@0 scrub from any to <vpn_networks:2> fragment no reassemble
  [ Evaluations: 6885759   Packets: 108597    Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@1 scrub from <vpn_networks:2> to any fragment no reassemble
  [ Evaluations: 6777162   Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@2 scrub on ix3 inet all fragment reassemble
  [ Evaluations: 6777162   Packets: 3415302   Bytes: 660526147   States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@3 scrub on ix3 inet6 all fragment reassemble
  [ Evaluations: 8         Packets: 8         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@4 scrub on igc0 inet all fragment reassemble
  [ Evaluations: 3361852   Packets: 1917884   Bytes: 267951302   States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@5 scrub on igc0 inet6 all fragment reassemble
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@6 scrub on ix2 inet all fragment reassemble
  [ Evaluations: 1443968   Packets: 107936    Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@7 scrub on ix2 inet6 all fragment reassemble
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@8 scrub on ix0 inet all fragment reassemble
  [ Evaluations: 1336032   Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@9 scrub on ix0 inet6 all fragment reassemble
  [ Evaluations: 1         Packets: 1         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@10 scrub on ix1 inet all fragment reassemble
  [ Evaluations: 1336031   Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@11 scrub on ix1 inet6 all fragment reassemble
  [ Evaluations: 5         Packets: 5         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@12 scrub on igc1 inet all fragment reassemble
  [ Evaluations: 1336026   Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@13 scrub on igc1 inet6 all fragment reassemble
  [ Evaluations: 5         Packets: 5         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@14 scrub on igc3 inet all fragment reassemble
  [ Evaluations: 1336021   Packets: 1325277   Bytes: 408103378   States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@15 scrub on igc3 inet6 all fragment reassemble
  [ Evaluations: 5         Packets: 5         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@16 scrub on ipsec1 inet all fragment reassemble
  [ Evaluations: 10726     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@17 scrub on ipsec1 inet6 all fragment reassemble
  [ Evaluations: 96        Packets: 96        Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@0 anchor "openvpn/*" all
  [ Evaluations: 157581    Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@1 anchor "ipsec/*" all
  [ Evaluations: 157581    Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@2 block drop in log quick inet from 169.254.0.0/16 to any label "Block IPv4 link-local" ridentifier 1000000101
  [ Evaluations: 157581    Packets: 8         Bytes: 666         States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@3 block drop in log quick inet from any to 169.254.0.0/16 label "Block IPv4 link-local" ridentifier 1000000102
  [ Evaluations: 28170     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@4 block drop in log inet all label "Default deny rule IPv4" ridentifier 1000000103
  [ Evaluations: 28170     Packets: 469       Bytes: 68770       States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: Sat Jul 13 05:56:52 2024 ]
@5 block drop out log inet all label "Default deny rule IPv4" ridentifier 1000000104
  [ Evaluations: 157346    Packets: 20        Bytes: 4053        States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: Sat Jul 13 06:00:01 2024 ]
@6 block drop in log inet6 all label "Default deny rule IPv6" ridentifier 1000000105
  [ Evaluations: 157573    Packets: 9         Bytes: 712         States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@7 block drop out log inet6 all label "Default deny rule IPv6" ridentifier 1000000106
  [ Evaluations: 129403    Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@8 pass quick inet6 proto ipv6-icmp all icmp6-type unreach keep state ridentifier 1000000107
  [ Evaluations: 506       Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@9 pass quick inet6 proto ipv6-icmp all icmp6-type toobig keep state ridentifier 1000000107
  [ Evaluations: 78        Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@10 pass quick inet6 proto ipv6-icmp all icmp6-type neighbrsol keep state ridentifier 1000000107
  [ Evaluations: 78        Packets: 37        Bytes: 2664        States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@11 pass quick inet6 proto ipv6-icmp all icmp6-type neighbradv keep state ridentifier 1000000107
  [ Evaluations: 54        Packets: 2         Bytes: 144         States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@12 pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type echorep keep state ridentifier 1000000108
  [ Evaluations: 52        Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@13 pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routersol keep state ridentifier 1000000108
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@14 pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routeradv keep state ridentifier 1000000108
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@15 pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type neighbrsol keep state ridentifier 1000000108
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@16 pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type neighbradv keep state ridentifier 1000000108
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@17 pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type echorep keep state ridentifier 1000000109
  [ Evaluations: 25        Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@18 pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routersol keep state ridentifier 1000000109
  [ Evaluations: 25        Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@19 pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routeradv keep state ridentifier 1000000109
  [ Evaluations: 25        Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@20 pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type neighbrsol keep state ridentifier 1000000109
  [ Evaluations: 25        Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@21 pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type neighbradv keep state ridentifier 1000000109
  [ Evaluations: 25        Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@22 pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type echoreq keep state ridentifier 1000000110
  [ Evaluations: 34        Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@23 pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routersol keep state ridentifier 1000000110
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@24 pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routeradv keep state ridentifier 1000000110
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@25 pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type neighbrsol keep state ridentifier 1000000110
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@26 pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type neighbradv keep state ridentifier 1000000110
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@27 pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type echoreq keep state ridentifier 1000000111
  [ Evaluations: 24        Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@28 pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type routersol keep state ridentifier 1000000111
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@29 pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type routeradv keep state ridentifier 1000000111
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@30 pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type neighbrsol keep state ridentifier 1000000111
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@31 pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type neighbradv keep state ridentifier 1000000111
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@32 pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type echoreq keep state ridentifier 1000000112
  [ Evaluations: 9         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@33 pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routersol keep state ridentifier 1000000112
  [ Evaluations: 3         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@34 pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routeradv keep state ridentifier 1000000112
  [ Evaluations: 3         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@35 pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type neighbrsol keep state ridentifier 1000000112
  [ Evaluations: 3         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@36 pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type neighbradv keep state ridentifier 1000000112
  [ Evaluations: 3         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@37 pass in quick inet6 proto ipv6-icmp from :: to ff02::/16 icmp6-type echoreq keep state ridentifier 1000000113
  [ Evaluations: 9         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@38 pass in quick inet6 proto ipv6-icmp from :: to ff02::/16 icmp6-type routersol keep state ridentifier 1000000113
  [ Evaluations: 6         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@39 pass in quick inet6 proto ipv6-icmp from :: to ff02::/16 icmp6-type routeradv keep state ridentifier 1000000113
  [ Evaluations: 6         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@40 pass in quick inet6 proto ipv6-icmp from :: to ff02::/16 icmp6-type neighbrsol keep state ridentifier 1000000113
  [ Evaluations: 6         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@41 pass in quick inet6 proto ipv6-icmp from :: to ff02::/16 icmp6-type neighbradv keep state ridentifier 1000000113
  [ Evaluations: 6         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@42 block drop log quick inet proto tcp from any port = 0 to any label "Block traffic from port 0" ridentifier 1000000114
  [ Evaluations: 157547    Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@43 block drop log quick inet proto udp from any port = 0 to any label "Block traffic from port 0" ridentifier 1000000114
  [ Evaluations: 144053    Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@44 block drop log quick inet proto tcp from any to any port = 0 label "Block traffic to port 0" ridentifier 1000000115
  [ Evaluations: 157067    Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@45 block drop log quick inet proto udp from any to any port = 0 label "Block traffic to port 0" ridentifier 1000000115
  [ Evaluations: 144053    Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@46 block drop log quick inet6 proto tcp from any port = 0 to any label "Block traffic from port 0" ridentifier 1000000116
  [ Evaluations: 157547    Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@47 block drop log quick inet6 proto udp from any port = 0 to any label "Block traffic from port 0" ridentifier 1000000116
  [ Evaluations: 480       Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@48 block drop log quick inet6 proto tcp from any to any port = 0 label "Block traffic to port 0" ridentifier 1000000117
  [ Evaluations: 480       Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@49 block drop log quick inet6 proto udp from any to any port = 0 label "Block traffic to port 0" ridentifier 1000000117
  [ Evaluations: 480       Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@50 block drop log quick from <snort2c:0> to any label "Block snort2c hosts" ridentifier 1000000118
  [ Evaluations: 157547    Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@51 block drop log quick from any to <snort2c:0> label "Block snort2c hosts" ridentifier 1000000119
  [ Evaluations: 157547    Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@52 block drop in log quick proto carp from (self:25) to any ridentifier 1000000201
  [ Evaluations: 157547    Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@53 pass quick proto carp all no state ridentifier 1000000202
  [ Evaluations: 129154    Packets: 55181     Bytes: 3090136     States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: Sat Jul 13 06:00:46 2024 ]
@54 block drop in log quick proto tcp from <sshguard:0> to (self:25) port = ssh label "sshguard" ridentifier 1000000301
  [ Evaluations: 102366    Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@55 block drop in log quick proto tcp from <sshguard:0> to (self:25) port = https label "GUI Lockout" ridentifier 1000000351
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@56 block drop in log quick from <virusprot:0> to any label "virusprot overload table" ridentifier 1000000400
  [ Evaluations: 28393     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@57 pass in quick on ix3 proto udp from any port = bootps to any port = bootpc keep state (pflow) label "allow dhcp replies in WAN" ridentifier 1000000461
  [ Evaluations: 28393     Packets: 2         Bytes: 656         States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@58 pass out quick on ix3 proto udp from any port = bootpc to any port = bootps keep state (pflow) label "allow dhcp client out WAN" ridentifier 1000000462
  [ Evaluations: 73981     Packets: 30        Bytes: 9840        States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@59 block drop in log on ! ix3 inet from 172.21.56.0/24 to any ridentifier 1000001470
  [ Evaluations: 3258      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@60 block drop in log on ! ix3 inet from 192.168.52.11 to any ridentifier 1000001470
  [ Evaluations: 624       Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@61 block drop in log on ! ix3 inet from 192.168.254.12 to any ridentifier 1000001470
  [ Evaluations: 624       Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@62 block drop in log inet from 172.21.56.155 to any ridentifier 1000001470
  [ Evaluations: 3104      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@63 block drop in log inet from 192.168.52.11 to any ridentifier 1000001470
  [ Evaluations: 624       Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@64 block drop in log inet from 192.168.254.12 to any ridentifier 1000001470
  [ Evaluations: 624       Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@65 block drop in log on ! ix3 inet6 from aa:: to any ridentifier 1000001470
  [ Evaluations: 645       Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@66 block drop in log inet6 from aa:: to any ridentifier 1000001470
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@67 block drop in log on ix3 inet6 from fe80::92ec:77ff:fe1d:13ea to any ridentifier 1000001470
  [ Evaluations: 21        Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@68 block drop in log on ! igc0 inet from 192.168.254.0/24 to any ridentifier 1000002520
  [ Evaluations: 28577     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@69 block drop in log inet from 192.168.254.10 to any ridentifier 1000002520
  [ Evaluations: 28168     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@70 block drop in log inet from 192.168.254.11 to any ridentifier 1000002520
  [ Evaluations: 28166     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@71 block drop in log on igc0 inet6 from fe80::92ec:77ff:fe1d:13ee to any ridentifier 1000002520
  [ Evaluations: 28391     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@72 pass in quick on igc0 inet proto udp from any port = bootpc to 255.255.255.255 port = bootps keep state (pflow) label "allow access to DHCP server" ridentifier 1000002541
  [ Evaluations: 11707     Packets: 5         Bytes: 1750        States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@73 pass in quick on igc0 inet proto udp from any port = bootpc to 192.168.254.10 port = bootps keep state (pflow) label "allow access to DHCP server" ridentifier 1000002542
  [ Evaluations: 5         Packets: 5         Bytes: 1720        States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@74 pass out quick on igc0 inet proto udp from 192.168.254.10 port = bootps to any port = bootpc keep state (pflow) label "allow access to DHCP server" ridentifier 1000002543
  [ Evaluations: 81355     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@75 block drop in log on ! ix2 inet from 192.168.72.0/30 to any ridentifier 1000003570
  [ Evaluations: 102341    Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@76 block drop in log inet from 192.168.72.2 to any ridentifier 1000003570
  [ Evaluations: 28192     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@77 block drop in log on ix2 inet6 from fe80::92ec:77ff:fe1d:13eb to any ridentifier 1000003570
  [ Evaluations: 28383     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@78 block drop in log on ! igc1 inet from 192.168.200.0/24 to any ridentifier 1000006720
  [ Evaluations: 28383     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@79 block drop in log inet from 192.168.200.1 to any ridentifier 1000006720
  [ Evaluations: 28160     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@80 block drop in log on igc1 inet6 from fe80::92ec:77ff:fe1d:13ef to any ridentifier 1000006720
  [ Evaluations: 28383     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@81 pass in quick on igc1 inet proto udp from any port = bootpc to 255.255.255.255 port = bootps keep state (pflow) label "allow access to DHCP server" ridentifier 1000006741
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@82 pass in quick on igc1 inet proto udp from any port = bootpc to 192.168.200.1 port = bootps keep state (pflow) label "allow access to DHCP server" ridentifier 1000006742
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@83 pass out quick on igc1 inet proto udp from 192.168.200.1 port = bootps to any port = bootpc keep state (pflow) label "allow access to DHCP server" ridentifier 1000006743
  [ Evaluations: 73958     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@84 block drop in log on ! igc3 inet from 172.16.4.0/24 to any ridentifier 1000007770
  [ Evaluations: 102340    Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@85 block drop in log inet from 172.16.4.1 to any ridentifier 1000007770
  [ Evaluations: 28205     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@86 block drop in log on igc3 inet6 from fe80::92ec:77ff:fe1d:13f1 to any ridentifier 1000007770
  [ Evaluations: 28384     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@87 pass in quick on igc3 inet proto udp from any port = bootpc to 255.255.255.255 port = bootps keep state (pflow) label "allow access to DHCP server" ridentifier 1000007791
  [ Evaluations: 14265     Packets: 4         Bytes: 1372        States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@88 pass in quick on igc3 inet proto udp from any port = bootpc to 172.16.4.1 port = bootps keep state (pflow) label "allow access to DHCP server" ridentifier 1000007792
  [ Evaluations: 3         Packets: 3         Bytes: 1032        States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@89 pass out quick on igc3 inet proto udp from 172.16.4.1 port = bootps to any port = bootpc keep state (pflow) label "allow access to DHCP server" ridentifier 1000007793
  [ Evaluations: 84960     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@90 block drop in log on ! ipsec1 inet from 10.0.7.0/30 to any ridentifier 1000008820
  [ Evaluations: 102329    Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@91 block drop in log inet from 10.0.7.1 to any ridentifier 1000008820
  [ Evaluations: 28201     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@92 block drop in log on ipsec1 inet6 from fe80::92ec:77ff:fe1d:13ee to any ridentifier 1000008820
  [ Evaluations: 28378     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@93 pass in on lo0 inet all flags S/SA keep state (pflow) label "pass IPv4 loopback" ridentifier 1000012011
  [ Evaluations: 28412     Packets: 4094      Bytes: 544247      States: 4     ]
  [ Inserted: uid 0 pid 0 State Creations: 28    ]
  [ Last Active Time: Sat Jul 13 06:00:35 2024 ]
@94 pass out on lo0 inet all flags S/SA keep state (pflow) label "pass IPv4 loopback" ridentifier 1000012012
  [ Evaluations: 75855     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@95 pass in on lo0 inet6 all flags S/SA keep state (pflow) label "pass IPv6 loopback" ridentifier 1000012013
  [ Evaluations: 4254      Packets: 422       Bytes: 45676       States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@96 pass out on lo0 inet6 all flags S/SA keep state (pflow) label "pass IPv6 loopback" ridentifier 1000012014
  [ Evaluations: 2341      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@97 pass out inet all flags S/SA keep state allow-opts label "let out anything IPv4 from firewall host itself" ridentifier 1000012015
  [ Evaluations: 102123    Packets: 17876     Bytes: 11943892    States: 5     ]
  [ Inserted: uid 0 pid 0 State Creations: 33    ]
  [ Last Active Time: Sat Jul 13 06:00:43 2024 ]
@98 pass out inet6 all flags S/SA keep state allow-opts label "let out anything IPv6 from firewall host itself" ridentifier 1000012016
  [ Evaluations: 73958     Packets: 533       Bytes: 55592       States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@99 pass out route-to (ix3 172.21.56.129) inet from 172.21.56.155 to ! 172.21.56.0/24 flags S/SA keep state allow-opts label "let out anything from firewall host itself" ridentifier 1000012111
  [ Evaluations: 2613      Packets: 9648      Bytes: 2553719     States: 197   ]
  [ Inserted: uid 0 pid 0 State Creations: 1315  ]
  [ Last Active Time: Sat Jul 13 06:00:45 2024 ]
@100 pass out route-to (ix3 172.21.56.129) inet from 192.168.52.11 to ! 192.168.52.11 flags S/SA keep state allow-opts label "let out anything from firewall host itself" ridentifier 1000012112
  [ Evaluations: 2596      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@101 pass out route-to (ix3 172.21.56.129) inet from 192.168.254.12 to ! 192.168.254.12 flags S/SA keep state allow-opts label "let out anything from firewall host itself" ridentifier 1000012113
  [ Evaluations: 2596      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@102 pass out inet from 10.0.7.1 to ! 10.0.7.0/30 flags S/SA keep state allow-opts label "let out anything from firewall host itself" ridentifier 1000012114
  [ Evaluations: 73781     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@103 pass out on enc0 all flags S/SA keep state label "IPsec internal host to host" ridentifier 1000012412
  [ Evaluations: 73958     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@104 pass in quick on igc0 proto tcp from any to (igc0:3) port = https flags S/SA keep state label "anti-lockout rule" ridentifier 10001
  [ Evaluations: 102337    Packets: 708       Bytes: 535371      States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@105 pass in quick on igc0 proto tcp from any to (igc0:3) port = http flags S/SA keep state label "anti-lockout rule" ridentifier 10001
  [ Evaluations: 1608      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@106 pass in quick on igc0 proto tcp from any to (igc0:3) port = ssh flags S/SA keep state label "anti-lockout rule" ridentifier 10001
  [ Evaluations: 1608      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@107 pass in inet all flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost" ridentifier 1000012431 tagged PFREFLECT
  [ Evaluations: 102317    Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@108 anchor "userrules/*" all
  [ Evaluations: 102331    Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@109 block drop in log quick on enc0 inet all label "USER_RULE" label "id:1715283286" ridentifier 1715283286
  [ Evaluations: 102331    Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@110 pass in quick on openvpn inet all flags S/SA keep state (pflow) label "USER_RULE: OpenVPN keccak_kmac_server wizard" label "id:1711980590" ridentifier 1711980590
  [ Evaluations: 102331    Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@111 pass in quick on openvpn inet all flags S/SA keep state (pflow) label "USER_RULE: OpenVPN test_openvpn wizard" label "id:1715609215" ridentifier 1715609215
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@112 pass in quick on ix3 reply-to (ix3 172.21.56.129) inet all flags S/SA keep state (pflow) label "USER_RULE" label "id:1713526756" ridentifier 1713526756
  [ Evaluations: 3258      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@113 pass in quick on ix3 reply-to (ix3 172.21.56.129) inet proto udp from any to 172.21.56.155 port = openvpn keep state (pflow) label "USER_RULE: OpenVPN keccak_kmac_server wizard" label "id:1711980589" ridentifier 1711980589
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@114 pass in quick on ix3 reply-to (ix3 172.21.56.129) inet proto icmp from any to 192.168.200.10 keep state (pflow) label "USER_RULE: NAT " label "id:1713526917" ridentifier 1713526917
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@115 pass in quick on ix3 reply-to (ix3 172.21.56.129) inet proto udp from any to 172.21.56.155 port = openvpn keep state (pflow) label "USER_RULE: OpenVPN test_openvpn wizard" label "id:1715609214" ridentifier 1715609214
  [ Evaluations: 0         Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@116 pass in quick on igc0 inet proto tcp from any to <fqdn_test:1> flags S/SA keep state (pflow) label "USER_RULE" label "id:1715870999" ridentifier 1715870999
  [ Evaluations: 30661     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@117 pass in quick on igc0 inet from <LAN__NETWORK:2> to any flags S/SA keep state (pflow) label "USER_RULE: Default allow LAN to any rule" label "id:0100000101" ridentifier 100000101
  [ Evaluations: 11693     Packets: 1386580   Bytes: 1333195002  States: 11    ]
  [ Inserted: uid 0 pid 0 State Creations: 60    ]
  [ Last Active Time: Sat Jul 13 06:00:45 2024 ]
@118 pass in quick on igc1 inet all flags S/SA keep state (pflow) label "USER_RULE" label "id:1713527423" ridentifier 1713527423
  [ Evaluations: 19044     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@119 pass in quick on igc3 inet all flags S/SA keep state (pflow) label "USER_RULE" label "id:1715253727" ridentifier 1715253727
  [ Evaluations: 19043     Packets: 404596    Bytes: 216369353   States: 88    ]
  [ Inserted: uid 0 pid 0 State Creations: 397   ]
  [ Last Active Time: Sat Jul 13 06:00:44 2024 ]
@120 pass in quick on ipsec1 reply-to (ipsec1 10.0.7.2) inet proto icmp from 10.0.8.2 to 10.0.7.1 icmp-type echoreq keep state (pflow) label "USER_RULE: Passed via EasyRule" label "id:1715790828" ridentifier 1715790828
  [ Evaluations: 4839      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@121 pass out inet proto udp from (self:14) to 192.168.254.2 port = isakmp keep state label "IPsec: 192.168.254.2 - outbound isakmp" ridentifier 1000112551
  [ Evaluations: 76563     Packets: 2         Bytes: 984         States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@122 pass in on igc0 inet proto udp from 192.168.254.2 to (self:14) port = isakmp keep state label "IPsec: 192.168.254.2 - inbound isakmp" ridentifier 1000112552
  [ Evaluations: 71047     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@123 pass out inet proto udp from (self:14) to 192.168.254.2 port = ipsec-nat-t keep state label "IPsec: 192.168.254.2 - outbound nat-t" ridentifier 1000112553
  [ Evaluations: 70957     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@124 pass in on igc0 inet proto udp from 192.168.254.2 to (self:14) port = ipsec-nat-t keep state label "IPsec: 192.168.254.2 - inbound nat-t" ridentifier 1000112554
  [ Evaluations: 70955     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@125 pass out inet proto esp from (self:14) to 192.168.254.2 keep state label "IPsec: 192.168.254.2 - outbound esp proto" ridentifier 1000112555
  [ Evaluations: 76306     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@126 pass in on igc0 inet proto esp from 192.168.254.2 to (self:14) keep state label "IPsec: 192.168.254.2 - inbound esp proto" ridentifier 1000112556
  [ Evaluations: 2605      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@127 pass out route-to (ix3 172.21.56.129) inet proto udp from (self:14) to 1.1.1.1 port = isakmp keep state label "IPsec: 1.1.1.1 - outbound isakmp" ridentifier 1000112567
  [ Evaluations: 2719      Packets: 2         Bytes: 984         States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 1     ]
  [ Last Active Time: Sat Jul 13 05:56:52 2024 ]
@128 pass in on ix3 reply-to (ix3 172.21.56.129) inet proto udp from 1.1.1.1 to (self:14) port = isakmp keep state label "IPsec: 1.1.1.1 - inbound isakmp" ridentifier 1000112568
  [ Evaluations: 2582      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@129 pass out route-to (ix3 172.21.56.129) inet proto udp from (self:14) to 1.1.1.1 port = ipsec-nat-t keep state label "IPsec: 1.1.1.1 - outbound nat-t" ridentifier 1000112569
  [ Evaluations: 2582      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@130 pass in on ix3 reply-to (ix3 172.21.56.129) inet proto udp from 1.1.1.1 to (self:14) port = ipsec-nat-t keep state label "IPsec: 1.1.1.1 - inbound nat-t" ridentifier 1000112570
  [ Evaluations: 2580      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@131 pass out route-to (ix3 172.21.56.129) inet proto esp from (self:14) to 1.1.1.1 keep state label "IPsec: 1.1.1.1 - outbound esp proto" ridentifier 1000112571
  [ Evaluations: 2719      Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@132 pass in on ix3 reply-to (ix3 172.21.56.129) inet proto esp from 1.1.1.1 to (self:14) keep state label "IPsec: 1.1.1.1 - inbound esp proto" ridentifier 1000112572
  [ Evaluations: 123       Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
@133 anchor "tftp-proxy/*" all
  [ Evaluations: 76563     Packets: 0         Bytes: 0           States: 0     ]
  [ Inserted: uid 0 pid 0 State Creations: 0     ]
  [ Last Active Time: N/A ]
