73 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to <Buffalo_NAS:1> port = 9000 keep state label "USER_RULE: NAT Buffalo NAS" label "id:1523759741" ridentifier 1523759741
  [ Evaluations: 1064      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@74 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto tcp from any to <UbuntuServer:1> port = 8443 flags S/SA keep state label "USER_RULE: NAT OpenConnect" label "id:1531746831" ridentifier 1531746831
  [ Evaluations: 2209      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@75 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to <UbuntuServer:1> port = 8443 keep state label "USER_RULE: NAT OpenConnect" label "id:1531746831" ridentifier 1531746831
  [ Evaluations: 1064      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@76 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto tcp from any to <UbuntuServer:1> port = 9925 flags S/SA keep state label "USER_RULE: NAT Mealie Access" label "id:1626641131" ridentifier 1626641131
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@77 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to <UbuntuServer:1> port = 9925 keep state label "USER_RULE: NAT Mealie Access" label "id:1626641131" ridentifier 1626641131
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@78 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto tcp from any to <ProxMox:1> port = 8006 flags S/SA keep state label "USER_RULE: NAT Proxmox Access" label "id:1644072538" ridentifier 1644072538
  [ Evaluations: 2209      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@79 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to <ProxMox:1> port = 8006 keep state label "USER_RULE: NAT Proxmox Access" label "id:1644072538" ridentifier 1644072538
  [ Evaluations: 1064      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@80 pass in quick on em1 route-to (em0 70.188.246.1) inet proto tcp from any to any port = smtp flags S/SA keep state label "USER_RULE: Send SMTP Mail out the correct gateway" label "id:1419280982" label "gw:WAN" ridentifier 1419280982
  [ Evaluations: 7924      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@81 pass in quick on em1 route-to (em0 70.188.246.1) inet proto tcp from any to any port = smtps flags S/SA keep state label "USER_RULE: Send Cox Mail out the correct gateway" label "id:1517069208" label "gw:WAN" ridentifier 1517069208
  [ Evaluations: 3057      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@82 pass in quick on em1 route-to (em0 70.188.246.1) inet from <KeithIP:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Keith" label "id:1419280987" label "gw:WAN" ridentifier 1419280987
  [ Evaluations: 4769      Packets: 15720     Bytes: 11633834    States: 67    ]
  [ Inserted: uid 0 pid 9864 State Creations: 322   ]
  [ Last Active Time: Sun Oct 30 10:51:37 2022 ]
@83 pass in quick on em1 route-to (em0 70.188.246.1) inet from <BrandiIP:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Brandi" label "id:1522603106" label "gw:WAN" ridentifier 1522603106
  [ Evaluations: 4380      Packets: 2166      Bytes: 704239      States: 13    ]
  [ Inserted: uid 0 pid 9864 State Creations: 41    ]
  [ Last Active Time: Sun Oct 30 10:51:30 2022 ]
@84 pass in quick on em1 route-to (em0 70.188.246.1) inet from <House_PC:1> to any flags S/SA keep state label "USER_RULE: Allow Access - HOME_PC" label "id:1427673108" label "gw:WAN" ridentifier 1427673108
  [ Evaluations: 4271      Packets: 4614      Bytes: 1361444     States: 73    ]
  [ Inserted: uid 0 pid 9864 State Creations: 345   ]
  [ Last Active Time: Sun Oct 30 10:51:35 2022 ]
@85 pass in quick on em1 route-to (em0 70.188.246.1) inet from <Kodi:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Kodi Media Center" label "id:1419280998" label "gw:WAN" ridentifier 1419280998
  [ Evaluations: 3875      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@86 pass in quick on em1 route-to (em0 70.188.246.1) inet from <Bedroom_Chromecast:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Bedroom Chromecast" label "id:1528506444" label "gw:WAN" ridentifier 1528506444
  [ Evaluations: 3875      Packets: 2992      Bytes: 2909960     States: 1     ]
  [ Inserted: uid 0 pid 9864 State Creations: 50    ]
  [ Last Active Time: Sun Oct 30 10:51:03 2022 ]
@87 pass in quick on em1 route-to (em0 70.188.246.1) inet from <Emby:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Emby" label "id:1522005928" label "gw:WAN" ridentifier 1522005928
  [ Evaluations: 3808      Packets: 310       Bytes: 50465       States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 28    ]
  [ Last Active Time: Sun Oct 30 10:50:56 2022 ]
@88 pass in quick on em1 route-to (em0 70.188.246.1) inet from <Google_Nest_Hub:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Google Home Hub" label "id:1560961857" label "gw:WAN" ridentifier 1560961857
  [ Evaluations: 3777      Packets: 858       Bytes: 276273      States: 12    ]
  [ Inserted: uid 0 pid 9864 State Creations: 72    ]
  [ Last Active Time: Sun Oct 30 10:51:37 2022 ]
@89 pass in quick on em1 route-to (em0 70.188.246.1) inet from <Google_Home_MBR:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Google Home MBR" label "id:1526210099" label "gw:WAN" ridentifier 1526210099
  [ Evaluations: 3655      Packets: 1435      Bytes: 938140      States: 5     ]
  [ Inserted: uid 0 pid 9864 State Creations: 56    ]
  [ Last Active Time: Sun Oct 30 10:51:35 2022 ]
@90 pass in quick on em1 route-to (em0 70.188.246.1) inet from <Google_Home_Mini_BR:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Google Home BR" label "id:1526210125" label "gw:WAN" ridentifier 1526210125
  [ Evaluations: 3572      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@91 pass in quick on em1 route-to (em0 70.188.246.1) inet from <Google_Home_Mini_BP:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Google Home BP" label "id:1560727664" label "gw:WAN" ridentifier 1560727664
  [ Evaluations: 3572      Packets: 634       Bytes: 142329      States: 8     ]
  [ Inserted: uid 0 pid 9864 State Creations: 69    ]
  [ Last Active Time: Sun Oct 30 10:51:37 2022 ]
@92 pass in quick on em1 route-to (em0 70.188.246.1) inet from <Google_Home_Mini_LR:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Google Home Mini LR" label "id:1537098804" label "gw:WAN" ridentifier 1537098804
  [ Evaluations: 3490      Packets: 1446      Bytes: 935897      States: 7     ]
  [ Inserted: uid 0 pid 9864 State Creations: 61    ]
  [ Last Active Time: Sun Oct 30 10:51:37 2022 ]
@93 pass in quick on em1 route-to (em0 70.188.246.1) inet from <Smartthings_Hub:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Smartthings Hub" label "id:1527633093" label "gw:WAN" ridentifier 1527633093
  [ Evaluations: 3405      Packets: 924       Bytes: 207734      States: 12    ]
  [ Inserted: uid 0 pid 9864 State Creations: 79    ]
  [ Last Active Time: Sun Oct 30 10:51:36 2022 ]
@94 pass in quick on em1 route-to (em0 70.188.246.1) inet from <ArloHome:1> to any flags S/SA keep state label "USER_RULE: Allow Access - ArloHome" label "id:1543081952" label "gw:WAN" ridentifier 1543081952
  [ Evaluations: 3317      Packets: 69529     Bytes: 58628227    States: 133   ]
  [ Inserted: uid 0 pid 9864 State Creations: 657   ]
  [ Last Active Time: Sun Oct 30 10:51:37 2022 ]
@95 pass in quick on em1 route-to (em0 70.188.246.1) inet from <ArloRemote:1> to any flags S/SA keep state label "USER_RULE: Allow Access - ArloRemote" label "id:1579270767" label "gw:WAN" ridentifier 1579270767
  [ Evaluations: 2566      Packets: 440       Bytes: 109144      States: 2     ]
  [ Inserted: uid 0 pid 9864 State Creations: 33    ]
  [ Last Active Time: Sun Oct 30 10:51:35 2022 ]
@96 pass in quick on em1 route-to (em0 70.188.246.1) inet from <ArloBridge:1> to any flags S/SA keep state label "USER_RULE: Allow Access - ArloBridge" label "id:1579645172" label "gw:WAN" ridentifier 1579645172
  [ Evaluations: 2527      Packets: 147       Bytes: 22840       States: 1     ]
  [ Inserted: uid 0 pid 9864 State Creations: 6     ]
  [ Last Active Time: Sun Oct 30 10:51:35 2022 ]
@97 pass in quick on em1 route-to (em0 70.188.246.1) inet from <ArloVDB:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Arlo Video Doorbell" label "id:1574788520" label "gw:WAN" ridentifier 1574788520
  [ Evaluations: 2521      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@98 pass in quick on em1 route-to (em0 70.188.246.1) inet from <Hue_Hub:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Hue Hub" label "id:1527633127" label "gw:WAN" ridentifier 1527633127
  [ Evaluations: 2521      Packets: 370       Bytes: 72524       States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 10    ]
  [ Last Active Time: Sun Oct 30 10:51:01 2022 ]
@99 pass in quick on em1 route-to (em0 70.188.246.1) inet from <August_Connect:1> to any flags S/SA keep state label "USER_RULE: Allow Access - August_Connect" label "id:1581975806" label "gw:WAN" ridentifier 1581975806
  [ Evaluations: 2497      Packets: 413       Bytes: 62116       States: 3     ]
  [ Inserted: uid 0 pid 9864 State Creations: 11    ]
  [ Last Active Time: Sun Oct 30 10:51:37 2022 ]
@100 pass in quick on em1 route-to (em0 70.188.246.1) inet from <Isaac_PC:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Isaacs PC" label "id:1613838127" label "gw:WAN" ridentifier 1613838127
  [ Evaluations: 2486      Packets: 1064      Bytes: 383189      States: 4     ]
  [ Inserted: uid 0 pid 9864 State Creations: 38    ]
  [ Last Active Time: Sun Oct 30 10:51:26 2022 ]
@101 pass in quick on em1 route-to (em0 70.188.246.1) inet from <Isaac_Phone:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Isaacs Phone" label "id:1528647414" label "gw:WAN" ridentifier 1528647414
  [ Evaluations: 2391      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@102 pass in quick on em1 route-to (em0 70.188.246.1) inet from <Eric_PC:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Erics PC" label "id:1613838488" label "gw:WAN" ridentifier 1613838488
  [ Evaluations: 2391      Packets: 12212     Bytes: 4459813     States: 32    ]
  [ Inserted: uid 0 pid 9864 State Creations: 95    ]
  [ Last Active Time: Sun Oct 30 10:51:37 2022 ]
@103 pass in quick on em1 route-to (em0 70.188.246.1) inet from <Eric_TV:1> to any flags S/SA keep state label "USER_RULE: Allow Access - Eric TV" label "id:1521592795" label "gw:WAN" ridentifier 1521592795
  [ Evaluations: 2067      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@104 pass in quick on em1 route-to (em0 70.188.246.1) inet from 192.168.22.0/24 to any flags S/SA keep state label "USER_RULE: Default allow LAN to any rule" label "id:1419281000" label "gw:WAN" ridentifier 1419281000
  [ Evaluations: 2067      Packets: 24636     Bytes: 12872849    States: 180   ]
  [ Inserted: uid 0 pid 9864 State Creations: 1177  ]
  [ Last Active Time: Sun Oct 30 10:51:37 2022 ]
@105 pass in quick on ovpnc1 reply-to (ovpnc1 10.11.0.4) inet all flags S/SA keep state label "USER_RULE" label "id:1623886753" ridentifier 1623886753
  [ Evaluations: 2624      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@106 pass in quick on tun_wg1 reply-to (tun_wg1 10.64.137.39) inet all flags S/SA keep state label "USER_RULE" label "id:1648767261" ridentifier 1648767261
  [ Evaluations: 2955      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@107 anchor "tftp-proxy/*" all
  [ Evaluations: 6761      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
@108 anchor "miniupnpd" all
  [ Evaluations: 6761      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 9864 State Creations: 0     ]
  [ Last Active Time: N/A ]
