@0(0) scrub on vtnet0 inet all fragment reassemble [ Evaluations: 221023 Packets: 220943 Bytes: 275987 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @1(0) scrub on vtnet0 inet6 all fragment reassemble [ Evaluations: 16 Packets: 16 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @2(0) scrub on vtnet1 inet all fragment reassemble [ Evaluations: 64 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @3(0) scrub on vtnet1 inet6 all fragment reassemble [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @0(0) anchor "openvpn/*" all [ Evaluations: 1154 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @1(0) anchor "ipsec/*" all [ Evaluations: 1154 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @2(1000103481) block drop in log quick inet from 169.254.0.0/16 to any label "Block IPv4 link-local" [ Evaluations: 1154 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @3(1000103482) block drop in log quick inet from any to 169.254.0.0/16 label "Block IPv4 link-local" [ Evaluations: 191 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @4(1000103483) block drop in log inet all label "Default deny rule IPv4" [ Evaluations: 191 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @5(1000103484) block drop out log inet all label "Default deny rule IPv4" [ Evaluations: 1138 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @6(1000103485) block drop in log inet6 all label "Default deny rule IPv6" [ Evaluations: 1154 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @7(1000103486) block drop out log inet6 all label "Default deny rule IPv6" [ Evaluations: 963 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @8(1000103487) pass quick inet6 proto ipv6-icmp all icmp6-type unreach keep state [ Evaluations: 16 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @9(1000103487) pass quick inet6 proto ipv6-icmp all icmp6-type toobig keep state [ Evaluations: 16 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @10(1000103487) pass quick inet6 proto ipv6-icmp all icmp6-type neighbrsol keep state [ Evaluations: 16 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @11(1000103487) pass quick inet6 proto ipv6-icmp all icmp6-type neighbradv keep state [ Evaluations: 16 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @12(1000103488) pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type echorep keep state [ Evaluations: 16 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @13(1000103488) pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routersol keep state [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @14(1000103488) pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routeradv keep state [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @15(1000103488) pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type neighbrsol keep state [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @16(1000103488) pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type neighbradv keep state [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @17(1000103489) pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type echorep keep state [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @18(1000103489) pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routersol keep state [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @19(1000103489) pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routeradv keep state [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @20(1000103489) pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type neighbrsol keep state [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @21(1000103489) pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type neighbradv keep state [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @22(1000103490) pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type echoreq keep state [ Evaluations: 16 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @23(1000103490) pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routersol keep state [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @24(1000103490) pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routeradv keep state [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @25(1000103490) pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type neighbrsol keep state [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @26(1000103490) pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type neighbradv keep state [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @27(1000103491) pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type echoreq keep state [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @28(1000103491) pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type routersol keep state [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @29(1000103491) pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type routeradv keep state [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @30(1000103491) pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type neighbrsol keep state [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @31(1000103491) pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type neighbradv keep state [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @32(1000103492) pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type echoreq keep state [ Evaluations: 16 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @33(1000103492) pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routersol keep state [ Evaluations: 16 Packets: 16 Bytes: 768 States: 0 ] [ Inserted: pid 78343 State Creations: 16 ] @34(1000103492) pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routeradv keep state [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @35(1000103492) pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type neighbrsol keep state [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @36(1000103492) pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type neighbradv keep state [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @37(1000103493) pass in quick inet6 proto ipv6-icmp from :: to ff02::/16 icmp6-type echoreq keep state [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @38(1000103493) pass in quick inet6 proto ipv6-icmp from :: to ff02::/16 icmp6-type routersol keep state [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @39(1000103493) pass in quick inet6 proto ipv6-icmp from :: to ff02::/16 icmp6-type routeradv keep state [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @40(1000103493) pass in quick inet6 proto ipv6-icmp from :: to ff02::/16 icmp6-type neighbrsol keep state [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @41(1000103493) pass in quick inet6 proto ipv6-icmp from :: to ff02::/16 icmp6-type neighbradv keep state [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @42(1000103494) block drop log quick inet proto tcp from any port = 0 to any label "Block traffic from port 0" [ Evaluations: 1138 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @43(1000103494) block drop log quick inet proto udp from any port = 0 to any label "Block traffic from port 0" [ Evaluations: 1074 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @44(1000103495) block drop log quick inet proto tcp from any to any port = 0 label "Block traffic to port 0" [ Evaluations: 1138 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @45(1000103495) block drop log quick inet proto udp from any to any port = 0 label "Block traffic to port 0" [ Evaluations: 1074 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @46(1000103496) block drop log quick inet6 proto tcp from any port = 0 to any label "Block traffic from port 0" [ Evaluations: 1138 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @47(1000103496) block drop log quick inet6 proto udp from any port = 0 to any label "Block traffic from port 0" [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @48(1000103497) block drop log quick inet6 proto tcp from any to any port = 0 label "Block traffic to port 0" [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @49(1000103497) block drop log quick inet6 proto udp from any to any port = 0 label "Block traffic to port 0" [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @50(1000103498) block drop log quick from to any label "Block snort2c hosts" [ Evaluations: 1138 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @51(1000103499) block drop log quick from any to label "Block snort2c hosts" [ Evaluations: 1138 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @52(1000103681) block drop in log quick proto tcp from to (self:7) port = ssh label "sshguard" [ Evaluations: 1138 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @53(1000103731) block drop in log quick proto tcp from to (self:7) port = http label "GUI Lockout" [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @54(1000000400) block drop in log quick from to any label "virusprot overload table" [ Evaluations: 191 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @55(1000103941) pass in quick on vtnet0 proto udp from any port = bootps to any port = bootpc keep state label "allow dhcp client out WAN" [ Evaluations: 191 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @56(1000103942) pass out quick on vtnet0 proto udp from any port = bootpc to any port = bootps keep state label "allow dhcp client out WAN" [ Evaluations: 1107 Packets: 171 Bytes: 58482 States: 0 ] [ Inserted: pid 78343 State Creations: 57 ] @57(1000103943) pass in quick on vtnet0 inet6 proto udp from fe80::/10 port = dhcpv6-client to fe80::/10 port = dhcpv6-client keep state label "allow dhcpv6 client in WAN" [ Evaluations: 985 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @58(1000103944) pass in quick on vtnet0 proto udp from any port = dhcpv6-server to any port = dhcpv6-client keep state label "allow dhcpv6 client in WAN" [ Evaluations: 160 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @59(1000103945) pass out quick on vtnet0 proto udp from any port = dhcpv6-client to any port = dhcpv6-server keep state label "allow dhcpv6 client out WAN" [ Evaluations: 985 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @60(11003) block drop in log quick on vtnet0 from to any label "block bogon IPv4 networks from WAN" [ Evaluations: 1049 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @61(11004) block drop in log quick on vtnet0 from to any label "block bogon IPv6 networks from WAN" [ Evaluations: 175 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @62(1000104950) block drop in log on ! vtnet0 inet from 10.2.0.0/24 to any [ Evaluations: 207 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @63(1000104950) block drop in log inet from 10.2.0.101 to any [ Evaluations: 191 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @64(1000104950) block drop in log on vtnet0 inet6 from fe80::5054:ff:feac:827d to any [ Evaluations: 191 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @65(12006) block drop in log quick on vtnet0 inet from 10.0.0.0/8 to any label "Block private networks from WAN block 10/8" [ Evaluations: 175 Packets: 175 Bytes: 38900 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @66(12007) block drop in log quick on vtnet0 inet from 127.0.0.0/8 to any label "Block private networks from WAN block 127/8" [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @67(12008) block drop in log quick on vtnet0 inet from 172.16.0.0/12 to any label "Block private networks from WAN block 172.16/12" [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @68(12009) block drop in log quick on vtnet0 inet from 192.168.0.0/16 to any label "Block private networks from WAN block 192.168/16" [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @69(12010) block drop in log quick on vtnet0 inet6 from fc00::/7 to any label "Block ULA networks from WAN block fc00::/7" [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @70(1000106000) block drop in log on ! vtnet1 inet from 10.3.0.0/24 to any [ Evaluations: 16 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @71(1000106000) block drop in log inet from 10.3.0.2 to any [ Evaluations: 16 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @72(1000106000) block drop in log on vtnet1 inet6 from fe80::5054:ff:fed8:2782 to any [ Evaluations: 16 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @73(1000106021) pass in quick on vtnet1 inet proto udp from any port = bootpc to 255.255.255.255 port = bootps keep state label "allow access to DHCP server" [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @74(1000106022) pass in quick on vtnet1 inet proto udp from any port = bootpc to 10.3.0.2 port = bootps keep state label "allow access to DHCP server" [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @75(1000106023) pass out quick on vtnet1 inet proto udp from 10.3.0.2 port = bootps to any port = bootpc keep state label "allow access to DHCP server" [ Evaluations: 890 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @76(1000106031) pass quick on vtnet1 inet6 proto udp from fe80::/10 to fe80::/10 port = dhcpv6-client keep state label "allow access to DHCPv6 server" [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @77(1000106032) pass quick on vtnet1 inet6 proto udp from fe80::/10 to ff02::/16 port = dhcpv6-client keep state label "allow access to DHCPv6 server" [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @78(1000106033) pass quick on vtnet1 inet6 proto udp from fe80::/10 to ff02::/16 port = dhcpv6-server keep state label "allow access to DHCPv6 server" [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @79(1000106034) pass quick on vtnet1 inet6 proto udp from ff02::/16 to fe80::/10 port = dhcpv6-server keep state label "allow access to DHCPv6 server" [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @80(1000106041) pass in on lo0 inet all flags S/SA keep state label "pass IPv4 loopback" [ Evaluations: 906 Packets: 32 Bytes: 2886 States: 0 ] [ Inserted: pid 78343 State Creations: 16 ] @81(1000106042) pass out on lo0 inet all flags S/SA keep state label "pass IPv4 loopback" [ Evaluations: 32 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @82(1000106043) pass in on lo0 inet6 all flags S/SA keep state label "pass IPv6 loopback" [ Evaluations: 32 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @83(1000106044) pass out on lo0 inet6 all flags S/SA keep state label "pass IPv6 loopback" [ Evaluations: 16 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @84(1000106045) pass out inet all flags S/SA keep state allow-opts label "let out anything IPv4 from firewall host itself" [ Evaluations: 906 Packets: 32 Bytes: 2886 States: 0 ] [ Inserted: pid 78343 State Creations: 16 ] @85(1000106046) pass out inet6 all flags S/SA keep state allow-opts label "let out anything IPv6 from firewall host itself" [ Evaluations: 890 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @86(1000106141) pass out route-to (vtnet0 10.2.0.1) inet from 10.2.0.101 to ! 10.2.0.0/24 flags S/SA keep state allow-opts label "let out anything from firewall host itself" [ Evaluations: 890 Packets: 2602 Bytes: 430383 States: 0 ] [ Inserted: pid 78343 State Creations: 874 ] @87(10002) pass in quick on vtnet1 proto tcp from any to (vtnet1:2) port = http flags S/SA keep state label "anti-lockout rule" [ Evaluations: 906 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @88(10002) pass in quick on vtnet1 proto tcp from any to (vtnet1:2) port = ssh flags S/SA keep state label "anti-lockout rule" [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @89(0) anchor "userrules/*" all [ Evaluations: 906 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @90(1623359549) pass in quick on vtnet0 reply-to (vtnet0 10.2.0.1) inet proto tcp from any to any port = ssh flags S/SA keep state label "USER_RULE: Easy Rule: Passed from Firewall Log View" [ Evaluations: 915 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @91(1623359666) pass in quick on vtnet0 reply-to (vtnet0 10.2.0.1) inet proto tcp from any to any port = ssh flags S/SA keep state label "USER_RULE: Easy Rule: Passed from Firewall Log View" [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @92(1623359880) pass in quick on vtnet0 reply-to (vtnet0 10.2.0.1) inet proto tcp from any to any port = ssh flags S/SA keep state label "USER_RULE: Easy Rule: Passed from Firewall Log View" [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @93(100000101) pass in quick on vtnet1 inet from 10.3.0.0/24 to any flags S/SA keep state label "USER_RULE: Default allow LAN to any rule" [ Evaluations: 34 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @94(1623359684) pass in quick on vtnet1 inet proto tcp from any to any port = ssh flags S/SA keep state label "USER_RULE: Easy Rule: Passed from Firewall Log View" [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @95(1623359871) pass in quick on vtnet1 inet proto tcp from any to any port = ssh flags S/SA keep state label "USER_RULE: Easy Rule: Passed from Firewall Log View" [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @96(1623360909) pass in quick on vtnet0 reply-to (vtnet0 10.2.0.1) inet proto tcp from 10.2.0.3 to 10.2.0.101 port = ssh flags S/SA keep state label "USER_RULE: Easy Rule: Passed from Firewall Log View" [ Evaluations: 32 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ] @97(0) anchor "tftp-proxy/*" all [ Evaluations: 906 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 78343 State Creations: 0 ]