time pfctl -vvsr @0(0) scrub on mvneta0.4090 inet all fragment reassemble [ Evaluations: 80617203 Packets: 31711761 Bytes: 1105822944 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1(0) scrub on mvneta0.4090 inet6 all fragment reassemble [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2(0) scrub on mvneta0.4091 inet all fragment reassemble [ Evaluations: 48905454 Packets: 21444 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @3(0) scrub on mvneta0.4091 inet6 all fragment reassemble [ Evaluations: 170 Packets: 170 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @4(0) scrub on mvneta0.20 inet all fragment reassemble [ Evaluations: 48883858 Packets: 5950998 Bytes: 1613694247 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @5(0) scrub on mvneta0.20 inet6 all fragment reassemble [ Evaluations: 4151 Packets: 4151 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @6(0) scrub on mvneta0.30 inet all fragment reassemble [ Evaluations: 42928709 Packets: 30918 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @7(0) scrub on mvneta0.30 inet6 all fragment reassemble [ Evaluations: 4055 Packets: 4055 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @8(0) scrub on mvneta0.40 inet all fragment reassemble [ Evaluations: 42893736 Packets: 2266623 Bytes: 219839096 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @9(0) scrub on mvneta0.40 inet6 all fragment reassemble [ Evaluations: 4605 Packets: 4605 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @10(0) scrub on mvneta0.50 inet all fragment reassemble [ Evaluations: 40622508 Packets: 30058114 Bytes: 1965968747 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @11(0) scrub on mvneta0.50 inet6 all fragment reassemble [ Evaluations: 4073 Packets: 4073 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @12(0) scrub on ovpnc1 inet all fragment reassemble [ Evaluations: 10560321 Packets: 2568411 Bytes: 192379737 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @13(0) scrub on ovpnc1 inet6 all fragment reassemble [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @14(0) scrub on ovpnc3 inet all fragment reassemble [ Evaluations: 7991910 Packets: 5429923 Bytes: 1997457258 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @15(0) scrub on ovpnc3 inet6 all fragment reassemble [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @16(0) scrub on ovpnc5 inet all fragment reassemble [ Evaluations: 2561987 Packets: 1029356 Bytes: 82405426 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @17(0) scrub on ovpnc5 inet6 all fragment reassemble [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @18(0) scrub on ovpns2 inet all fragment reassemble [ Evaluations: 1532631 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @19(0) scrub on ovpns2 inet6 all fragment reassemble [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @20(0) scrub on mvneta0.60 inet all fragment reassemble [ Evaluations: 1532631 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @21(0) scrub on mvneta0.60 inet6 all fragment reassemble [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @0(0) anchor "openvpn/*" all [ Evaluations: 435360 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1(0) anchor "ipsec/*" all [ Evaluations: 435360 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2(0) block drop in log quick inet from 169.254.0.0/16 to any label "Block IPv4 link-local" ridentifier 1000000101 [ Evaluations: 435360 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @3(0) block drop in log quick inet from any to 169.254.0.0/16 label "Block IPv4 link-local" ridentifier 1000000102 [ Evaluations: 201348 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @4(0) block drop in log inet all label "Default deny rule IPv4" ridentifier 1000000103 [ Evaluations: 201348 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @5(0) block drop out log inet all label "Default deny rule IPv4" ridentifier 1000000104 [ Evaluations: 433571 Packets: 16 Bytes: 2750 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @6(0) block drop in log inet6 all label "Default deny rule IPv6" ridentifier 1000000105 [ Evaluations: 435360 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @7(0) block drop out log inet6 all label "Default deny rule IPv6" ridentifier 1000000106 [ Evaluations: 234012 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @8(0) pass quick inet6 proto ipv6-icmp all icmp6-type unreach keep state ridentifier 1000000107 [ Evaluations: 3108 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @9(0) pass quick inet6 proto ipv6-icmp all icmp6-type toobig keep state ridentifier 1000000107 [ Evaluations: 633 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @10(0) pass quick inet6 proto ipv6-icmp all icmp6-type neighbrsol keep state ridentifier 1000000107 [ Evaluations: 633 Packets: 9 Bytes: 624 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @11(0) pass quick inet6 proto ipv6-icmp all icmp6-type neighbradv keep state ridentifier 1000000107 [ Evaluations: 624 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @12(0) pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type echorep keep state ridentifier 1000000108 [ Evaluations: 624 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @13(0) pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routersol keep state ridentifier 1000000108 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @14(0) pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routeradv keep state ridentifier 1000000108 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @15(0) pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type neighbrsol keep state ridentifier 1000000108 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @16(0) pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type neighbradv keep state ridentifier 1000000108 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @17(0) pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type echorep keep state ridentifier 1000000109 [ Evaluations: 169 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @18(0) pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routersol keep state ridentifier 1000000109 [ Evaluations: 169 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @19(0) pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routeradv keep state ridentifier 1000000109 [ Evaluations: 169 Packets: 168 Bytes: 16128 States: 0 ] [ Inserted: pid 17662 State Creations: 1 ] @20(0) pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type neighbrsol keep state ridentifier 1000000109 [ Evaluations: 2 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @21(0) pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type neighbradv keep state ridentifier 1000000109 [ Evaluations: 2 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @22(0) pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type echoreq keep state ridentifier 1000000110 [ Evaluations: 457 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @23(0) pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routersol keep state ridentifier 1000000110 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @24(0) pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routeradv keep state ridentifier 1000000110 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @25(0) pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type neighbrsol keep state ridentifier 1000000110 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @26(0) pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type neighbradv keep state ridentifier 1000000110 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @27(0) pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type echoreq keep state ridentifier 1000000111 [ Evaluations: 20 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @28(0) pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type routersol keep state ridentifier 1000000111 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @29(0) pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type routeradv keep state ridentifier 1000000111 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @30(0) pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type neighbrsol keep state ridentifier 1000000111 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @31(0) pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type neighbradv keep state ridentifier 1000000111 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @32(0) pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type echoreq keep state ridentifier 1000000112 [ Evaluations: 455 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @33(0) pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routersol keep state ridentifier 1000000112 [ Evaluations: 435 Packets: 70 Bytes: 3904 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @34(0) pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routeradv keep state ridentifier 1000000112 [ Evaluations: 379 Packets: 168 Bytes: 16128 States: 0 ] [ Inserted: pid 17662 State Creations: 1 ] @35(0) pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type neighbrsol keep state ridentifier 1000000112 [ Evaluations: 212 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @36(0) pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type neighbradv keep state ridentifier 1000000112 [ Evaluations: 212 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @37(0) pass in quick inet6 proto ipv6-icmp from :: to ff02::/16 icmp6-type echoreq keep state ridentifier 1000000113 [ Evaluations: 232 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @38(0) pass in quick inet6 proto ipv6-icmp from :: to ff02::/16 icmp6-type routersol keep state ridentifier 1000000113 [ Evaluations: 20 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @39(0) pass in quick inet6 proto ipv6-icmp from :: to ff02::/16 icmp6-type routeradv keep state ridentifier 1000000113 [ Evaluations: 20 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @40(0) pass in quick inet6 proto ipv6-icmp from :: to ff02::/16 icmp6-type neighbrsol keep state ridentifier 1000000113 [ Evaluations: 20 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @41(0) pass in quick inet6 proto ipv6-icmp from :: to ff02::/16 icmp6-type neighbradv keep state ridentifier 1000000113 [ Evaluations: 20 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @42(0) block drop log quick inet proto tcp from any port = 0 to any label "Block traffic from port 0" ridentifier 1000000114 [ Evaluations: 434961 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @43(0) block drop log quick inet proto udp from any port = 0 to any label "Block traffic from port 0" ridentifier 1000000114 [ Evaluations: 160855 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @44(0) block drop log quick inet proto tcp from any to any port = 0 label "Block traffic to port 0" ridentifier 1000000115 [ Evaluations: 432252 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @45(0) block drop log quick inet proto udp from any to any port = 0 label "Block traffic to port 0" ridentifier 1000000115 [ Evaluations: 160855 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @46(0) block drop log quick inet6 proto tcp from any port = 0 to any label "Block traffic from port 0" ridentifier 1000000116 [ Evaluations: 434961 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @47(0) block drop log quick inet6 proto udp from any port = 0 to any label "Block traffic from port 0" ridentifier 1000000116 [ Evaluations: 2709 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @48(0) block drop log quick inet6 proto tcp from any to any port = 0 label "Block traffic to port 0" ridentifier 1000000117 [ Evaluations: 2709 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @49(0) block drop log quick inet6 proto udp from any to any port = 0 label "Block traffic to port 0" ridentifier 1000000117 [ Evaluations: 2709 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @50(0) block drop log quick from to any label "Block snort2c hosts" ridentifier 1000000118 [ Evaluations: 434961 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @51(0) block drop log quick from any to label "Block snort2c hosts" ridentifier 1000000119 [ Evaluations: 434961 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @52(0) block drop in log quick proto carp from (self:18) to any ridentifier 1000000201 [ Evaluations: 434961 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @53(0) pass quick proto carp all no state ridentifier 1000000202 [ Evaluations: 232056 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @54(0) block drop in log quick proto tcp from to (self:18) port = ssh label "sshguard" ridentifier 1000000301 [ Evaluations: 434961 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @55(0) block drop in log quick proto tcp from to (self:18) port = https label "GUI Lockout" ridentifier 1000000351 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @56(0) block drop in log quick from to any label "virusprot overload table" ridentifier 1000000400 [ Evaluations: 202905 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @57(0) pass in quick on mvneta0.4090 proto udp from any port = bootps to any port = bootpc keep state label "allow dhcp client out WAN" ridentifier 1000000561 [ Evaluations: 202905 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @58(0) pass out quick on mvneta0.4090 proto udp from any port = bootpc to any port = bootps keep state label "allow dhcp client out WAN" ridentifier 1000000562 [ Evaluations: 232073 Packets: 2 Bytes: 657 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @59(0) block drop in log on ! mvneta0.4090 inet from 192.168.2.0/24 to any ridentifier 1000001570 [ Evaluations: 434960 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @60(0) block drop in log inet from 192.168.2.2 to any ridentifier 1000001570 [ Evaluations: 287920 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @61(0) block drop in log on mvneta0.4090 inet6 from fe80::251:82ff:fe11:2200 to any ridentifier 1000001570 [ Evaluations: 202905 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @62(0) block drop in log on mvneta0.4091 inet6 from fe80::251:82ff:fe11:2200 to any ridentifier 1000002620 [ Evaluations: 201445 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @63(0) block drop in log on mvneta0.4091 inet6 from fe80::1:1 to any ridentifier 1000002620 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @64(0) block drop in log on ! mvneta0.4091 inet from 192.168.3.0/24 to any ridentifier 1000002620 [ Evaluations: 202905 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @65(0) block drop in log inet from 192.168.3.1 to any ridentifier 1000002620 [ Evaluations: 201348 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @66(0) pass in quick on mvneta0.4091 inet proto udp from any port = bootpc to 255.255.255.255 port = bootps keep state label "allow access to DHCP server" ridentifier 1000002641 [ Evaluations: 201348 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @67(0) pass in quick on mvneta0.4091 inet proto udp from any port = bootpc to 192.168.3.1 port = bootps keep state label "allow access to DHCP server" ridentifier 1000002642 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @68(0) pass out quick on mvneta0.4091 inet proto udp from 192.168.3.1 port = bootps to any port = bootpc keep state label "allow access to DHCP server" ridentifier 1000002643 [ Evaluations: 232055 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @69(0) pass quick on mvneta0.4091 inet6 proto udp from fe80::/10 to fe80::/10 port = dhcpv6-client keep state label "allow access to DHCPv6 server" ridentifier 1000002651 [ Evaluations: 1558 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @70(0) pass quick on mvneta0.4091 inet6 proto udp from fe80::/10 to ff02::/16 port = dhcpv6-client keep state label "allow access to DHCPv6 server" ridentifier 1000002652 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @71(0) pass quick on mvneta0.4091 inet6 proto udp from fe80::/10 to ff02::/16 port = dhcpv6-server keep state label "allow access to DHCPv6 server" ridentifier 1000002653 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @72(0) pass quick on mvneta0.4091 inet6 proto udp from ff02::/16 to fe80::/10 port = dhcpv6-server keep state label "allow access to DHCPv6 server" ridentifier 1000002654 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @73(0) block drop in log on ! mvneta0.20 inet from 192.168.20.0/24 to any ridentifier 1000003670 [ Evaluations: 434960 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @74(0) block drop in log inet from 192.168.20.1 to any ridentifier 1000003670 [ Evaluations: 201551 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @75(0) block drop in log on mvneta0.20 inet6 from fe80::251:82ff:fe11:2200 to any ridentifier 1000003670 [ Evaluations: 202905 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @76(0) pass in quick on mvneta0.20 inet proto udp from any port = bootpc to 255.255.255.255 port = bootps keep state label "allow access to DHCP server" ridentifier 1000003691 [ Evaluations: 49853 Packets: 12 Bytes: 3964 States: 1 ] [ Inserted: pid 17662 State Creations: 1 ] @77(0) pass in quick on mvneta0.20 inet proto udp from any port = bootpc to 192.168.20.1 port = bootps keep state label "allow access to DHCP server" ridentifier 1000003692 [ Evaluations: 29 Packets: 58 Bytes: 18970 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @78(0) pass out quick on mvneta0.20 inet proto udp from 192.168.20.1 port = bootps to any port = bootpc keep state label "allow access to DHCP server" ridentifier 1000003693 [ Evaluations: 260059 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @79(0) block drop in log on ! mvneta0.30 inet from 192.168.30.0/24 to any ridentifier 1000004720 [ Evaluations: 434739 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @80(0) block drop in log inet from 192.168.30.1 to any ridentifier 1000004720 [ Evaluations: 201313 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @81(0) block drop in log on mvneta0.30 inet6 from fe80::251:82ff:fe11:2200 to any ridentifier 1000004720 [ Evaluations: 202868 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @82(0) pass in quick on mvneta0.30 inet proto udp from any port = bootpc to 255.255.255.255 port = bootps keep state label "allow access to DHCP server" ridentifier 1000004741 [ Evaluations: 2 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @83(0) pass in quick on mvneta0.30 inet proto udp from any port = bootpc to 192.168.30.1 port = bootps keep state label "allow access to DHCP server" ridentifier 1000004742 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @84(0) pass out quick on mvneta0.30 inet proto udp from 192.168.30.1 port = bootps to any port = bootpc keep state label "allow access to DHCP server" ridentifier 1000004743 [ Evaluations: 232056 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @85(0) block drop in log on ! mvneta0.40 inet from 192.168.40.0/24 to any ridentifier 1000005770 [ Evaluations: 434923 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @86(0) block drop in log inet from 192.168.40.1 to any ridentifier 1000005770 [ Evaluations: 235281 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @87(0) block drop in log on mvneta0.40 inet6 from fe80::251:82ff:fe11:2200 to any ridentifier 1000005770 [ Evaluations: 202868 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @88(0) pass in quick on mvneta0.40 inet proto udp from any port = bootpc to 255.255.255.255 port = bootps keep state label "allow access to DHCP server" ridentifier 1000005791 [ Evaluations: 10151 Packets: 8 Bytes: 2781 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @89(0) pass in quick on mvneta0.40 inet proto udp from any port = bootpc to 192.168.40.1 port = bootps keep state label "allow access to DHCP server" ridentifier 1000005792 [ Evaluations: 109 Packets: 218 Bytes: 72259 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @90(0) pass out quick on mvneta0.40 inet proto udp from 192.168.40.1 port = bootps to any port = bootpc keep state label "allow access to DHCP server" ridentifier 1000005793 [ Evaluations: 235704 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @91(0) block drop in log on ! mvneta0.50 inet from 192.168.50.0/24 to any ridentifier 1000006820 [ Evaluations: 434611 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @92(0) block drop in log inet from 192.168.50.1 to any ridentifier 1000006820 [ Evaluations: 217925 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @93(0) block drop in log on mvneta0.50 inet6 from fe80::251:82ff:fe11:2200 to any ridentifier 1000006820 [ Evaluations: 202757 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @94(0) pass in quick on mvneta0.50 inet proto udp from any port = bootpc to 255.255.255.255 port = bootps keep state label "allow access to DHCP server" ridentifier 1000006841 [ Evaluations: 121660 Packets: 20 Bytes: 6560 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @95(0) pass in quick on mvneta0.50 inet proto udp from any port = bootpc to 192.168.50.1 port = bootps keep state label "allow access to DHCP server" ridentifier 1000006842 [ Evaluations: 21 Packets: 42 Bytes: 13776 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @96(0) pass out quick on mvneta0.50 inet proto udp from 192.168.50.1 port = bootps to any port = bootpc keep state label "allow access to DHCP server" ridentifier 1000006843 [ Evaluations: 250213 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @97(0) block drop in log on ! ovpnc1 inet from 10.22.142.0/24 to any ridentifier 1000007870 [ Evaluations: 431178 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @98(0) block drop in log inet from 10.22.142.2 to any ridentifier 1000007870 [ Evaluations: 206114 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @99(0) block drop in log on ovpnc1 inet6 from fe80::251:82ff:fe11:2200 to any ridentifier 1000007870 [ Evaluations: 201363 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @100(0) block drop in log on ! ovpnc3 inet from 10.25.142.0/24 to any ridentifier 1000008920 [ Evaluations: 201363 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @101(0) block drop in log inet from 10.25.142.40 to any ridentifier 1000008920 [ Evaluations: 199819 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @102(0) block drop in log on ovpnc3 inet6 from fe80::251:82ff:fe11:2200 to any ridentifier 1000008920 [ Evaluations: 201361 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @103(0) block drop in log on ! ovpnc5 inet from 10.17.14.0/24 to any ridentifier 1000009970 [ Evaluations: 201361 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @104(0) block drop in log inet from 10.17.14.2 to any ridentifier 1000009970 [ Evaluations: 199819 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @105(0) block drop in log on ovpnc5 inet6 from fe80::251:82ff:fe11:2200 to any ridentifier 1000009970 [ Evaluations: 201361 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @106(0) block drop in log on ! ovpns2 inet from 192.168.200.0/24 to any ridentifier 1000011020 [ Evaluations: 204930 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @107(0) block drop in log inet from 192.168.200.1 to any ridentifier 1000011020 [ Evaluations: 201159 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @108(0) block drop in log on ovpns2 inet6 from fe80::251:82ff:fe11:2200 to any ridentifier 1000011020 [ Evaluations: 202716 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @109(0) block drop in log on ! mvneta0.60 inet from 192.168.60.0/24 to any ridentifier 1000012070 [ Evaluations: 202716 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @110(0) block drop in log inet from 192.168.60.1 to any ridentifier 1000012070 [ Evaluations: 201159 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @111(0) block drop in log on mvneta0.60 inet6 from fe80::251:82ff:fe11:2200 to any ridentifier 1000012070 [ Evaluations: 202716 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @112(0) pass in quick on mvneta0.60 inet proto udp from any port = bootpc to 255.255.255.255 port = bootps keep state label "allow access to DHCP server" ridentifier 1000012091 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @113(0) pass in quick on mvneta0.60 inet proto udp from any port = bootpc to 192.168.60.1 port = bootps keep state label "allow access to DHCP server" ridentifier 1000012092 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @114(0) pass out quick on mvneta0.60 inet proto udp from 192.168.60.1 port = bootps to any port = bootpc keep state label "allow access to DHCP server" ridentifier 1000012093 [ Evaluations: 232055 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @115(0) pass in on lo0 inet all flags S/SA keep state label "pass IPv4 loopback" ridentifier 1000013161 [ Evaluations: 434771 Packets: 62738 Bytes: 7882039 States: 4 ] [ Inserted: pid 17662 State Creations: 9 ] @116(0) pass out on lo0 inet all flags S/SA keep state label "pass IPv4 loopback" ridentifier 1000013162 [ Evaluations: 8459 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @117(0) pass in on lo0 inet6 all flags S/SA keep state label "pass IPv6 loopback" ridentifier 1000013163 [ Evaluations: 9609 Packets: 3949 Bytes: 938757 States: 5 ] [ Inserted: pid 17662 State Creations: 12 ] @118(0) pass out on lo0 inet6 all flags S/SA keep state label "pass IPv6 loopback" ridentifier 1000013164 [ Evaluations: 7829 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @119(0) pass out inet all flags S/SA keep state allow-opts label "let out anything IPv4 from firewall host itself" ridentifier 1000013165 [ Evaluations: 433621 Packets: 1764296 Bytes: 254235625 States: 202 ] [ Inserted: pid 17662 State Creations: 322 ] @120(0) pass out inet6 all flags S/SA keep state allow-opts label "let out anything IPv6 from firewall host itself" ridentifier 1000013166 [ Evaluations: 232055 Packets: 3959 Bytes: 939517 States: 5 ] [ Inserted: pid 17662 State Creations: 12 ] @121(0) pass out route-to (mvneta0.4090 192.168.2.1) inet from 192.168.2.2 to ! 192.168.2.0/24 flags S/SA keep state allow-opts label "let out anything from firewall host itself" ridentifier 1000013261 [ Evaluations: 232055 Packets: 11114485 Bytes: 1175683061 States: 511 ] [ Inserted: pid 17662 State Creations: 1125 ] @122(0) pass out route-to (ovpnc1 10.22.142.1) inet from 10.22.142.2 to ! 10.22.142.0/24 flags S/SA keep state allow-opts label "let out anything from firewall host itself" ridentifier 1000013262 [ Evaluations: 228690 Packets: 1994232 Bytes: 2124402885 States: 2 ] [ Inserted: pid 17662 State Creations: 2 ] @123(0) pass out route-to (ovpnc3 10.25.142.1) inet from 10.25.142.40 to ! 10.25.142.0/24 flags S/SA keep state allow-opts label "let out anything from firewall host itself" ridentifier 1000013263 [ Evaluations: 228690 Packets: 2591563 Bytes: 2044497453 States: 269 ] [ Inserted: pid 17662 State Creations: 560 ] @124(0) pass out route-to (ovpnc5 10.17.14.1) inet from 10.17.14.2 to ! 10.17.14.0/24 flags S/SA keep state allow-opts label "let out anything from firewall host itself" ridentifier 1000013264 [ Evaluations: 228690 Packets: 526901 Bytes: 421085105 States: 53 ] [ Inserted: pid 17662 State Creations: 58 ] @125(0) pass out route-to (ovpns2 192.168.200.1) inet from 192.168.200.1 to ! 192.168.200.0/24 flags S/SA keep state allow-opts label "let out anything from firewall host itself" ridentifier 1000013265 [ Evaluations: 230903 Packets: 127737 Bytes: 3704373 States: 1 ] [ Inserted: pid 17662 State Creations: 19 ] @126(0) pass in inet all flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost" ridentifier 1000013581 tagged PFREFLECT [ Evaluations: 433619 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @127(0) anchor "userrules/*" all [ Evaluations: 435357 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @128(0) pass quick on mvneta0.20 inet proto icmp from any to icmp-type echoreq keep state label "USER_RULE: pfB_DNSBL_Ping auto rule" ridentifier 1770001239 [ Evaluations: 434771 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @129(0) pass quick on ovpns2 inet proto icmp from any to icmp-type echoreq keep state label "USER_RULE: pfB_DNSBL_Ping auto rule" ridentifier 1770001239 [ Evaluations: 384936 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @130(0) pass quick on mvneta0.20 inet6 proto ipv6-icmp from any to icmp6-type echoreq keep state label "USER_RULE: pfB_DNSBL_Ping auto rule" ridentifier 1770001239 [ Evaluations: 434720 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @131(0) pass quick on ovpns2 inet6 proto ipv6-icmp from any to icmp6-type echoreq keep state label "USER_RULE: pfB_DNSBL_Ping auto rule" ridentifier 1770001239 [ Evaluations: 384936 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @132(0) pass quick on mvneta0.20 inet proto tcp from any to port = http flags S/SA keep state label "USER_RULE: pfB_DNSBL_Permit auto rule" ridentifier 1770001466 [ Evaluations: 434557 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @133(0) pass quick on mvneta0.20 inet proto tcp from any to port = https flags S/SA keep state label "USER_RULE: pfB_DNSBL_Permit auto rule" ridentifier 1770001466 [ Evaluations: 12016 Packets: 178685 Bytes: 35923099 States: 477 ] [ Inserted: pid 17662 State Creations: 477 ] @134(0) pass quick on mvneta0.20 inet proto udp from any to port = http keep state label "USER_RULE: pfB_DNSBL_Permit auto rule" ridentifier 1770001466 [ Evaluations: 28151 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @135(0) pass quick on mvneta0.20 inet proto udp from any to port = https keep state label "USER_RULE: pfB_DNSBL_Permit auto rule" ridentifier 1770001466 [ Evaluations: 3 Packets: 16 Bytes: 20448 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @136(0) pass quick on ovpns2 inet proto tcp from any to port = http flags S/SA keep state label "USER_RULE: pfB_DNSBL_Permit auto rule" ridentifier 1770001466 [ Evaluations: 385082 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @137(0) pass quick on ovpns2 inet proto tcp from any to port = https flags S/SA keep state label "USER_RULE: pfB_DNSBL_Permit auto rule" ridentifier 1770001466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @138(0) pass quick on ovpns2 inet proto udp from any to port = http keep state label "USER_RULE: pfB_DNSBL_Permit auto rule" ridentifier 1770001466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @139(0) pass quick on ovpns2 inet proto udp from any to port = https keep state label "USER_RULE: pfB_DNSBL_Permit auto rule" ridentifier 1770001466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @140(0) pass quick on mvneta0.20 inet6 proto tcp from any to port = http flags S/SA keep state label "USER_RULE: pfB_DNSBL_Permit auto rule" ridentifier 1770001466 [ Evaluations: 385103 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @141(0) pass quick on mvneta0.20 inet6 proto tcp from any to port = https flags S/SA keep state label "USER_RULE: pfB_DNSBL_Permit auto rule" ridentifier 1770001466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @142(0) pass quick on mvneta0.20 inet6 proto udp from any to port = http keep state label "USER_RULE: pfB_DNSBL_Permit auto rule" ridentifier 1770001466 [ Evaluations: 21 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @143(0) pass quick on mvneta0.20 inet6 proto udp from any to port = https keep state label "USER_RULE: pfB_DNSBL_Permit auto rule" ridentifier 1770001466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @144(0) pass quick on ovpns2 inet6 proto tcp from any to port = http flags S/SA keep state label "USER_RULE: pfB_DNSBL_Permit auto rule" ridentifier 1770001466 [ Evaluations: 384936 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @145(0) pass quick on ovpns2 inet6 proto tcp from any to port = https flags S/SA keep state label "USER_RULE: pfB_DNSBL_Permit auto rule" ridentifier 1770001466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @146(0) pass quick on ovpns2 inet6 proto udp from any to port = http keep state label "USER_RULE: pfB_DNSBL_Permit auto rule" ridentifier 1770001466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @147(0) pass quick on ovpns2 inet6 proto udp from any to port = https keep state label "USER_RULE: pfB_DNSBL_Permit auto rule" ridentifier 1770001466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @148(0) pass in quick on openvpn inet proto tcp from port = 48196 to any flags S/SA keep state label "USER_RULE: OpenVPN: Pass outbound Torrent Traffic" ridentifier 1634745174 [ Evaluations: 422754 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @149(0) pass in quick on openvpn inet proto udp from port = 48196 to any keep state label "USER_RULE: OpenVPN: Pass outbound Torrent Traffic" ridentifier 1634745174 [ Evaluations: 1002 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @150(0) pass in quick on openvpn inet proto tcp from any to port = 48196 flags S/SA keep state label "USER_RULE: NAT OpenVPN: Port forward Torrent Traffice" ridentifier 1625606725 [ Evaluations: 16846 Packets: 167174 Bytes: 9027220 States: 99 ] [ Inserted: pid 17662 State Creations: 99 ] @151(0) pass in quick on openvpn inet proto udp from any to port = 48196 keep state label "USER_RULE: NAT OpenVPN: Port forward Torrent Traffice" ridentifier 1625606725 [ Evaluations: 1002 Packets: 2084 Bytes: 242090 States: 0 ] [ Inserted: pid 17662 State Creations: 4 ] @152(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to 127.0.0.1 port = domain flags S/SA keep state label "USER_RULE: NAT RW_VPN: DNS redirect" ridentifier 1634073475 [ Evaluations: 131 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @153(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to 127.0.0.1 port = domain keep state label "USER_RULE: NAT RW_VPN: DNS redirect" ridentifier 1634073475 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @154(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to 127.0.0.1 port = ntp flags S/SA keep state label "USER_RULE: NAT RW_VPN: NTP redirect" ridentifier 1634073489 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @155(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to 127.0.0.1 port = ntp keep state label "USER_RULE: NAT RW_VPN: NTP redirect" ridentifier 1634073489 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @156(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = domain flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @157(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port 5353:5354 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @158(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = ntp flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @159(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = ftp flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @160(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = ssh flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @161(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = snmp flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @162(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = http flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @163(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = https flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @164(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = printer flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @165(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = svrloc flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @166(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = ipp flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @167(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port 8080:8081 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @168(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 8880 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @169(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 8843 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @170(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 10001 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @171(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = commplex-link flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @172(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 5900 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @173(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 9000 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @174(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = rdp flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @175(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port 49152:65535 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @176(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 17500 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @177(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port 8008:8009 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @178(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = ssdp flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @179(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 5223 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @180(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 32400 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @181(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 4886 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @182(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = netbios-ns flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @183(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = osu-nms flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @184(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 6363 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @185(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port 32410:32414 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @186(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 32469 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @187(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 37248 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @188(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 37302 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @189(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 37306 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @190(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port 48000:49000 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @191(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 8324 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @192(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 3005 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @193(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 3702 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @194(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 5335 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @195(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 8123 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @196(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 8080 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @197(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 8020 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @198(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 32500 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @199(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 30011 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @200(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = afs3-fileserver flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @201(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port 319:320 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @202(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 41722 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @203(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 35465 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @204(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 37682 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @205(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 9080 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @206(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port 5452:5453 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @207(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 37245 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @208(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port 45000:48000 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @209(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = netbios-dgm flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @210(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 7070 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @211(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 9050 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @212(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 10665 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @213(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = domain keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @214(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port 5353:5354 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @215(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = ntp keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @216(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = ftp keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @217(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = ssh keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @218(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = snmp keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @219(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = http keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @220(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = https keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @221(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = printer keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @222(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = svrloc keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @223(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = ipp keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @224(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port 8080:8081 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @225(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 8880 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @226(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 8843 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @227(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 10001 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @228(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = commplex-link keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @229(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 5900 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @230(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 9000 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @231(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 3389 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @232(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port 49152:65535 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @233(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 17500 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @234(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port 8008:8009 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @235(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = ssdp keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @236(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 5223 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @237(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 32400 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @238(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 4886 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @239(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = netbios-ns keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @240(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = osu-nms keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @241(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 6363 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @242(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port 32410:32414 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @243(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 32469 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @244(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 37248 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @245(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 37302 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @246(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 37306 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @247(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port 48000:49000 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @248(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 8324 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @249(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 3005 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @250(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 3702 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @251(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 5335 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @252(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 8123 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @253(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 8080 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @254(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 8020 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @255(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 32500 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @256(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 30011 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @257(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = afs3-fileserver keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @258(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port 319:320 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @259(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 41722 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @260(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 35465 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @261(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 37682 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @262(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 9080 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @263(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port 5452:5453 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @264(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 37245 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @265(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port 45000:48000 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @266(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = netbios-dgm keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @267(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 7070 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @268(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 9050 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @269(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 10665 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1634225306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @270(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = ftp flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @271(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = ssh flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @272(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = http flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @273(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = https flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @274(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = submission flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @275(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = imaps flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @276(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = xmpp-client flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @277(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 8080 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @278(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = smtps flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @279(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = nntp flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @280(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = imap flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @281(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = ircd flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @282(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = ircs-u flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @283(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 8443 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @284(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 8843 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @285(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port 40000:65535 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @286(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = mdns flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @287(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 8886 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @288(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = ssdp flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @289(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 5228 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @290(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 5223 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @291(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 8883 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @292(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port 4000:4001 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @293(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 3478 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @294(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 57673 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @295(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 8787 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @296(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port 8801:8810 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @297(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 3479 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @298(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = isakmp flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @299(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = sae-urn flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @300(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port 5000:5999 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @301(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 7483 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @302(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 33935 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @303(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 16716 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @304(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 34935 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @305(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 26950 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @306(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 2418 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @307(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 9410 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @308(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 8888 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @309(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 19443 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @310(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 4501 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @311(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 6473 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @312(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 19305 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @313(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 38721 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @314(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 32393 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @315(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 19302 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @316(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 34600 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @317(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = time flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @318(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 32400 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @319(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 4070 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @320(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 35985 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @321(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 8123 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @322(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 27474 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @323(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 28415 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @324(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 35120 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @325(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = git flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @326(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 34992 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @327(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port 16384:16386 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @328(0) pass in quick on openvpn inet proto tcp from 192.168.200.0/24 to port = 8130 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @329(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = ftp keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @330(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = ssh keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @331(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = http keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @332(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = https keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @333(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = submission keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @334(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = imaps keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @335(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = xmpp-client keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @336(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 8080 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @337(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = smtps keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @338(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = nntp keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @339(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = imap keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @340(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 6667 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @341(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 6697 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @342(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 8443 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @343(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 8843 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @344(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port 40000:65535 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @345(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = mdns keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @346(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 8886 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @347(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = ssdp keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @348(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 5228 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @349(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 5223 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @350(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 8883 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @351(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port 4000:4001 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @352(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 3478 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @353(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 57673 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @354(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 8787 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @355(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port 8801:8810 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @356(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 3479 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @357(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = isakmp keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @358(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = sae-urn keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @359(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port 5000:5999 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @360(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 7483 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @361(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 33935 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @362(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 16716 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @363(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 34935 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @364(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 26950 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @365(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 2418 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @366(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 9410 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @367(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 8888 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @368(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 19443 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @369(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 4501 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @370(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 6473 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @371(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 19305 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @372(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 38721 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @373(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 32393 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @374(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 19302 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @375(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 34600 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @376(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = time keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @377(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 32400 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @378(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 4070 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @379(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 35985 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @380(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 8123 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @381(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 27474 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @382(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 28415 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @383(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 35120 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @384(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = git keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @385(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 34992 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @386(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port 16384:16386 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @387(0) pass in quick on openvpn inet proto udp from 192.168.200.0/24 to port = 8130 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277561 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @388(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = ftp flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @389(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = ssh flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @390(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = http flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @391(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = https flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @392(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = submission flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @393(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = imaps flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @394(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = xmpp-client flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @395(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 8080 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @396(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = smtps flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @397(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = nntp flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @398(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = imap flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @399(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = ircd flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @400(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = ircs-u flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @401(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 8443 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @402(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 8843 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @403(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port 40000:65535 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @404(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = mdns flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @405(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 8886 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @406(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = ssdp flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @407(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 5228 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @408(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 5223 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @409(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 8883 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @410(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port 4000:4001 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @411(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 3478 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @412(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 57673 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @413(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 8787 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @414(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port 8801:8810 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @415(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 3479 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @416(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = isakmp flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @417(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = sae-urn flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @418(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port 5000:5999 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @419(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 7483 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @420(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 33935 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @421(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 16716 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @422(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 34935 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @423(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 26950 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @424(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 2418 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @425(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 9410 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @426(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 8888 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @427(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 19443 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @428(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 4501 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @429(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 6473 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @430(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 19305 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @431(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 38721 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @432(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 32393 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @433(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 19302 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @434(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 34600 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @435(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = time flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @436(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 32400 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @437(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 4070 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @438(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 35985 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @439(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 8123 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @440(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 27474 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @441(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 28415 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @442(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 35120 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @443(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = git flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @444(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 34992 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @445(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port 16384:16386 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @446(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 8130 flags S/SA keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @447(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = ftp keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @448(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = ssh keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @449(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = http keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @450(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = https keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @451(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = submission keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @452(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = imaps keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @453(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = xmpp-client keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @454(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 8080 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @455(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = smtps keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @456(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = nntp keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @457(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = imap keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @458(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 6667 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @459(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 6697 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @460(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 8443 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @461(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 8843 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @462(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port 40000:65535 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @463(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = mdns keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @464(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 8886 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @465(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = ssdp keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @466(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 5228 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @467(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 5223 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @468(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 8883 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @469(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port 4000:4001 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @470(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 3478 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @471(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 57673 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @472(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 8787 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @473(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port 8801:8810 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @474(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 3479 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @475(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = isakmp keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @476(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = sae-urn keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @477(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port 5000:5999 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @478(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 7483 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @479(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 33935 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @480(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 16716 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @481(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 34935 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @482(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 26950 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @483(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 2418 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @484(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 9410 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @485(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 8888 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @486(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 19443 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @487(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 4501 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @488(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 6473 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @489(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 19305 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @490(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 38721 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @491(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 32393 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @492(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 19302 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @493(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 34600 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @494(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = time keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @495(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 32400 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @496(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 4070 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @497(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 35985 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @498(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 8123 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @499(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 27474 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @500(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 28415 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @501(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 35120 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @502(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = git keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @503(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 34992 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @504(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port 16384:16386 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @505(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 8130 keep state label "USER_RULE: RW_VPN: Pass internet traffic through VPN Gateway" ridentifier 1591314789 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @506(0) pass in quick on openvpn inet proto udp from port = 48196 to keep state label "NEGATE_ROUTE: Negate policy routing for destination" ridentifier 10000001 [ Evaluations: 109 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @507(0) pass in quick on openvpn route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from port = 48196 to any keep state label "USER_RULE: VL50_NAS: Pass outbound torrent traffic connections" ridentifier 1636659639 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @508(0) pass in quick on mvneta0.4090 reply-to (mvneta0.4090 192.168.2.1) inet proto udp from any port = https to 192.168.2.2 keep state label "USER_RULE: WAN: Allow RW_VPN" ridentifier 1590264240 [ Evaluations: 317629 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @509(0) pass in quick on mvneta0.4090 reply-to (mvneta0.4090 192.168.2.1) inet proto udp from any to 192.168.2.2 port = https keep state label "USER_RULE: WAN: Allow RW_VPN" ridentifier 1633562245 [ Evaluations: 17 Packets: 1 Bytes: 1258 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @510(0) pass in quick on mvneta0.4090 reply-to (mvneta0.4090 192.168.2.1) inet proto tcp from any to port = 32400 flags S/SA keep state label "USER_RULE: NAT Plex port forward" ridentifier 1624950119 [ Evaluations: 1568 Packets: 185 Bytes: 58218 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @511(0) pass in quick on mvneta0.4090 reply-to (mvneta0.4090 192.168.2.1) inet proto tcp from any to port = ssh flags S/SA keep state label "USER_RULE: NAT QNAP port forward (SSH)" ridentifier 1621270566 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @512(0) block drop in log quick on mvneta0.4090 reply-to (mvneta0.4090 192.168.2.1) inet all label "USER_RULE: WAN: default block IPv4" ridentifier 1588959321 [ Evaluations: 1444 Packets: 1444 Bytes: 93728 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @513(0) block drop in quick on mvneta0.4090 inet6 all label "USER_RULE: WAN: default block IPv6" ridentifier 1588959335 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @514(0) pass in quick on mvneta0.4091 inet proto tcp from to 192.168.3.1 port = https flags S/SA keep state label "USER_RULE: LAN: Allow remote admin access to LAN subnet" ridentifier 1619187355 [ Evaluations: 229706 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @515(0) pass in quick on mvneta0.4091 inet proto tcp from to 192.168.3.1 port = ssh flags S/SA keep state label "USER_RULE: LAN: Allow remote admin access to LAN subnet" ridentifier 1619187355 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @516(0) pass in quick on mvneta0.4091 inet proto tcp from to 192.168.3.1 port = 8080 flags S/SA keep state label "USER_RULE: LAN: Allow remote admin access to LAN subnet" ridentifier 1619187355 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @517(0) pass in quick on mvneta0.4091 inet proto tcp from to 192.168.3.1 port = 8112 flags S/SA keep state label "USER_RULE: LAN: Allow remote admin access to LAN subnet" ridentifier 1619187355 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @518(0) pass in quick on mvneta0.4091 inet proto tcp from to 192.168.3.1 port = 6363 flags S/SA keep state label "USER_RULE: LAN: Allow remote admin access to LAN subnet" ridentifier 1619187355 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @519(0) pass in quick on mvneta0.4091 inet proto tcp from 192.168.3.0/24 to 192.168.3.1 port = https flags S/SA keep state label "USER_RULE: LAN: Antilockout" ridentifier 1588959445 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @520(0) pass in quick on mvneta0.4091 inet proto tcp from 192.168.3.0/24 to 192.168.3.1 port = ssh flags S/SA keep state label "USER_RULE: LAN: Antilockout" ridentifier 1588959445 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @521(0) pass in quick on mvneta0.4091 inet proto tcp from 192.168.3.0/24 to 192.168.3.1 port = 8080 flags S/SA keep state label "USER_RULE: LAN: Antilockout" ridentifier 1588959445 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @522(0) pass in quick on mvneta0.4091 inet proto tcp from 192.168.3.0/24 to 192.168.3.1 port = 8112 flags S/SA keep state label "USER_RULE: LAN: Antilockout" ridentifier 1588959445 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @523(0) pass in quick on mvneta0.4091 inet proto tcp from 192.168.3.0/24 to 192.168.3.1 port = 6363 flags S/SA keep state label "USER_RULE: LAN: Antilockout" ridentifier 1588959445 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @524(0) pass in quick on mvneta0.4091 inet proto udp from 192.168.3.0/24 to 192.168.3.1 port = https keep state label "USER_RULE: LAN: Antilockout" ridentifier 1588959445 [ Evaluations: 3 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @525(0) pass in quick on mvneta0.4091 inet proto udp from 192.168.3.0/24 to 192.168.3.1 port = ssh keep state label "USER_RULE: LAN: Antilockout" ridentifier 1588959445 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @526(0) pass in quick on mvneta0.4091 inet proto udp from 192.168.3.0/24 to 192.168.3.1 port = 8080 keep state label "USER_RULE: LAN: Antilockout" ridentifier 1588959445 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @527(0) pass in quick on mvneta0.4091 inet proto udp from 192.168.3.0/24 to 192.168.3.1 port = 8112 keep state label "USER_RULE: LAN: Antilockout" ridentifier 1588959445 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @528(0) pass in quick on mvneta0.4091 inet proto udp from 192.168.3.0/24 to 192.168.3.1 port = 6363 keep state label "USER_RULE: LAN: Antilockout" ridentifier 1588959445 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @529(0) pass in quick on mvneta0.4091 inet proto igmp from 192.168.3.0/24 to 224.0.0.1 keep state label "USER_RULE: LAN: Pass IGMP multicast" ridentifier 1589088442 [ Evaluations: 3 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @530(0) pass in quick on mvneta0.4091 inet proto icmp from 192.168.3.0/24 to any keep state label "USER_RULE: LAN: Pass ICMP" ridentifier 1588959489 [ Evaluations: 2 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @531(0) pass in quick on mvneta0.4091 inet6 proto ipv6-icmp from fe80::1:1 to ff02::1 keep state label "USER_RULE: Easy Rule: Passed from Firewall Log View" ridentifier 1589053834 [ Evaluations: 2 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @532(0) pass in quick on mvneta0.4091 inet6 proto ipv6-icmp all icmp6-type echoreq keep state label "USER_RULE: Pass ping on IPv6" ridentifier 1589005856 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @533(0) pass in quick on mvneta0.4091 inet proto tcp from 192.168.3.0/24 to 127.0.0.1 port = ntp flags S/SA keep state label "USER_RULE: NAT LAN: NTP redirect" ridentifier 1624666893 [ Evaluations: 2 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @534(0) pass in quick on mvneta0.4091 inet proto udp from 192.168.3.0/24 to 127.0.0.1 port = ntp keep state label "USER_RULE: NAT LAN: NTP redirect" ridentifier 1624666893 [ Evaluations: 2 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @535(0) pass in quick on mvneta0.4091 inet proto tcp from 192.168.3.0/24 to 127.0.0.1 port = domain flags S/SA keep state label "USER_RULE: NAT LAN: DNS redirect" ridentifier 1629419341 [ Evaluations: 2 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @536(0) pass in quick on mvneta0.4091 inet proto udp from 192.168.3.0/24 to 127.0.0.1 port = domain keep state label "USER_RULE: NAT LAN: DNS redirect" ridentifier 1629419341 [ Evaluations: 2 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @537(0) pass in quick on mvneta0.4091 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from to ! flags S/SA keep state allow-opts label "USER_RULE: LAN: Pass OpenWRT traffic" ridentifier 1624662714 [ Evaluations: 2 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @538(0) pass in quick on mvneta0.4091 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from to ! keep state allow-opts label "USER_RULE: LAN: Pass OpenWRT traffic" ridentifier 1624662714 [ Evaluations: 2 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @539(0) pass in quick on mvneta0.4091 inet proto tcp all flags S/SA keep state allow-opts label "USER_RULE: LAN: Pass All" ridentifier 1588959550 [ Evaluations: 2 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @540(0) pass in quick on mvneta0.4091 inet proto udp all keep state allow-opts label "USER_RULE: LAN: Pass All" ridentifier 1588959550 [ Evaluations: 2 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @541(0) block return in log quick on mvneta0.4091 inet all label "USER_RULE: LAN: Default reject IPv4" ridentifier 1588959598 [ Evaluations: 2 Packets: 2 Bytes: 96 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @542(0) block return in quick on mvneta0.4091 inet6 all label "USER_RULE: LAN: Default reject IPv6" ridentifier 1588959618 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @543(0) block return in log quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to label "USER_RULE: VL20_VPN: VL20_VPN: Reject pfBlockerNG PRI1" ridentifier 1590817502 [ Evaluations: 229700 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @544(0) block return in log quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to label "USER_RULE: VL20_VPN: VL20_VPN: Reject pfBlockerNG PRI1" ridentifier 1590817502 [ Evaluations: 28196 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @545(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to 192.168.20.1 port = https flags S/SA keep state label "USER_RULE: VL20_VPN: Antilockout" ridentifier 1588963581 [ Evaluations: 37596 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @546(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to 192.168.20.1 port = ssh flags S/SA keep state label "USER_RULE: VL20_VPN: Antilockout" ridentifier 1588963581 [ Evaluations: 6 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @547(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to 192.168.20.1 port = 8080 flags S/SA keep state label "USER_RULE: VL20_VPN: Antilockout" ridentifier 1588963581 [ Evaluations: 6 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @548(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to 192.168.20.1 port = 8112 flags S/SA keep state label "USER_RULE: VL20_VPN: Antilockout" ridentifier 1588963581 [ Evaluations: 6 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @549(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to 192.168.20.1 port = 6363 flags S/SA keep state label "USER_RULE: VL20_VPN: Antilockout" ridentifier 1588963581 [ Evaluations: 6 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @550(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to 192.168.20.1 port = https keep state label "USER_RULE: VL20_VPN: Antilockout" ridentifier 1588963581 [ Evaluations: 28202 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @551(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to 192.168.20.1 port = ssh keep state label "USER_RULE: VL20_VPN: Antilockout" ridentifier 1588963581 [ Evaluations: 24842 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @552(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to 192.168.20.1 port = 8080 keep state label "USER_RULE: VL20_VPN: Antilockout" ridentifier 1588963581 [ Evaluations: 24842 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @553(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to 192.168.20.1 port = 8112 keep state label "USER_RULE: VL20_VPN: Antilockout" ridentifier 1588963581 [ Evaluations: 24842 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @554(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to 192.168.20.1 port = 6363 keep state label "USER_RULE: VL20_VPN: Antilockout" ridentifier 1588963581 [ Evaluations: 24842 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @555(0) pass in quick on mvneta0.20 inet proto icmp from 192.168.20.0/24 to any icmp-type echoreq keep state label "USER_RULE: VL20_VPN: Allow ICMP" ridentifier 1588963646 [ Evaluations: 37596 Packets: 389 Bytes: 521880 States: 2 ] [ Inserted: pid 17662 State Creations: 30 ] @556(0) pass in quick on mvneta0.20 inet proto igmp from 192.168.20.0/24 to keep state label "USER_RULE: VL20_VPN: Allow local IGMP" ridentifier 1590546958 [ Evaluations: 37544 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 1 ] @557(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to 127.0.0.1 port = ntp keep state label "USER_RULE: NAT VL20_VPN NTP redirect" ridentifier 1588964412 [ Evaluations: 37401 Packets: 649 Bytes: 49408 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @558(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to 127.0.0.1 port = domain flags S/SA keep state label "USER_RULE: NAT VL20_VPN: DNS redirect" ridentifier 1588964470 [ Evaluations: 9408 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @559(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to 127.0.0.1 port = domain keep state label "USER_RULE: NAT VL20_VPN: DNS redirect" ridentifier 1588964470 [ Evaluations: 8 Packets: 16 Bytes: 2242 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @560(0) pass in quick on mvneta0.20 inet6 proto udp from any to port = mdns keep state label "USER_RULE: VL20_VPN: Pass IPv6 mDNS" ridentifier 1590547053 [ Evaluations: 37275 Packets: 328 Bytes: 104125 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @561(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = ftp flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 37254 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @562(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = ssh flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 1 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @563(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = http flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 1 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @564(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = https flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 1 Packets: 50 Bytes: 27317 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @565(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = submission flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @566(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = imaps flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @567(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = xmpp-client flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @568(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 8080 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @569(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = smtps flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @570(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = nntp flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @571(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = imap flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @572(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = ircd flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @573(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = ircs-u flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @574(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 8443 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @575(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 8843 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @576(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port 40000:65535 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @577(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = mdns flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @578(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 8886 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @579(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = ssdp flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @580(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 5228 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @581(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 5223 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @582(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 8883 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @583(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port 4000:4001 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @584(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 3478 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @585(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 57673 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @586(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 8787 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @587(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port 8801:8810 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @588(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 3479 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @589(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = isakmp flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @590(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = sae-urn flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @591(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port 5000:5999 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @592(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 7483 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @593(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 33935 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @594(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 16716 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @595(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 34935 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @596(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 26950 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @597(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 2418 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @598(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 9410 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @599(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 8888 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @600(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 19443 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @601(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 4501 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @602(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 6473 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @603(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 19305 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @604(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 38721 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @605(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 32393 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @606(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 19302 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @607(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 34600 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @608(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = time flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @609(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 32400 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @610(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 4070 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @611(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 35985 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @612(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 8123 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @613(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 27474 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @614(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 28415 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @615(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 35120 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @616(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = git flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @617(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 34992 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @618(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port 16384:16386 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @619(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 8130 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @620(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = ftp keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 27670 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @621(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = ssh keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 1 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @622(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = http keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 1 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @623(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = https keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 1 Packets: 91 Bytes: 55443 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @624(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = submission keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @625(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = imaps keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @626(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = xmpp-client keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @627(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 8080 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @628(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = smtps keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @629(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = nntp keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @630(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = imap keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @631(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 6667 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @632(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 6697 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @633(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 8443 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @634(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 8843 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @635(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port 40000:65535 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @636(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = mdns keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @637(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 8886 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @638(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = ssdp keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @639(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 5228 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @640(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 5223 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @641(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 8883 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @642(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port 4000:4001 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @643(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 3478 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @644(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 57673 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @645(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 8787 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @646(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port 8801:8810 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @647(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 3479 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @648(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = isakmp keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @649(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = sae-urn keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @650(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port 5000:5999 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @651(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 7483 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @652(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 33935 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @653(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 16716 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @654(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 34935 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @655(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 26950 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @656(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 2418 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @657(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 9410 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @658(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 8888 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @659(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 19443 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @660(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 4501 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @661(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 6473 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @662(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 19305 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @663(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 38721 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @664(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 32393 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @665(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 19302 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @666(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 34600 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @667(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = time keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @668(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 32400 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @669(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 4070 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @670(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 35985 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @671(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 8123 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @672(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 27474 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @673(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 28415 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @674(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 35120 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @675(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = git keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @676(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 34992 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @677(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port 16384:16386 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @678(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 8130 keep state label "USER_RULE: VL20_VPN: Pass Selective routing addresses throug..." ridentifier 1590547466 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @679(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = ftp flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 37068 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @680(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = ssh flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @681(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = http flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @682(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = https flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @683(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = submission flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @684(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = imaps flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @685(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = xmpp-client flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @686(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 8080 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @687(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = smtps flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @688(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = nntp flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @689(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = imap flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @690(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = ircd flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @691(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = ircs-u flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @692(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 8443 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @693(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 8843 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @694(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port 40000:65535 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @695(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = mdns flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @696(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 8886 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @697(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = ssdp flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @698(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 5228 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @699(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 5223 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @700(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 8883 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @701(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port 4000:4001 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @702(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 3478 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @703(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 57673 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @704(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 8787 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @705(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port 8801:8810 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @706(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 3479 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @707(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = isakmp flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @708(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = sae-urn flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @709(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port 5000:5999 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @710(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 7483 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @711(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 33935 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @712(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 16716 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @713(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 34935 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @714(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 26950 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @715(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 2418 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @716(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 9410 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @717(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 8888 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @718(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 19443 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @719(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 4501 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @720(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 6473 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @721(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 19305 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @722(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 38721 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @723(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 32393 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @724(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 19302 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @725(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 34600 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @726(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = time flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @727(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 32400 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @728(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 4070 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @729(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 35985 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @730(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 8123 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @731(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 27474 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @732(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 28415 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @733(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 35120 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @734(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = git flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @735(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 34992 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @736(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port 16384:16386 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @737(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 8130 flags S/SA keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @738(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = ftp keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 27669 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @739(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = ssh keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @740(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = http keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @741(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = https keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @742(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = submission keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @743(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = imaps keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @744(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = xmpp-client keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @745(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 8080 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @746(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = smtps keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @747(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = nntp keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @748(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = imap keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @749(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 6667 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @750(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 6697 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @751(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 8443 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @752(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 8843 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @753(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port 40000:65535 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @754(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = mdns keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @755(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 8886 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @756(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = ssdp keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @757(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 5228 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @758(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 5223 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @759(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 8883 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @760(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port 4000:4001 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @761(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 3478 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @762(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 57673 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @763(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 8787 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @764(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port 8801:8810 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @765(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 3479 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @766(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = isakmp keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @767(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = sae-urn keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @768(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port 5000:5999 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @769(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 7483 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @770(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 33935 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @771(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 16716 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @772(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 34935 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @773(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 26950 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @774(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 2418 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @775(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 9410 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @776(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 8888 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @777(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 19443 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @778(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 4501 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @779(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 6473 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @780(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 19305 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @781(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 38721 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @782(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 32393 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @783(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 19302 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @784(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 34600 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @785(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = time keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @786(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 32400 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @787(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 4070 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @788(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 35985 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @789(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 8123 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @790(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 27474 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @791(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 28415 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @792(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 35120 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @793(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = git keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @794(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 34992 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @795(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port 16384:16386 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @796(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 8130 keep state label "USER_RULE: VL20_VPN: Pass Netflix through default WAN" ridentifier 1605141955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @797(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to AWS servers (all ports)" ridentifier 1605023965 [ Evaluations: 37068 Packets: 188217 Bytes: 135713027 States: 7 ] [ Inserted: pid 17662 State Creations: 8 ] @798(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to keep state label "USER_RULE: VL20_VPN: Allow traffic to AWS servers (all ports)" ridentifier 1605023965 [ Evaluations: 27690 Packets: 3686 Bytes: 2026194 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @799(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = domain flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 35209 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @800(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port 5353:5354 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 417 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @801(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = ntp flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 417 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @802(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = ftp flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 417 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @803(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = ssh flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 417 Packets: 22841 Bytes: 4344746 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @804(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = snmp flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 414 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @805(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = http flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 414 Packets: 24 Bytes: 1440 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @806(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = https flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 410 Packets: 23652 Bytes: 7845265 States: 1 ] [ Inserted: pid 17662 State Creations: 1 ] @807(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = printer flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 372 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @808(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = svrloc flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 372 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @809(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = ipp flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 372 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @810(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port 8080:8081 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 372 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @811(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 8880 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 372 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @812(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 8843 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 372 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @813(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 10001 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 372 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @814(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = commplex-link flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 372 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @815(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 5900 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 372 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @816(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 9000 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 372 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @817(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = rdp flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 372 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @818(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port 49152:65535 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 372 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @819(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 17500 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 372 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @820(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port 8008:8009 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 372 Packets: 8691 Bytes: 1754457 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @821(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = ssdp flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 126 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @822(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 5223 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 126 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @823(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 32400 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 126 Packets: 996 Bytes: 177050 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @824(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 4886 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 111 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @825(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = netbios-ns flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 111 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @826(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = osu-nms flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 111 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @827(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 6363 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 111 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @828(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port 32410:32414 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 111 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @829(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 32469 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 111 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @830(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 37248 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 111 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @831(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 37302 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 111 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @832(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 37306 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 111 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @833(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port 48000:49000 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 111 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @834(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 8324 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 111 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @835(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 3005 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 111 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @836(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 3702 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 111 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @837(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 5335 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 111 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @838(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 8123 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 111 Packets: 1705 Bytes: 156960 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @839(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 8080 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 15 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @840(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 8020 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 15 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @841(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 32500 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 15 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @842(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 30011 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 15 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @843(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = afs3-fileserver flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 15 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @844(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port 319:320 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 15 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @845(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 41722 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 15 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @846(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 35465 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 15 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @847(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 37682 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 15 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @848(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 9080 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 15 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @849(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port 5452:5453 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 15 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @850(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 37245 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 15 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @851(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port 45000:48000 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 15 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @852(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = netbios-dgm flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 15 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @853(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 7070 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 15 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @854(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 9050 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 15 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @855(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 to port = 10665 flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 15 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @856(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = domain keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 27544 Packets: 73913 Bytes: 5886636 States: 116 ] [ Inserted: pid 17662 State Creations: 204 ] @857(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port 5353:5354 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 877 Packets: 2777 Bytes: 808956 States: 1 ] [ Inserted: pid 17662 State Creations: 1 ] @858(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = ntp keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 738 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @859(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = ftp keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 738 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @860(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = ssh keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 738 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @861(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = snmp keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 738 Packets: 6 Bytes: 510 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @862(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = http keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 735 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @863(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = https keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 735 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @864(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = printer keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 735 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @865(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = svrloc keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 735 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @866(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = ipp keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 735 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @867(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port 8080:8081 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 735 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @868(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 8880 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 735 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @869(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 8843 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 735 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @870(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 10001 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 735 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @871(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = commplex-link keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 735 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @872(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 5900 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 735 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @873(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 9000 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 735 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @874(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 3389 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 735 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @875(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port 49152:65535 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 735 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @876(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 17500 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 735 Packets: 414 Bytes: 139104 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @877(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port 8008:8009 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 611 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @878(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = ssdp keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 611 Packets: 1758 Bytes: 269380 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @879(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 5223 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 23 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @880(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 32400 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 23 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @881(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 4886 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 23 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @882(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = netbios-ns keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 23 Packets: 499 Bytes: 43152 States: 0 ] [ Inserted: pid 17662 State Creations: 1 ] @883(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = osu-nms keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 7 Packets: 14 Bytes: 448 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @884(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 6363 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 5 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @885(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port 32410:32414 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 5 Packets: 5 Bytes: 255 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @886(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 32469 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @887(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 37248 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @888(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 37302 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @889(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 37306 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @890(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port 48000:49000 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @891(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 8324 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @892(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 3005 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @893(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 3702 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @894(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 5335 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @895(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 8123 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @896(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 8080 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @897(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 8020 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @898(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 32500 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @899(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 30011 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @900(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = afs3-fileserver keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @901(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port 319:320 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @902(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 41722 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @903(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 35465 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @904(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 37682 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @905(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 9080 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @906(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port 5452:5453 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @907(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 37245 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @908(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port 45000:48000 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @909(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = netbios-dgm keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @910(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 7070 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @911(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 9050 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @912(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 to port = 10665 keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1588964026 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @913(0) pass in quick on mvneta0.20 inet proto tcp from 192.168.20.0/24 port 40000:65100 to flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1626731244 [ Evaluations: 15 Packets: 14 Bytes: 848 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @914(0) pass in quick on mvneta0.20 inet proto udp from 192.168.20.0/24 port 40000:65100 to keep state label "USER_RULE: VL20_VPN: Allow traffic to local subnets" ridentifier 1626731244 [ Evaluations: 8 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @915(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from to flags S/SA keep state label "USER_RULE: VL20_VPN: Allow Italy telecom VOIP traffic (all p..." ridentifier 1632929536 [ Evaluations: 8674 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @916(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from to keep state label "USER_RULE: VL20_VPN: Allow Italy telecom VOIP traffic (all p..." ridentifier 1632929536 [ Evaluations: 1812 Packets: 18156 Bytes: 2808289 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @917(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to flags S/SA keep state label "USER_RULE: VL20_VPN: Allow traffic to UPenn networks (all po..." ridentifier 1633020218 [ Evaluations: 8672 Packets: 1084 Bytes: 734401 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @918(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to keep state label "USER_RULE: VL20_VPN: Allow traffic to UPenn networks (all po..." ridentifier 1633020218 [ Evaluations: 1810 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @919(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = ftp flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 8641 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @920(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = ssh flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 6818 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @921(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = http flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 6818 Packets: 3758 Bytes: 2097400 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @922(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = https flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 6719 Packets: 1446724 Bytes: 1422954194 States: 76 ] [ Inserted: pid 17662 State Creations: 101 ] @923(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = submission flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 464 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @924(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = imaps flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 464 Packets: 109 Bytes: 20001 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @925(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = xmpp-client flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 462 Packets: 2130 Bytes: 194860 States: 1 ] [ Inserted: pid 17662 State Creations: 1 ] @926(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 8080 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 401 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @927(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = smtps flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 401 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @928(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = nntp flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 401 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @929(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = imap flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 401 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @930(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = ircd flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 401 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @931(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = ircs-u flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 401 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @932(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 8443 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 401 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @933(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 8843 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 401 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @934(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port 40000:65535 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 401 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @935(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = mdns flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 401 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @936(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 8886 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 401 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @937(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = ssdp flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 401 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @938(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 5228 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 401 Packets: 1365 Bytes: 375579 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @939(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 5223 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 394 Packets: 43 Bytes: 12446 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @940(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 8883 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 393 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @941(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port 4000:4001 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 393 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @942(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 3478 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 393 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @943(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 57673 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 393 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @944(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 8787 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 393 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @945(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port 8801:8810 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 393 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @946(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 3479 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 393 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @947(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = isakmp flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 393 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @948(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = sae-urn flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 393 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @949(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port 5000:5999 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 393 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @950(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 7483 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 393 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @951(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 33935 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 393 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @952(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 16716 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 393 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @953(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 34935 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 393 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @954(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 26950 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 393 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @955(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 2418 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 393 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @956(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 9410 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 393 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @957(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 8888 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 393 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @958(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 19443 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 393 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @959(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 4501 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 393 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @960(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 6473 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 393 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @961(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 19305 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 393 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @962(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 38721 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 393 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @963(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 32393 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 393 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @964(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 19302 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 393 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @965(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 34600 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 393 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @966(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = time flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 393 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @967(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 32400 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 393 Packets: 197 Bytes: 62260 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @968(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 4070 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 381 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @969(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 35985 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 381 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @970(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 8123 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 381 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @971(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 27474 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 381 Packets: 4 Bytes: 240 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @972(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 28415 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 380 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @973(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 35120 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 380 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @974(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = git flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 380 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @975(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 34992 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 380 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @976(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port 16384:16386 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 380 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @977(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.20.0/24 to ! port = 8130 flags S/SA keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 380 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @978(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = ftp keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 2190 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @979(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = ssh keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 1810 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @980(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = http keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 1810 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @981(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = https keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 1810 Packets: 2042870 Bytes: 2307999946 States: 2 ] [ Inserted: pid 17662 State Creations: 2 ] @982(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = submission keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 111 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @983(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = imaps keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 111 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @984(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = xmpp-client keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 111 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @985(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 8080 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 111 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @986(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = smtps keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 111 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @987(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = nntp keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 111 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @988(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = imap keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 111 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @989(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 6667 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 111 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @990(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 6697 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 111 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @991(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 8443 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 111 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @992(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 8843 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 111 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @993(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port 40000:65535 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 111 Packets: 20 Bytes: 1440 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @994(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = mdns keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 110 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @995(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 8886 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 110 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @996(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = ssdp keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 110 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @997(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 5228 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 110 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @998(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 5223 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 110 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @999(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 8883 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 110 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1000(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port 4000:4001 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 110 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1001(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 3478 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 110 Packets: 579 Bytes: 44256 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1002(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 57673 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 81 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1003(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 8787 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 81 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1004(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port 8801:8810 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 81 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1005(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 3479 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 81 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1006(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = isakmp keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 81 Packets: 4 Bytes: 2115 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1007(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = sae-urn keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 79 Packets: 122 Bytes: 44162 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1008(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port 5000:5999 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 77 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1009(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 7483 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 77 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1010(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 33935 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 77 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1011(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 16716 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 77 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1012(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 34935 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 77 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1013(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 26950 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 77 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1014(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 2418 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 77 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1015(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 9410 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 77 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1016(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 8888 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 77 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1017(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 19443 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 77 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1018(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 4501 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 77 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1019(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 6473 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 77 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1020(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 19305 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 77 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1021(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 38721 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 77 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1022(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 32393 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 77 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1023(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 19302 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 77 Packets: 26 Bytes: 1404 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1024(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 34600 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 76 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1025(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = time keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 76 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1026(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 32400 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 76 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1027(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 4070 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 76 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1028(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 35985 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 76 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1029(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 8123 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 76 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1030(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 27474 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 76 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1031(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 28415 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 76 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1032(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 35120 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 76 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1033(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = git keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 76 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1034(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 34992 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 76 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1035(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port 16384:16386 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 76 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1036(0) pass in quick on mvneta0.20 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.20.0/24 to ! port = 8130 keep state label "USER_RULE: VL20_VPN:: Allow traffic to WAN" ridentifier 1588964082 [ Evaluations: 76 Packets: 5871 Bytes: 1334831 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1037(0) block return in log quick on mvneta0.20 inet all label "USER_RULE: VL20_VPN: default block IPv4" ridentifier 1588964111 [ Evaluations: 869 Packets: 869 Bytes: 271223 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1038(0) block return in log quick on mvneta0.20 inet6 all label "USER_RULE: VL20_VPN: default block IPv6" ridentifier 1588964127 [ Evaluations: 163 Packets: 163 Bytes: 14668 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1039(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to 127.0.0.1 port = ntp keep state label "USER_RULE: NAT VL30_CLRNET: NTP redirect" ridentifier 1588965189 [ Evaluations: 191892 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1040(0) pass in quick on mvneta0.30 inet proto igmp from 192.168.30.0/24 to keep state label "USER_RULE: VL30_CLRNET: Allow local IGMP" ridentifier 1626709059 [ Evaluations: 2 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1041(0) pass in quick on mvneta0.30 inet proto icmp from 192.168.30.0/24 to any keep state label "USER_RULE: VL30_CLRNET: Allow diagnostic pings" ridentifier 1588964352 [ Evaluations: 1 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1042(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = domain flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 1 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1043(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port 5353:5354 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1044(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = ntp flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1045(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = ftp flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1046(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = ssh flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1047(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = snmp flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1048(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = http flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1049(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = https flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1050(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = printer flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1051(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = svrloc flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1052(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = ipp flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1053(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port 8080:8081 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1054(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = 8880 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1055(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = 8843 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1056(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = 10001 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1057(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = commplex-link flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1058(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = 5900 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1059(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = 9000 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1060(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = rdp flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1061(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port 49152:65535 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1062(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = 17500 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1063(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port 8008:8009 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1064(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = ssdp flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1065(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = 5223 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1066(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = 32400 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1067(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = 4886 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1068(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = netbios-ns flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1069(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = osu-nms flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1070(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = 6363 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1071(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port 32410:32414 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1072(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = 32469 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1073(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = 37248 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1074(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = 37302 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1075(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = 37306 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1076(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port 48000:49000 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1077(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = 8324 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1078(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = 3005 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1079(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = 3702 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1080(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = 5335 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1081(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = 8123 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1082(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = 8080 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1083(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = 8020 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1084(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = 32500 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1085(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = 30011 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1086(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = afs3-fileserver flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1087(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port 319:320 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1088(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = 41722 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1089(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = 35465 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1090(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = 37682 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1091(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = 9080 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1092(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port 5452:5453 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1093(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = 37245 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1094(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port 45000:48000 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1095(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = netbios-dgm flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1096(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = 7070 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1097(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = 9050 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1098(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to port = 10665 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1099(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = domain keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 1 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1100(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port 5353:5354 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 1 Packets: 16 Bytes: 1923 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1101(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = ntp keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1102(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = ftp keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1103(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = ssh keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1104(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = snmp keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1105(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = http keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1106(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = https keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1107(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = printer keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1108(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = svrloc keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1109(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = ipp keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1110(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port 8080:8081 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1111(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = 8880 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1112(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = 8843 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1113(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = 10001 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1114(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = commplex-link keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1115(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = 5900 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1116(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = 9000 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1117(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = 3389 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1118(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port 49152:65535 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1119(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = 17500 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1120(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port 8008:8009 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1121(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = ssdp keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1122(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = 5223 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1123(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = 32400 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1124(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = 4886 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1125(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = netbios-ns keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1126(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = osu-nms keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1127(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = 6363 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1128(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port 32410:32414 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1129(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = 32469 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1130(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = 37248 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1131(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = 37302 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1132(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = 37306 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1133(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port 48000:49000 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1134(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = 8324 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1135(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = 3005 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1136(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = 3702 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1137(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = 5335 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1138(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = 8123 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1139(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = 8080 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1140(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = 8020 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1141(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = 32500 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1142(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = 30011 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1143(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = afs3-fileserver keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1144(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port 319:320 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1145(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = 41722 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1146(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = 35465 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1147(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = 37682 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1148(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = 9080 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1149(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port 5452:5453 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1150(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = 37245 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1151(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port 45000:48000 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1152(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = netbios-dgm keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1153(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = 7070 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1154(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = 9050 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1155(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to port = 10665 keep state label "USER_RULE: VL30_CLRNET: Pass approved LAN" ridentifier 1588964634 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1156(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = domain flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass DNS" ridentifier 1638056222 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1157(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = domain keep state label "USER_RULE: VL30_CLRNET: Pass DNS" ridentifier 1638056222 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1158(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to flags S/SA keep state label "USER_RULE: VL30_CLRNET: Allow Upenn traffic (all ports)" ridentifier 1632929759 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1159(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to keep state label "USER_RULE: VL30_CLRNET: Allow Upenn traffic (all ports)" ridentifier 1632929759 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1160(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to flags S/SA keep state label "USER_RULE: VL30_CLRNET: Allow Italy telecom VOIP traffic (al..." ridentifier 1633020477 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1161(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to keep state label "USER_RULE: VL30_CLRNET: Allow Italy telecom VOIP traffic (al..." ridentifier 1633020477 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1162(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = ftp flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1163(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = ssh flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1164(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = http flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1165(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = https flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1166(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = submission flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1167(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = imaps flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1168(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = xmpp-client flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1169(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 8080 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1170(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = smtps flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1171(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = nntp flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1172(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = imap flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1173(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = ircd flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1174(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = ircs-u flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1175(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 8443 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1176(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 8843 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1177(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port 40000:65535 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1178(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = mdns flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1179(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 8886 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1180(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = ssdp flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1181(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 5228 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1182(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 5223 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1183(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 8883 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1184(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port 4000:4001 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1185(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 3478 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1186(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 57673 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1187(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 8787 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1188(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port 8801:8810 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1189(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 3479 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1190(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = isakmp flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1191(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = sae-urn flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1192(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port 5000:5999 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1193(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 7483 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1194(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 33935 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1195(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 16716 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1196(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 34935 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1197(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 26950 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1198(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 2418 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1199(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 9410 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1200(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 8888 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1201(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 19443 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1202(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 4501 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1203(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 6473 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1204(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 19305 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1205(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 38721 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1206(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 32393 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1207(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 19302 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1208(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 34600 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1209(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = time flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1210(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 32400 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1211(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 4070 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1212(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 35985 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1213(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 8123 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1214(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 27474 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1215(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 28415 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1216(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 35120 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1217(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = git flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1218(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 34992 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1219(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port 16384:16386 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1220(0) pass in quick on mvneta0.30 inet proto tcp from 192.168.30.0/24 to ! port = 8130 flags S/SA keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1221(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = ftp keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1222(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = ssh keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1223(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = http keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1224(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = https keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1225(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = submission keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1226(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = imaps keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1227(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = xmpp-client keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1228(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 8080 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1229(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = smtps keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1230(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = nntp keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1231(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = imap keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1232(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 6667 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1233(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 6697 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1234(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 8443 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1235(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 8843 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1236(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port 40000:65535 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1237(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = mdns keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1238(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 8886 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1239(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = ssdp keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1240(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 5228 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1241(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 5223 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1242(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 8883 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1243(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port 4000:4001 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1244(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 3478 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1245(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 57673 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1246(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 8787 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1247(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port 8801:8810 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1248(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 3479 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1249(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = isakmp keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1250(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = sae-urn keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1251(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port 5000:5999 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1252(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 7483 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1253(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 33935 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1254(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 16716 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1255(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 34935 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1256(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 26950 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1257(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 2418 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1258(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 9410 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1259(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 8888 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1260(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 19443 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1261(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 4501 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1262(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 6473 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1263(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 19305 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1264(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 38721 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1265(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 32393 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1266(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 19302 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1267(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 34600 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1268(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = time keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1269(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 32400 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1270(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 4070 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1271(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 35985 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1272(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 8123 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1273(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 27474 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1274(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 28415 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1275(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 35120 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1276(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = git keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1277(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 34992 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1278(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port 16384:16386 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1279(0) pass in quick on mvneta0.30 inet proto udp from 192.168.30.0/24 to ! port = 8130 keep state label "USER_RULE: VL30_CLRNET: Pass WAN through default gateway" ridentifier 1590661316 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1280(0) block return in log quick on mvneta0.30 inet all label "USER_RULE: VL30_VPN: Default reject IPv4" ridentifier 1588964802 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1281(0) block return in quick on mvneta0.30 inet6 all label "USER_RULE: VL30_VPN: Default reject IPv6" ridentifier 1588964826 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1282(0) block return in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to label "USER_RULE: VL40_DEVICE: Reject pfBlockerNG PRI1 list" ridentifier 1591315563 [ Evaluations: 191888 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1283(0) block return in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to label "USER_RULE: VL40_DEVICE: Reject pfBlockerNG PRI1 list" ridentifier 1591315563 [ Evaluations: 5823 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1284(0) block return in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to (self:13) port = https label "USER_RULE: VL40_DEVICE: Reject pfsense admin interfaces" ridentifier 1590661761 [ Evaluations: 9839 Packets: 263 Bytes: 15780 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1285(0) block return in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to (self:13) port = ssh label "USER_RULE: VL40_DEVICE: Reject pfsense admin interfaces" ridentifier 1590661761 [ Evaluations: 2110 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1286(0) block return in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to (self:13) port = 8080 label "USER_RULE: VL40_DEVICE: Reject pfsense admin interfaces" ridentifier 1590661761 [ Evaluations: 2110 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1287(0) block return in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to (self:13) port = 8112 label "USER_RULE: VL40_DEVICE: Reject pfsense admin interfaces" ridentifier 1590661761 [ Evaluations: 2110 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1288(0) block return in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to (self:13) port = 6363 label "USER_RULE: VL40_DEVICE: Reject pfsense admin interfaces" ridentifier 1590661761 [ Evaluations: 2110 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1289(0) block return in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to (self:13) port = https label "USER_RULE: VL40_DEVICE: Reject pfsense admin interfaces" ridentifier 1590661761 [ Evaluations: 7933 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1290(0) block return in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to (self:13) port = ssh label "USER_RULE: VL40_DEVICE: Reject pfsense admin interfaces" ridentifier 1590661761 [ Evaluations: 3129 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1291(0) block return in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to (self:13) port = 8080 label "USER_RULE: VL40_DEVICE: Reject pfsense admin interfaces" ridentifier 1590661761 [ Evaluations: 3129 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1292(0) block return in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to (self:13) port = 8112 label "USER_RULE: VL40_DEVICE: Reject pfsense admin interfaces" ridentifier 1590661761 [ Evaluations: 3129 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1293(0) block return in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to (self:13) port = 6363 label "USER_RULE: VL40_DEVICE: Reject pfsense admin interfaces" ridentifier 1590661761 [ Evaluations: 3129 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1294(0) pass in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to 127.0.0.1 port = ntp flags S/SA keep state label "USER_RULE: NAT VL40_Device: NTP redirect" ridentifier 1613267925 [ Evaluations: 9576 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1295(0) pass in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to 127.0.0.1 port = ntp keep state label "USER_RULE: NAT VL40_Device: NTP redirect" ridentifier 1613267925 [ Evaluations: 5823 Packets: 570 Bytes: 43320 States: 0 ] [ Inserted: pid 17662 State Creations: 2 ] @1296(0) pass in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to 127.0.0.1 port = domain flags S/SA keep state label "USER_RULE: NAT VL40_Device: DNS redirect" ridentifier 1613267880 [ Evaluations: 3777 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1297(0) pass in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to 127.0.0.1 port = domain keep state label "USER_RULE: NAT VL40_Device: DNS redirect" ridentifier 1613267880 [ Evaluations: 3777 Packets: 5699 Bytes: 434612 States: 4 ] [ Inserted: pid 17662 State Creations: 10 ] @1298(0) pass in quick on mvneta0.40 inet proto icmp from 192.168.40.0/24 to any icmp-type echoreq keep state label "USER_RULE: VL40_DEVICE: Pass ICMP" ridentifier 1588965351 [ Evaluations: 7688 Packets: 592799 Bytes: 50193344 States: 0 ] [ Inserted: pid 17662 State Creations: 12 ] @1299(0) pass in quick on mvneta0.40 inet6 proto udp from any to keep state label "USER_RULE: VL40_DEVICE: Pass IPv6 mDNS traffic" ridentifier 1625754158 [ Evaluations: 5728 Packets: 805 Bytes: 568355 States: 1 ] [ Inserted: pid 17662 State Creations: 1 ] @1300(0) pass in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to port 8008:8009 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 5597 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1301(0) pass in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to port = ssdp flags S/SA keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 2114 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1302(0) pass in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to port = domain flags S/SA keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 2114 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1303(0) pass in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to port = 50000 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 2114 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1304(0) pass in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to port = mdns flags S/SA keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 2114 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1305(0) pass in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to port = http flags S/SA keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 2114 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1306(0) pass in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to port = 4070 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 2114 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1307(0) pass in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to port = 8883 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 2114 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1308(0) pass in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to port = 51200 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 2114 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1309(0) pass in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to port = ircd flags S/SA keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 2114 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1310(0) pass in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to port = 33306 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 2114 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1311(0) pass in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to port = 9999 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 2114 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1312(0) pass in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to port = 8001 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 2114 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1313(0) pass in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to port = domain-s flags S/SA keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 2114 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1314(0) pass in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to port = 8443 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 2114 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1315(0) pass in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to port = 5005 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 2114 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1316(0) pass in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to port = 42194 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 2114 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1317(0) pass in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to port 30011:30012 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 2114 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1318(0) pass in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to port = 9000 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 2114 Packets: 1845 Bytes: 114750 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1319(0) pass in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to port = 5228 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 2112 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1320(0) pass in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to port = xmpp-client flags S/SA keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 2112 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1321(0) pass in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to port = 3702 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 2112 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1322(0) pass in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to port = 5355 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 2112 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1323(0) pass in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to port = netbios-ns flags S/SA keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 2112 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1324(0) pass in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to port = 9478 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 2112 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1325(0) pass in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to port = echo flags S/SA keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 2112 Packets: 4190 Bytes: 251400 States: 10 ] [ Inserted: pid 17662 State Creations: 10 ] @1326(0) pass in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to port 8008:8009 keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 1776 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1327(0) pass in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to port = ssdp keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 1490 Packets: 63 Bytes: 9630 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1328(0) pass in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to port = domain keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 1480 Packets: 2968 Bytes: 314827 States: 0 ] [ Inserted: pid 17662 State Creations: 5 ] @1329(0) pass in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to port = 50000 keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 239 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1330(0) pass in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to port = mdns keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 239 Packets: 2506 Bytes: 1165658 States: 1 ] [ Inserted: pid 17662 State Creations: 1 ] @1331(0) pass in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to port = http keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 7 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1332(0) pass in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to port = 4070 keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 7 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1333(0) pass in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to port = 8883 keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 7 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1334(0) pass in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to port = 51200 keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 7 Packets: 8 Bytes: 1632 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1335(0) pass in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to port = 6667 keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 6 Packets: 4 Bytes: 816 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1336(0) pass in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to port = 33306 keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 4 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1337(0) pass in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to port = 9999 keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 4 Packets: 1 Bytes: 57 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1338(0) pass in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to port = 8001 keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 3 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1339(0) pass in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to port = domain-s keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 3 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1340(0) pass in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to port = 8443 keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 3 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1341(0) pass in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to port = 5005 keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 3 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1342(0) pass in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to port = 42194 keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 3 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1343(0) pass in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to port 30011:30012 keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 3 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1344(0) pass in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to port = 9000 keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 3 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1345(0) pass in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to port = 5228 keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 3 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1346(0) pass in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to port = xmpp-client keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 3 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1347(0) pass in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to port = 3702 keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 3 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1348(0) pass in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to port = 5355 keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 3 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1349(0) pass in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to port = netbios-ns keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 3 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1350(0) pass in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to port = 9478 keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 3 Packets: 1 Bytes: 68 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1351(0) pass in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to port = echo keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic" ridentifier 1590674686 [ Evaluations: 2 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1352(0) pass in quick on mvneta0.40 inet proto igmp from 192.168.40.0/24 to keep state label "USER_RULE: VL40_DEVICE: Allow local device IGMP" ridentifier 1610576739 [ Evaluations: 17 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1353(0) pass in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 port = 33306 to flags S/SA keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic (source p..." ridentifier 1607384858 [ Evaluations: 4 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1354(0) pass in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 port = 40925 to flags S/SA keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic (source p..." ridentifier 1607384858 [ Evaluations: 2 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1355(0) pass in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 port = 10101 to flags S/SA keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic (source p..." ridentifier 1607384858 [ Evaluations: 2 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1356(0) pass in quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 port = 36600 to flags S/SA keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic (source p..." ridentifier 1607384858 [ Evaluations: 2 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1357(0) pass in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 port = 33306 to keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic (source p..." ridentifier 1607384858 [ Evaluations: 4 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1358(0) pass in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 port = 40925 to keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic (source p..." ridentifier 1607384858 [ Evaluations: 2 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1359(0) pass in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 port = 10101 to keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic (source p..." ridentifier 1607384858 [ Evaluations: 2 Packets: 6 Bytes: 396 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1360(0) pass in quick on mvneta0.40 inet proto udp from 192.168.40.0/24 port = 36600 to keep state label "USER_RULE: VL40_DEVICE: Allow local device traffic (source p..." ridentifier 1607384858 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1361(0) pass in quick on mvneta0.40 inet6 proto udp from any to keep state label "USER_RULE: VL40_DEVICE: Pass IPv6 traffic" ridentifier 1604636488 [ Evaluations: 1981 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1362(0) pass in quick on mvneta0.40 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.40.0/24 to ! port 44700:44899 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass WAN" ridentifier 1624507851 [ Evaluations: 1860 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1363(0) pass in quick on mvneta0.40 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.40.0/24 to ! port = 4070 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass WAN" ridentifier 1624507851 [ Evaluations: 1531 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1364(0) pass in quick on mvneta0.40 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.40.0/24 to ! port = 32400 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass WAN" ridentifier 1624507851 [ Evaluations: 1531 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1365(0) pass in quick on mvneta0.40 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.40.0/24 to ! port = 19305 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass WAN" ridentifier 1624507851 [ Evaluations: 1531 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1366(0) pass in quick on mvneta0.40 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.40.0/24 to ! port = 5228 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass WAN" ridentifier 1624507851 [ Evaluations: 1531 Packets: 4634 Bytes: 299842 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1367(0) pass in quick on mvneta0.40 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.40.0/24 to ! port = 8886 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass WAN" ridentifier 1624507851 [ Evaluations: 1528 Packets: 2638 Bytes: 230362 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1368(0) pass in quick on mvneta0.40 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.40.0/24 to ! port = http flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass WAN" ridentifier 1624507851 [ Evaluations: 1520 Packets: 35682 Bytes: 15661260 States: 2 ] [ Inserted: pid 17662 State Creations: 3 ] @1369(0) pass in quick on mvneta0.40 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.40.0/24 to ! port = https flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass WAN" ridentifier 1624507851 [ Evaluations: 706 Packets: 45925 Bytes: 15105511 States: 3 ] [ Inserted: pid 17662 State Creations: 3 ] @1370(0) pass in quick on mvneta0.40 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.40.0/24 to ! port = openvpn flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass WAN" ridentifier 1624507851 [ Evaluations: 18 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1371(0) pass in quick on mvneta0.40 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.40.0/24 to ! port = 51820 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass WAN" ridentifier 1624507851 [ Evaluations: 18 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1372(0) pass in quick on mvneta0.40 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.40.0/24 to ! port = 33435 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass WAN" ridentifier 1624507851 [ Evaluations: 18 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1373(0) pass in quick on mvneta0.40 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.40.0/24 to ! port = 8123 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass WAN" ridentifier 1624507851 [ Evaluations: 18 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1374(0) pass in quick on mvneta0.40 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.40.0/24 to ! port = 4433 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass WAN" ridentifier 1624507851 [ Evaluations: 18 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1375(0) pass in quick on mvneta0.40 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.40.0/24 to ! port = domain-s flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass WAN" ridentifier 1624507851 [ Evaluations: 18 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1376(0) pass in quick on mvneta0.40 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.40.0/24 to ! port = 8883 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass WAN" ridentifier 1624507851 [ Evaluations: 18 Packets: 39 Bytes: 8667 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1377(0) pass in quick on mvneta0.40 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.40.0/24 to ! port 44700:44899 keep state label "USER_RULE: VL40_DEVICE: Pass WAN" ridentifier 1624507851 [ Evaluations: 288 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1378(0) pass in quick on mvneta0.40 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.40.0/24 to ! port = 4070 keep state label "USER_RULE: VL40_DEVICE: Pass WAN" ridentifier 1624507851 [ Evaluations: 271 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1379(0) pass in quick on mvneta0.40 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.40.0/24 to ! port = 32400 keep state label "USER_RULE: VL40_DEVICE: Pass WAN" ridentifier 1624507851 [ Evaluations: 271 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1380(0) pass in quick on mvneta0.40 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.40.0/24 to ! port = 19305 keep state label "USER_RULE: VL40_DEVICE: Pass WAN" ridentifier 1624507851 [ Evaluations: 271 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1381(0) pass in quick on mvneta0.40 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.40.0/24 to ! port = 5228 keep state label "USER_RULE: VL40_DEVICE: Pass WAN" ridentifier 1624507851 [ Evaluations: 271 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1382(0) pass in quick on mvneta0.40 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.40.0/24 to ! port = 8886 keep state label "USER_RULE: VL40_DEVICE: Pass WAN" ridentifier 1624507851 [ Evaluations: 271 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1383(0) pass in quick on mvneta0.40 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.40.0/24 to ! port = http keep state label "USER_RULE: VL40_DEVICE: Pass WAN" ridentifier 1624507851 [ Evaluations: 271 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1384(0) pass in quick on mvneta0.40 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.40.0/24 to ! port = https keep state label "USER_RULE: VL40_DEVICE: Pass WAN" ridentifier 1624507851 [ Evaluations: 271 Packets: 7906 Bytes: 6108245 States: 2 ] [ Inserted: pid 17662 State Creations: 2 ] @1385(0) pass in quick on mvneta0.40 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.40.0/24 to ! port = openvpn keep state label "USER_RULE: VL40_DEVICE: Pass WAN" ridentifier 1624507851 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1386(0) pass in quick on mvneta0.40 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.40.0/24 to ! port = 51820 keep state label "USER_RULE: VL40_DEVICE: Pass WAN" ridentifier 1624507851 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1387(0) pass in quick on mvneta0.40 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.40.0/24 to ! port = 33435 keep state label "USER_RULE: VL40_DEVICE: Pass WAN" ridentifier 1624507851 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1388(0) pass in quick on mvneta0.40 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.40.0/24 to ! port = 8123 keep state label "USER_RULE: VL40_DEVICE: Pass WAN" ridentifier 1624507851 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1389(0) pass in quick on mvneta0.40 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.40.0/24 to ! port = 4433 keep state label "USER_RULE: VL40_DEVICE: Pass WAN" ridentifier 1624507851 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1390(0) pass in quick on mvneta0.40 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.40.0/24 to ! port = domain-s keep state label "USER_RULE: VL40_DEVICE: Pass WAN" ridentifier 1624507851 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1391(0) pass in quick on mvneta0.40 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.40.0/24 to ! port = 8883 keep state label "USER_RULE: VL40_DEVICE: Pass WAN" ridentifier 1624507851 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1392(0) block return in log quick on mvneta0.40 inet all label "USER_RULE: VL40_DEVICE: default block IPv4" ridentifier 1588965466 [ Evaluations: 141 Packets: 128 Bytes: 7377 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1393(0) block return in log quick on mvneta0.40 inet proto tcp from 192.168.40.0/24 to label "USER_RULE: VL40_DEVICE: Reject any local traffic" ridentifier 1588965394 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1394(0) block return in log quick on mvneta0.40 inet proto udp from 192.168.40.0/24 to label "USER_RULE: VL40_DEVICE: Reject any local traffic" ridentifier 1588965394 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1395(0) block return in log quick on mvneta0.40 inet6 all label "USER_RULE: VL40_DEVICE: default block IPv6" ridentifier 1588965479 [ Evaluations: 70 Packets: 70 Bytes: 5420 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1396(0) block return in quick on mvneta0.50 inet proto tcp from ! to port = 8123 label "USER_RULE: VL50_NAS: Block non-local access to server contai..." ridentifier 1640413418 [ Evaluations: 148077 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1397(0) block return in quick on mvneta0.50 inet proto tcp from ! to port = 8080 label "USER_RULE: VL50_NAS: Block non-local access to server contai..." ridentifier 1640413418 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1398(0) block return in quick on mvneta0.50 inet proto tcp from ! to port = 9000 label "USER_RULE: VL50_NAS: Block non-local access to server contai..." ridentifier 1640413418 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1399(0) block return in quick on mvneta0.50 inet proto tcp from ! to port = 5452 label "USER_RULE: VL50_NAS: Block non-local access to server contai..." ridentifier 1640413418 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1400(0) block return in quick on mvneta0.50 inet proto tcp from ! to port = 8989 label "USER_RULE: VL50_NAS: Block non-local access to server contai..." ridentifier 1640413418 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1401(0) block return in quick on mvneta0.50 inet proto tcp from ! to port = 7878 label "USER_RULE: VL50_NAS: Block non-local access to server contai..." ridentifier 1640413418 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1402(0) block return in quick on mvneta0.50 inet proto udp from ! to port = 8123 label "USER_RULE: VL50_NAS: Block non-local access to server contai..." ridentifier 1640413418 [ Evaluations: 18165 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1403(0) block return in quick on mvneta0.50 inet proto udp from ! to port = 8080 label "USER_RULE: VL50_NAS: Block non-local access to server contai..." ridentifier 1640413418 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1404(0) block return in quick on mvneta0.50 inet proto udp from ! to port = 9000 label "USER_RULE: VL50_NAS: Block non-local access to server contai..." ridentifier 1640413418 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1405(0) block return in quick on mvneta0.50 inet proto udp from ! to port = 5452 label "USER_RULE: VL50_NAS: Block non-local access to server contai..." ridentifier 1640413418 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1406(0) block return in quick on mvneta0.50 inet proto udp from ! to port = 8989 label "USER_RULE: VL50_NAS: Block non-local access to server contai..." ridentifier 1640413418 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1407(0) block return in quick on mvneta0.50 inet proto udp from ! to port = 7878 label "USER_RULE: VL50_NAS: Block non-local access to server contai..." ridentifier 1640413418 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1408(0) pass in quick on mvneta0.50 inet proto tcp from port = 48196 to flags S/SA keep state label "NEGATE_ROUTE: Negate policy routing for destination" ridentifier 10000002 [ Evaluations: 121125 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1409(0) pass in quick on mvneta0.50 inet proto udp from port = 48196 to keep state label "NEGATE_ROUTE: Negate policy routing for destination" ridentifier 10000002 [ Evaluations: 18122 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1410(0) pass in quick on mvneta0.50 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from port = 48196 to any flags S/SA keep state label "USER_RULE: VL50_NAS: pass all outbound UDP/TCP traffic for t..." ridentifier 1624903067 [ Evaluations: 14700 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1411(0) pass in quick on mvneta0.50 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from port = 48196 to any keep state label "USER_RULE: VL50_NAS: pass all outbound UDP/TCP traffic for t..." ridentifier 1624903067 [ Evaluations: 14700 Packets: 27999 Bytes: 4148331 States: 38 ] [ Inserted: pid 17662 State Creations: 88 ] @1412(0) block return in log quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to label "USER_RULE: VL50_NAS: Reject pfBlockerNG PRI1" ridentifier 1621263292 [ Evaluations: 106915 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1413(0) block return in log quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to label "USER_RULE: VL50_NAS: Reject pfBlockerNG PRI1" ridentifier 1621263292 [ Evaluations: 3471 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1414(0) pass in quick on mvneta0.50 inet proto tcp from to 192.168.50.1 port = https flags S/SA keep state label "USER_RULE: VL50_NAS: antilockout rule" ridentifier 1590543327 [ Evaluations: 106915 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1415(0) pass in quick on mvneta0.50 inet proto tcp from to 192.168.50.1 port = ssh flags S/SA keep state label "USER_RULE: VL50_NAS: antilockout rule" ridentifier 1590543327 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1416(0) pass in quick on mvneta0.50 inet proto tcp from to 192.168.50.1 port = 8080 flags S/SA keep state label "USER_RULE: VL50_NAS: antilockout rule" ridentifier 1590543327 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1417(0) pass in quick on mvneta0.50 inet proto tcp from to 192.168.50.1 port = 8112 flags S/SA keep state label "USER_RULE: VL50_NAS: antilockout rule" ridentifier 1590543327 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1418(0) pass in quick on mvneta0.50 inet proto tcp from to 192.168.50.1 port = 6363 flags S/SA keep state label "USER_RULE: VL50_NAS: antilockout rule" ridentifier 1590543327 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1419(0) pass in quick on mvneta0.50 inet proto icmp all keep state label "USER_RULE: VL50_NAS: Allow diagnostic pings" ridentifier 1590543388 [ Evaluations: 106915 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1420(0) pass in quick on mvneta0.50 inet proto igmp from any to keep state label "USER_RULE: VL50_NAS: Allow IGMP" ridentifier 1590543436 [ Evaluations: 106915 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1421(0) pass in quick on mvneta0.50 inet6 proto udp from any to keep state label "USER_RULE: VL50_NAS: Pass IPv6 traffic" ridentifier 1605067013 [ Evaluations: 106931 Packets: 29 Bytes: 9489 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1422(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to 192.168.50.1 port = domain keep state label "USER_RULE: NAT VL50_NAS: DNS redirect" ridentifier 1589068064 [ Evaluations: 106909 Packets: 15939 Bytes: 1851240 States: 12 ] [ Inserted: pid 17662 State Creations: 30 ] @1423(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to 127.0.0.1 port = ntp keep state label "USER_RULE: NAT VL50_NAS: NTP redirect" ridentifier 1625683374 [ Evaluations: 681 Packets: 32 Bytes: 2432 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1424(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = osu-nms flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 104126 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1425(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port 137:138 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 33690 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1426(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 32400 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 33690 Packets: 26 Bytes: 1812 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1427(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port 32412:32415 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 33685 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1428(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 2189 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 33685 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1429(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 8097 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 33685 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1430(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 8099 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 33685 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1431(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 9500 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 33685 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1432(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 8612 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 33685 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1433(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 8610 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 33685 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1434(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 8443 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 33685 Packets: 552501 Bytes: 139926008 States: 74 ] [ Inserted: pid 17662 State Creations: 156 ] @1435(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 5351 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 7722 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1436(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 5005 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 7722 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1437(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port 8008:8009 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 7722 Packets: 19495 Bytes: 2356042 States: 1 ] [ Inserted: pid 17662 State Creations: 1 ] @1438(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 9999 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 7712 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1439(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 10101 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 7712 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1440(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 9080 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 7712 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1441(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = osu-nms keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 8391 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1442(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port 137:138 keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 484 Packets: 180 Bytes: 43200 States: 0 ] [ Inserted: pid 17662 State Creations: 1 ] @1443(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 32400 keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 394 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1444(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port 32412:32415 keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 394 Packets: 26 Bytes: 5296 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1445(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 2189 keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 376 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1446(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 8097 keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 376 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1447(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 8099 keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 376 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1448(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 9500 keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 376 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1449(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 8612 keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 376 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1450(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 8610 keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 376 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1451(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 8443 keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 376 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1452(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 5351 keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 376 Packets: 150 Bytes: 4500 States: 0 ] [ Inserted: pid 17662 State Creations: 1 ] @1453(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 5005 keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 351 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1454(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port 8008:8009 keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 351 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1455(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 9999 keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 351 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1456(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 10101 keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 351 Packets: 286 Bytes: 18876 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1457(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 9080 keep state label "USER_RULE: VL50_NAS: Pass local NAS ports" ridentifier 1590543956 [ Evaluations: 349 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1458(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = domain flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 8061 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1459(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port 5353:5354 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 7712 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1460(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = ntp flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 7712 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1461(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = ftp flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 7712 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1462(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = ssh flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 7712 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1463(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = snmp flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 7712 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1464(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = http flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 7712 Packets: 343524 Bytes: 35556582 States: 20 ] [ Inserted: pid 17662 State Creations: 39 ] @1465(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = https flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 1244 Packets: 1473 Bytes: 382224 States: 1 ] [ Inserted: pid 17662 State Creations: 1 ] @1466(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = printer flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 1205 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1467(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = svrloc flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 1205 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1468(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = ipp flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 1205 Packets: 30136 Bytes: 8390081 States: 6 ] [ Inserted: pid 17662 State Creations: 10 ] @1469(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port 8080:8081 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1470(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 8880 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1471(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 8843 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1472(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 10001 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1473(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = commplex-link flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1474(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 5900 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1475(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 9000 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1476(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = rdp flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1477(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port 49152:65535 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1478(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 17500 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1479(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port 8008:8009 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1480(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = ssdp flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1481(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 5223 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1482(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 32400 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1483(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 4886 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1484(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = netbios-ns flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1485(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = osu-nms flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1486(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 6363 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1487(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port 32410:32414 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1488(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 32469 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1489(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 37248 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1490(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 37302 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1491(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 37306 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1492(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port 48000:49000 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1493(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 8324 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1494(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 3005 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1495(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 3702 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1496(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 5335 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1497(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 8123 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1498(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 8080 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1499(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 8020 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1500(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 32500 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1501(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 30011 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1502(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = afs3-fileserver flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1503(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port 319:320 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1504(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 41722 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1505(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 35465 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1506(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 37682 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1507(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 9080 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1508(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port 5452:5453 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1509(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 37245 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1510(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port 45000:48000 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1511(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = netbios-dgm flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1512(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 7070 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1513(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 9050 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1514(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 10665 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1515(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = domain keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 349 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1516(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port 5353:5354 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 349 Packets: 579 Bytes: 168405 States: 1 ] [ Inserted: pid 17662 State Creations: 1 ] @1517(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = ntp keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 175 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1518(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = ftp keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 175 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1519(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = ssh keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 175 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1520(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = snmp keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 175 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1521(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = http keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 175 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1522(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = https keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 175 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1523(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = printer keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 175 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1524(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = svrloc keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 175 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1525(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = ipp keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 175 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1526(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port 8080:8081 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 175 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1527(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 8880 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 175 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1528(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 8843 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 175 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1529(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 10001 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 175 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1530(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = commplex-link keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 175 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1531(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 5900 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 175 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1532(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 9000 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 175 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1533(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 3389 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 175 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1534(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port 49152:65535 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 175 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1535(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 17500 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 175 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1536(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port 8008:8009 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 175 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1537(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = ssdp keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 175 Packets: 836 Bytes: 161502 States: 0 ] [ Inserted: pid 17662 State Creations: 1 ] @1538(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 5223 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 1 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1539(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 32400 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 1 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1540(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 4886 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 1 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1541(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = netbios-ns keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 1 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1542(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = osu-nms keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 1 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1543(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 6363 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 1 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1544(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port 32410:32414 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 1 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1545(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 32469 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 1 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1546(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 37248 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 1 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1547(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 37302 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 1 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1548(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 37306 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 1 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1549(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port 48000:49000 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 1 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1550(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 8324 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 1 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1551(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 3005 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 1 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1552(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 3702 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 1 Packets: 4 Bytes: 4280 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1553(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 5335 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1554(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 8123 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1555(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 8080 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1556(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 8020 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1557(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 32500 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1558(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 30011 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1559(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = afs3-fileserver keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1560(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port 319:320 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1561(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 41722 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1562(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 35465 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1563(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 37682 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1564(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 9080 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1565(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port 5452:5453 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1566(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 37245 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1567(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port 45000:48000 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1568(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = netbios-dgm keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1569(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 7070 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1570(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 9050 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1571(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 10665 keep state label "USER_RULE: VL50_NAS: Pass local LAN traffic" ridentifier 1590891689 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1572(0) pass in quick on mvneta0.50 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from to ! port = 32400 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass outgoing Plex traffic through defa..." ridentifier 1640445162 [ Evaluations: 69515 Packets: 13319 Bytes: 1028948 States: 1 ] [ Inserted: pid 17662 State Creations: 1 ] @1573(0) pass in quick on mvneta0.50 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from to ! port = 32400 keep state label "USER_RULE: VL50_NAS: Pass outgoing Plex traffic through defa..." ridentifier 1640445162 [ Evaluations: 172 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1574(0) pass in quick on mvneta0.50 inet proto tcp from to port = ftp flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 69941 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1575(0) pass in quick on mvneta0.50 inet proto tcp from to port = ssh flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 641 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1576(0) pass in quick on mvneta0.50 inet proto tcp from to port = http flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 641 Packets: 999 Bytes: 577541 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1577(0) pass in quick on mvneta0.50 inet proto tcp from to port = https flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 627 Packets: 59447 Bytes: 44574111 States: 5 ] [ Inserted: pid 17662 State Creations: 7 ] @1578(0) pass in quick on mvneta0.50 inet proto tcp from to port = submission flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1579(0) pass in quick on mvneta0.50 inet proto tcp from to port = imaps flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1580(0) pass in quick on mvneta0.50 inet proto tcp from to port = xmpp-client flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1581(0) pass in quick on mvneta0.50 inet proto tcp from to port = 8080 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1582(0) pass in quick on mvneta0.50 inet proto tcp from to port = smtps flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1583(0) pass in quick on mvneta0.50 inet proto tcp from to port = nntp flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1584(0) pass in quick on mvneta0.50 inet proto tcp from to port = imap flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1585(0) pass in quick on mvneta0.50 inet proto tcp from to port = ircd flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1586(0) pass in quick on mvneta0.50 inet proto tcp from to port = ircs-u flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1587(0) pass in quick on mvneta0.50 inet proto tcp from to port = 8443 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1588(0) pass in quick on mvneta0.50 inet proto tcp from to port = 8843 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1589(0) pass in quick on mvneta0.50 inet proto tcp from to port 40000:65535 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1590(0) pass in quick on mvneta0.50 inet proto tcp from to port = mdns flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1591(0) pass in quick on mvneta0.50 inet proto tcp from to port = 8886 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1592(0) pass in quick on mvneta0.50 inet proto tcp from to port = ssdp flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1593(0) pass in quick on mvneta0.50 inet proto tcp from to port = 5228 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1594(0) pass in quick on mvneta0.50 inet proto tcp from to port = 5223 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1595(0) pass in quick on mvneta0.50 inet proto tcp from to port = 8883 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1596(0) pass in quick on mvneta0.50 inet proto tcp from to port 4000:4001 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1597(0) pass in quick on mvneta0.50 inet proto tcp from to port = 3478 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1598(0) pass in quick on mvneta0.50 inet proto tcp from to port = 57673 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1599(0) pass in quick on mvneta0.50 inet proto tcp from to port = 8787 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1600(0) pass in quick on mvneta0.50 inet proto tcp from to port 8801:8810 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1601(0) pass in quick on mvneta0.50 inet proto tcp from to port = 3479 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1602(0) pass in quick on mvneta0.50 inet proto tcp from to port = isakmp flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1603(0) pass in quick on mvneta0.50 inet proto tcp from to port = sae-urn flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1604(0) pass in quick on mvneta0.50 inet proto tcp from to port 5000:5999 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1605(0) pass in quick on mvneta0.50 inet proto tcp from to port = 7483 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1606(0) pass in quick on mvneta0.50 inet proto tcp from to port = 33935 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1607(0) pass in quick on mvneta0.50 inet proto tcp from to port = 16716 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1608(0) pass in quick on mvneta0.50 inet proto tcp from to port = 34935 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1609(0) pass in quick on mvneta0.50 inet proto tcp from to port = 26950 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1610(0) pass in quick on mvneta0.50 inet proto tcp from to port = 2418 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1611(0) pass in quick on mvneta0.50 inet proto tcp from to port = 9410 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1612(0) pass in quick on mvneta0.50 inet proto tcp from to port = 8888 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1613(0) pass in quick on mvneta0.50 inet proto tcp from to port = 19443 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1614(0) pass in quick on mvneta0.50 inet proto tcp from to port = 4501 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1615(0) pass in quick on mvneta0.50 inet proto tcp from to port = 6473 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1616(0) pass in quick on mvneta0.50 inet proto tcp from to port = 19305 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1617(0) pass in quick on mvneta0.50 inet proto tcp from to port = 38721 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1618(0) pass in quick on mvneta0.50 inet proto tcp from to port = 32393 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1619(0) pass in quick on mvneta0.50 inet proto tcp from to port = 19302 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1620(0) pass in quick on mvneta0.50 inet proto tcp from to port = 34600 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1621(0) pass in quick on mvneta0.50 inet proto tcp from to port = time flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1622(0) pass in quick on mvneta0.50 inet proto tcp from to port = 32400 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1623(0) pass in quick on mvneta0.50 inet proto tcp from to port = 4070 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1624(0) pass in quick on mvneta0.50 inet proto tcp from to port = 35985 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1625(0) pass in quick on mvneta0.50 inet proto tcp from to port = 8123 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1626(0) pass in quick on mvneta0.50 inet proto tcp from to port = 27474 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1627(0) pass in quick on mvneta0.50 inet proto tcp from to port = 28415 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1628(0) pass in quick on mvneta0.50 inet proto tcp from to port = 35120 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1629(0) pass in quick on mvneta0.50 inet proto tcp from to port = git flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1630(0) pass in quick on mvneta0.50 inet proto tcp from to port = 34992 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1631(0) pass in quick on mvneta0.50 inet proto tcp from to port 16384:16386 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1632(0) pass in quick on mvneta0.50 inet proto tcp from to port = 8130 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 26 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1633(0) pass in quick on mvneta0.50 inet proto udp from to port = ftp keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 221 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1634(0) pass in quick on mvneta0.50 inet proto udp from to port = ssh keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1635(0) pass in quick on mvneta0.50 inet proto udp from to port = http keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1636(0) pass in quick on mvneta0.50 inet proto udp from to port = https keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1637(0) pass in quick on mvneta0.50 inet proto udp from to port = submission keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1638(0) pass in quick on mvneta0.50 inet proto udp from to port = imaps keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1639(0) pass in quick on mvneta0.50 inet proto udp from to port = xmpp-client keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1640(0) pass in quick on mvneta0.50 inet proto udp from to port = 8080 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1641(0) pass in quick on mvneta0.50 inet proto udp from to port = smtps keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1642(0) pass in quick on mvneta0.50 inet proto udp from to port = nntp keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1643(0) pass in quick on mvneta0.50 inet proto udp from to port = imap keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1644(0) pass in quick on mvneta0.50 inet proto udp from to port = 6667 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1645(0) pass in quick on mvneta0.50 inet proto udp from to port = 6697 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1646(0) pass in quick on mvneta0.50 inet proto udp from to port = 8443 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1647(0) pass in quick on mvneta0.50 inet proto udp from to port = 8843 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1648(0) pass in quick on mvneta0.50 inet proto udp from to port 40000:65535 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1649(0) pass in quick on mvneta0.50 inet proto udp from to port = mdns keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1650(0) pass in quick on mvneta0.50 inet proto udp from to port = 8886 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1651(0) pass in quick on mvneta0.50 inet proto udp from to port = ssdp keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1652(0) pass in quick on mvneta0.50 inet proto udp from to port = 5228 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1653(0) pass in quick on mvneta0.50 inet proto udp from to port = 5223 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1654(0) pass in quick on mvneta0.50 inet proto udp from to port = 8883 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1655(0) pass in quick on mvneta0.50 inet proto udp from to port 4000:4001 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1656(0) pass in quick on mvneta0.50 inet proto udp from to port = 3478 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1657(0) pass in quick on mvneta0.50 inet proto udp from to port = 57673 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1658(0) pass in quick on mvneta0.50 inet proto udp from to port = 8787 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1659(0) pass in quick on mvneta0.50 inet proto udp from to port 8801:8810 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1660(0) pass in quick on mvneta0.50 inet proto udp from to port = 3479 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1661(0) pass in quick on mvneta0.50 inet proto udp from to port = isakmp keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1662(0) pass in quick on mvneta0.50 inet proto udp from to port = sae-urn keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1663(0) pass in quick on mvneta0.50 inet proto udp from to port 5000:5999 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1664(0) pass in quick on mvneta0.50 inet proto udp from to port = 7483 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1665(0) pass in quick on mvneta0.50 inet proto udp from to port = 33935 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1666(0) pass in quick on mvneta0.50 inet proto udp from to port = 16716 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1667(0) pass in quick on mvneta0.50 inet proto udp from to port = 34935 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1668(0) pass in quick on mvneta0.50 inet proto udp from to port = 26950 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1669(0) pass in quick on mvneta0.50 inet proto udp from to port = 2418 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1670(0) pass in quick on mvneta0.50 inet proto udp from to port = 9410 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1671(0) pass in quick on mvneta0.50 inet proto udp from to port = 8888 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1672(0) pass in quick on mvneta0.50 inet proto udp from to port = 19443 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1673(0) pass in quick on mvneta0.50 inet proto udp from to port = 4501 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1674(0) pass in quick on mvneta0.50 inet proto udp from to port = 6473 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1675(0) pass in quick on mvneta0.50 inet proto udp from to port = 19305 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1676(0) pass in quick on mvneta0.50 inet proto udp from to port = 38721 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1677(0) pass in quick on mvneta0.50 inet proto udp from to port = 32393 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1678(0) pass in quick on mvneta0.50 inet proto udp from to port = 19302 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1679(0) pass in quick on mvneta0.50 inet proto udp from to port = 34600 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1680(0) pass in quick on mvneta0.50 inet proto udp from to port = time keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1681(0) pass in quick on mvneta0.50 inet proto udp from to port = 32400 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1682(0) pass in quick on mvneta0.50 inet proto udp from to port = 4070 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1683(0) pass in quick on mvneta0.50 inet proto udp from to port = 35985 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1684(0) pass in quick on mvneta0.50 inet proto udp from to port = 8123 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1685(0) pass in quick on mvneta0.50 inet proto udp from to port = 27474 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1686(0) pass in quick on mvneta0.50 inet proto udp from to port = 28415 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1687(0) pass in quick on mvneta0.50 inet proto udp from to port = 35120 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1688(0) pass in quick on mvneta0.50 inet proto udp from to port = git keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1689(0) pass in quick on mvneta0.50 inet proto udp from to port = 34992 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1690(0) pass in quick on mvneta0.50 inet proto udp from to port 16384:16386 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1691(0) pass in quick on mvneta0.50 inet proto udp from to port = 8130 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast -> AWS through defau..." ridentifier 1606934590 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1692(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port 8008:8009 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 69326 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1693(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = ssdp flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1694(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = domain flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1695(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 50000 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1696(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = mdns flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1697(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = http flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1698(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 4070 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1699(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 8883 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1700(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 51200 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1701(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = ircd flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1702(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 33306 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1703(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 9999 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1704(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 8001 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1705(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = domain-s flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1706(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 8443 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1707(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 5005 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1708(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 42194 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1709(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port 30011:30012 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1710(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 9000 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1711(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 5228 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1712(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = xmpp-client flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1713(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 3702 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1714(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 5355 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1715(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = netbios-ns flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1716(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = 9478 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1717(0) pass in quick on mvneta0.50 inet proto tcp from 192.168.50.0/24 to port = echo flags S/SA keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1718(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port 8008:8009 keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 195 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1719(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = ssdp keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1720(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = domain keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1721(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 50000 keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1722(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = mdns keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1723(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = http keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1724(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 4070 keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1725(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 8883 keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1726(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 51200 keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1727(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 6667 keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1728(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 33306 keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1729(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 9999 keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1730(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 8001 keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1731(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = domain-s keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1732(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 8443 keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1733(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 5005 keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1734(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 42194 keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1735(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port 30011:30012 keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1736(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 9000 keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1737(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 5228 keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1738(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = xmpp-client keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1739(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 3702 keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1740(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 5355 keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1741(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = netbios-ns keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1742(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = 9478 keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1743(0) pass in quick on mvneta0.50 inet proto udp from 192.168.50.0/24 to port = echo keep state label "USER_RULE: VL50_NAS: Pass local LAN Device traffic" ridentifier 1628536888 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1744(0) pass in quick on mvneta0.50 inet proto tcp from to ! port 44700:44899 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast through WAN" ridentifier 1614619450 [ Evaluations: 69326 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1745(0) pass in quick on mvneta0.50 inet proto tcp from to ! port = 4070 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast through WAN" ridentifier 1614619450 [ Evaluations: 4172 Packets: 7629 Bytes: 480285 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1746(0) pass in quick on mvneta0.50 inet proto tcp from to ! port = 32400 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast through WAN" ridentifier 1614619450 [ Evaluations: 4170 Packets: 2842 Bytes: 442367 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1747(0) pass in quick on mvneta0.50 inet proto tcp from to ! port = 19305 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast through WAN" ridentifier 1614619450 [ Evaluations: 4136 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1748(0) pass in quick on mvneta0.50 inet proto tcp from to ! port = 5228 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast through WAN" ridentifier 1614619450 [ Evaluations: 4136 Packets: 804 Bytes: 76569 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1749(0) pass in quick on mvneta0.50 inet proto tcp from to ! port = 8886 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast through WAN" ridentifier 1614619450 [ Evaluations: 4134 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1750(0) pass in quick on mvneta0.50 inet proto tcp from to ! port = http flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast through WAN" ridentifier 1614619450 [ Evaluations: 4134 Packets: 5931 Bytes: 809442 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1751(0) pass in quick on mvneta0.50 inet proto tcp from to ! port = https flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast through WAN" ridentifier 1614619450 [ Evaluations: 4118 Packets: 10634344 Bytes: 901860059 States: 55 ] [ Inserted: pid 17662 State Creations: 80 ] @1752(0) pass in quick on mvneta0.50 inet proto tcp from to ! port = openvpn flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast through WAN" ridentifier 1614619450 [ Evaluations: 189 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1753(0) pass in quick on mvneta0.50 inet proto tcp from to ! port = 51820 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast through WAN" ridentifier 1614619450 [ Evaluations: 189 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1754(0) pass in quick on mvneta0.50 inet proto tcp from to ! port = 33435 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast through WAN" ridentifier 1614619450 [ Evaluations: 189 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1755(0) pass in quick on mvneta0.50 inet proto tcp from to ! port = 8123 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast through WAN" ridentifier 1614619450 [ Evaluations: 189 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1756(0) pass in quick on mvneta0.50 inet proto tcp from to ! port = 4433 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast through WAN" ridentifier 1614619450 [ Evaluations: 189 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1757(0) pass in quick on mvneta0.50 inet proto tcp from to ! port = domain-s flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast through WAN" ridentifier 1614619450 [ Evaluations: 189 Packets: 5077 Bytes: 1187194 States: 0 ] [ Inserted: pid 17662 State Creations: 2 ] @1758(0) pass in quick on mvneta0.50 inet proto tcp from to ! port = 8883 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast through WAN" ridentifier 1614619450 [ Evaluations: 33 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1759(0) pass in quick on mvneta0.50 inet proto udp from to ! port 44700:44899 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast through WAN" ridentifier 1614619450 [ Evaluations: 228 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1760(0) pass in quick on mvneta0.50 inet proto udp from to ! port = 4070 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast through WAN" ridentifier 1614619450 [ Evaluations: 173 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1761(0) pass in quick on mvneta0.50 inet proto udp from to ! port = 32400 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast through WAN" ridentifier 1614619450 [ Evaluations: 173 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1762(0) pass in quick on mvneta0.50 inet proto udp from to ! port = 19305 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast through WAN" ridentifier 1614619450 [ Evaluations: 173 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1763(0) pass in quick on mvneta0.50 inet proto udp from to ! port = 5228 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast through WAN" ridentifier 1614619450 [ Evaluations: 173 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1764(0) pass in quick on mvneta0.50 inet proto udp from to ! port = 8886 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast through WAN" ridentifier 1614619450 [ Evaluations: 173 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1765(0) pass in quick on mvneta0.50 inet proto udp from to ! port = http keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast through WAN" ridentifier 1614619450 [ Evaluations: 173 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1766(0) pass in quick on mvneta0.50 inet proto udp from to ! port = https keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast through WAN" ridentifier 1614619450 [ Evaluations: 173 Packets: 59998 Bytes: 61455595 States: 3 ] [ Inserted: pid 17662 State Creations: 3 ] @1767(0) pass in quick on mvneta0.50 inet proto udp from to ! port = openvpn keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast through WAN" ridentifier 1614619450 [ Evaluations: 1 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1768(0) pass in quick on mvneta0.50 inet proto udp from to ! port = 51820 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast through WAN" ridentifier 1614619450 [ Evaluations: 1 Packets: 18 Bytes: 2932 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1769(0) pass in quick on mvneta0.50 inet proto udp from to ! port = 33435 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast through WAN" ridentifier 1614619450 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1770(0) pass in quick on mvneta0.50 inet proto udp from to ! port = 8123 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast through WAN" ridentifier 1614619450 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1771(0) pass in quick on mvneta0.50 inet proto udp from to ! port = 4433 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast through WAN" ridentifier 1614619450 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1772(0) pass in quick on mvneta0.50 inet proto udp from to ! port = domain-s keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast through WAN" ridentifier 1614619450 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1773(0) pass in quick on mvneta0.50 inet proto udp from to ! port = 8883 keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast through WAN" ridentifier 1614619450 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1774(0) pass in quick on mvneta0.50 inet proto tcp from port 8008:8009 to flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 33 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1775(0) pass in quick on mvneta0.50 inet proto tcp from port = ssdp to flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 33 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1776(0) pass in quick on mvneta0.50 inet proto tcp from port = domain to flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 33 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1777(0) pass in quick on mvneta0.50 inet proto tcp from port = 50000 to flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 33 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1778(0) pass in quick on mvneta0.50 inet proto tcp from port = mdns to flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 33 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1779(0) pass in quick on mvneta0.50 inet proto tcp from port = http to flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 33 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1780(0) pass in quick on mvneta0.50 inet proto tcp from port = 4070 to flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 33 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1781(0) pass in quick on mvneta0.50 inet proto tcp from port = 8883 to flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 33 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1782(0) pass in quick on mvneta0.50 inet proto tcp from port = 51200 to flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 33 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1783(0) pass in quick on mvneta0.50 inet proto tcp from port = ircd to flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 33 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1784(0) pass in quick on mvneta0.50 inet proto tcp from port = 33306 to flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 33 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1785(0) pass in quick on mvneta0.50 inet proto tcp from port = 9999 to flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 33 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1786(0) pass in quick on mvneta0.50 inet proto tcp from port = 8001 to flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 33 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1787(0) pass in quick on mvneta0.50 inet proto tcp from port = domain-s to flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 33 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1788(0) pass in quick on mvneta0.50 inet proto tcp from port = 8443 to flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 33 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1789(0) pass in quick on mvneta0.50 inet proto tcp from port = 5005 to flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 33 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1790(0) pass in quick on mvneta0.50 inet proto tcp from port = 42194 to flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 33 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1791(0) pass in quick on mvneta0.50 inet proto tcp from port 30011:30012 to flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 33 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1792(0) pass in quick on mvneta0.50 inet proto tcp from port = 9000 to flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 33 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1793(0) pass in quick on mvneta0.50 inet proto tcp from port = 5228 to flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 33 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1794(0) pass in quick on mvneta0.50 inet proto tcp from port = xmpp-client to flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 33 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1795(0) pass in quick on mvneta0.50 inet proto tcp from port = 3702 to flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 33 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1796(0) pass in quick on mvneta0.50 inet proto tcp from port = 5355 to flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 33 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1797(0) pass in quick on mvneta0.50 inet proto tcp from port = netbios-ns to flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 33 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1798(0) pass in quick on mvneta0.50 inet proto tcp from port = 9478 to flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 33 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1799(0) pass in quick on mvneta0.50 inet proto tcp from port = echo to flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 33 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1800(0) pass in quick on mvneta0.50 inet proto udp from port 8008:8009 to keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 33 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1801(0) pass in quick on mvneta0.50 inet proto udp from port = ssdp to keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1802(0) pass in quick on mvneta0.50 inet proto udp from port = domain to keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1803(0) pass in quick on mvneta0.50 inet proto udp from port = 50000 to keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1804(0) pass in quick on mvneta0.50 inet proto udp from port = mdns to keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1805(0) pass in quick on mvneta0.50 inet proto udp from port = http to keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1806(0) pass in quick on mvneta0.50 inet proto udp from port = 4070 to keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1807(0) pass in quick on mvneta0.50 inet proto udp from port = 8883 to keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1808(0) pass in quick on mvneta0.50 inet proto udp from port = 51200 to keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1809(0) pass in quick on mvneta0.50 inet proto udp from port = 6667 to keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1810(0) pass in quick on mvneta0.50 inet proto udp from port = 33306 to keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1811(0) pass in quick on mvneta0.50 inet proto udp from port = 9999 to keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1812(0) pass in quick on mvneta0.50 inet proto udp from port = 8001 to keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1813(0) pass in quick on mvneta0.50 inet proto udp from port = domain-s to keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1814(0) pass in quick on mvneta0.50 inet proto udp from port = 8443 to keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1815(0) pass in quick on mvneta0.50 inet proto udp from port = 5005 to keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1816(0) pass in quick on mvneta0.50 inet proto udp from port = 42194 to keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1817(0) pass in quick on mvneta0.50 inet proto udp from port 30011:30012 to keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1818(0) pass in quick on mvneta0.50 inet proto udp from port = 9000 to keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1819(0) pass in quick on mvneta0.50 inet proto udp from port = 5228 to keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1820(0) pass in quick on mvneta0.50 inet proto udp from port = xmpp-client to keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1821(0) pass in quick on mvneta0.50 inet proto udp from port = 3702 to keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1822(0) pass in quick on mvneta0.50 inet proto udp from port = 5355 to keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1823(0) pass in quick on mvneta0.50 inet proto udp from port = netbios-ns to keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1824(0) pass in quick on mvneta0.50 inet proto udp from port = 9478 to keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1825(0) pass in quick on mvneta0.50 inet proto udp from port = echo to keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537116 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1826(0) pass in quick on mvneta0.50 inet proto tcp from to port 32767 >< 61001 flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537231 [ Evaluations: 33 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1827(0) pass in quick on mvneta0.50 inet proto tcp from port 32767 >< 61001 to flags S/SA keep state label "USER_RULE: VL40_DEVICE: Pass Chromecast to local subnets" ridentifier 1628537260 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1828(0) pass in quick on mvneta0.50 inet proto tcp from any to port = 32400 flags S/SA keep state label "USER_RULE: VL50: Pass traffic to plex server" ridentifier 1640406724 [ Evaluations: 65014 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1829(0) pass in quick on mvneta0.50 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.50.0/24 to ! port 6881:6889 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass outgoing traffic (all ports) throu..." ridentifier 1590544056 [ Evaluations: 64689 Packets: 28282 Bytes: 2796809 States: 8 ] [ Inserted: pid 17662 State Creations: 17 ] @1830(0) pass in quick on mvneta0.50 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.50.0/24 to ! port 40000:65530 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass outgoing traffic (all ports) throu..." ridentifier 1590544056 [ Evaluations: 61448 Packets: 1234889 Bytes: 767841449 States: 169 ] [ Inserted: pid 17662 State Creations: 355 ] @1831(0) pass in quick on mvneta0.50 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.50.0/24 to ! port = 8123 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass outgoing traffic (all ports) throu..." ridentifier 1590544056 [ Evaluations: 13470 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1832(0) pass in quick on mvneta0.50 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.50.0/24 to ! port = http flags S/SA keep state label "USER_RULE: VL50_NAS: Pass outgoing traffic (all ports) throu..." ridentifier 1590544056 [ Evaluations: 13470 Packets: 59043 Bytes: 9207151 States: 11 ] [ Inserted: pid 17662 State Creations: 23 ] @1833(0) pass in quick on mvneta0.50 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.50.0/24 to ! port = https flags S/SA keep state label "USER_RULE: VL50_NAS: Pass outgoing traffic (all ports) throu..." ridentifier 1590544056 [ Evaluations: 8797 Packets: 55049 Bytes: 21291399 States: 6 ] [ Inserted: pid 17662 State Creations: 8 ] @1834(0) pass in quick on mvneta0.50 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.50.0/24 to ! port = 2710 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass outgoing traffic (all ports) throu..." ridentifier 1590544056 [ Evaluations: 8118 Packets: 66414 Bytes: 6822597 States: 2 ] [ Inserted: pid 17662 State Creations: 20 ] @1835(0) pass in quick on mvneta0.50 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.50.0/24 to ! port = 32400 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass outgoing traffic (all ports) throu..." ridentifier 1590544056 [ Evaluations: 1494 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1836(0) pass in quick on mvneta0.50 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.50.0/24 to ! port = 8443 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass outgoing traffic (all ports) throu..." ridentifier 1590544056 [ Evaluations: 1494 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1837(0) pass in quick on mvneta0.50 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.50.0/24 to ! port = 27474 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass outgoing traffic (all ports) throu..." ridentifier 1590544056 [ Evaluations: 1494 Packets: 376 Bytes: 89026 States: 1 ] [ Inserted: pid 17662 State Creations: 1 ] @1838(0) pass in quick on mvneta0.50 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.50.0/24 to ! port = ssh flags S/SA keep state label "USER_RULE: VL50_NAS: Pass outgoing traffic (all ports) throu..." ridentifier 1590544056 [ Evaluations: 1467 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1839(0) pass in quick on mvneta0.50 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.50.0/24 to ! port = 34000 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass outgoing traffic (all ports) throu..." ridentifier 1590544056 [ Evaluations: 1467 Packets: 3489 Bytes: 340256 States: 1 ] [ Inserted: pid 17662 State Creations: 2 ] @1840(0) pass in quick on mvneta0.50 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.50.0/24 to ! port = git flags S/SA keep state label "USER_RULE: VL50_NAS: Pass outgoing traffic (all ports) throu..." ridentifier 1590544056 [ Evaluations: 1120 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1841(0) pass in quick on mvneta0.50 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.50.0/24 to ! port = 8884 flags S/SA keep state label "USER_RULE: VL50_NAS: Pass outgoing traffic (all ports) throu..." ridentifier 1590544056 [ Evaluations: 1120 Packets: 4310 Bytes: 375526 States: 1 ] [ Inserted: pid 17662 State Creations: 2 ] @1842(0) pass in quick on mvneta0.50 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.50.0/24 to ! port 6881:6889 keep state label "USER_RULE: VL50_NAS: Pass outgoing traffic (all ports) throu..." ridentifier 1590544056 [ Evaluations: 1107 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1843(0) pass in quick on mvneta0.50 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.50.0/24 to ! port 40000:65530 keep state label "USER_RULE: VL50_NAS: Pass outgoing traffic (all ports) throu..." ridentifier 1590544056 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1844(0) pass in quick on mvneta0.50 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.50.0/24 to ! port = 8123 keep state label "USER_RULE: VL50_NAS: Pass outgoing traffic (all ports) throu..." ridentifier 1590544056 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1845(0) pass in quick on mvneta0.50 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.50.0/24 to ! port = http keep state label "USER_RULE: VL50_NAS: Pass outgoing traffic (all ports) throu..." ridentifier 1590544056 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1846(0) pass in quick on mvneta0.50 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.50.0/24 to ! port = https keep state label "USER_RULE: VL50_NAS: Pass outgoing traffic (all ports) throu..." ridentifier 1590544056 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1847(0) pass in quick on mvneta0.50 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.50.0/24 to ! port = 2710 keep state label "USER_RULE: VL50_NAS: Pass outgoing traffic (all ports) throu..." ridentifier 1590544056 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1848(0) pass in quick on mvneta0.50 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.50.0/24 to ! port = 32400 keep state label "USER_RULE: VL50_NAS: Pass outgoing traffic (all ports) throu..." ridentifier 1590544056 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1849(0) pass in quick on mvneta0.50 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.50.0/24 to ! port = 8443 keep state label "USER_RULE: VL50_NAS: Pass outgoing traffic (all ports) throu..." ridentifier 1590544056 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1850(0) pass in quick on mvneta0.50 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.50.0/24 to ! port = 27474 keep state label "USER_RULE: VL50_NAS: Pass outgoing traffic (all ports) throu..." ridentifier 1590544056 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1851(0) pass in quick on mvneta0.50 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.50.0/24 to ! port = ssh keep state label "USER_RULE: VL50_NAS: Pass outgoing traffic (all ports) throu..." ridentifier 1590544056 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1852(0) pass in quick on mvneta0.50 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.50.0/24 to ! port = 34000 keep state label "USER_RULE: VL50_NAS: Pass outgoing traffic (all ports) throu..." ridentifier 1590544056 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1853(0) pass in quick on mvneta0.50 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.50.0/24 to ! port = git keep state label "USER_RULE: VL50_NAS: Pass outgoing traffic (all ports) throu..." ridentifier 1590544056 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1854(0) pass in quick on mvneta0.50 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.50.0/24 to ! port = 8884 keep state label "USER_RULE: VL50_NAS: Pass outgoing traffic (all ports) throu..." ridentifier 1590544056 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1855(0) block return in log quick on mvneta0.50 inet all label "USER_RULE: VL50_NAS: Default block rule ipv4" ridentifier 1590544191 [ Evaluations: 1434 Packets: 1434 Bytes: 76314 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1856(0) block return in log quick on mvneta0.50 inet6 all label "USER_RULE: VL50_NAS: Default block rule ipv6" ridentifier 1590544206 [ Evaluations: 3 Packets: 3 Bytes: 228 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1857(0) pass in quick on ovpnc1 reply-to (ovpnc1 10.22.142.1) inet proto tcp from any to port = 48196 flags S/SA keep state label "USER_RULE: NAT VPN1_WAN: Torrent client port forward" ridentifier 1590426319 [ Evaluations: 9715 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1858(0) pass in quick on ovpnc1 reply-to (ovpnc1 10.22.142.1) inet proto tcp from any to port = 32400 flags S/SA keep state label "USER_RULE: NAT VPN1_WAN: Plex client port forward" ridentifier 1624381803 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1859(0) block drop in log quick on ovpnc1 reply-to (ovpnc1 10.22.142.1) inet all label "USER_RULE: VPN_WAN: default block IPv4" ridentifier 1588959807 [ Evaluations: 11 Packets: 11 Bytes: 594 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1860(0) block drop in quick on ovpnc1 inet6 all label "USER_RULE: VPN_WAN: default block IPv6" ridentifier 1588959864 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1861(0) pass in quick on ovpnc3 reply-to (ovpnc3 10.25.142.1) inet proto tcp from any to port = 48196 flags S/SA keep state label "USER_RULE: NAT VPN2_WAN: Torrent client port forward" ridentifier 1590465004 [ Evaluations: 9704 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1862(0) pass in quick on ovpnc3 reply-to (ovpnc3 10.25.142.1) inet proto tcp from any to port = 32400 flags S/SA keep state label "USER_RULE: NAT VPN2_WAN: Plex client port forward" ridentifier 1624381840 [ Evaluations: 31 Packets: 784 Bytes: 213178 States: 0 ] [ Inserted: pid 17662 State Creations: 1 ] @1863(0) block drop in log quick on ovpnc3 reply-to (ovpnc3 10.25.142.1) inet all label "USER_RULE: VPN2_WAN: default block IPv4" ridentifier 1590260843 [ Evaluations: 17 Packets: 17 Bytes: 2461 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1864(0) block drop in quick on ovpnc3 inet6 all label "USER_RULE: VPN2_WAN: default block IPv6" ridentifier 1590260866 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1865(0) pass in quick on ovpnc5 reply-to (ovpnc5 10.17.14.1) inet proto tcp from any to port = 48196 flags S/SA keep state label "USER_RULE: NAT VPN3_WAN: Torrent client port forward" ridentifier 1590465026 [ Evaluations: 9656 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1866(0) pass in quick on ovpnc5 reply-to (ovpnc5 10.17.14.1) inet proto tcp from any to port = 32400 flags S/SA keep state label "USER_RULE: NAT VPN3_WAN: Plex client port forward" ridentifier 1624381858 [ Evaluations: 17 Packets: 265 Bytes: 82897 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1867(0) block return in log quick on ovpnc5 reply-to (ovpnc5 10.17.14.1) inet all label "USER_RULE: VPN3_WAN: Default reject IPv4" ridentifier 1591510563 [ Evaluations: 42 Packets: 42 Bytes: 6531 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1868(0) block return in quick on ovpnc5 inet6 all label "USER_RULE: VPN3_WAN: Default reject IPv6" ridentifier 1590264130 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1869(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto icmp from 192.168.200.0/24 to any keep state label "USER_RULE: RW_VPN: Allow ICMP" ridentifier 1590659802 [ Evaluations: 9611 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1870(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to 127.0.0.1 port = ntp flags S/SA keep state label "USER_RULE: NAT RW_VPN: NTP redirect" ridentifier 1634073249 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1871(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to 127.0.0.1 port = ntp keep state label "USER_RULE: NAT RW_VPN: NTP redirect" ridentifier 1634073249 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1872(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to 127.0.0.1 port = domain flags S/SA keep state label "USER_RULE: NAT RW_VPN: DNS redirect" ridentifier 1634073405 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1873(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to 127.0.0.1 port = domain keep state label "USER_RULE: NAT RW_VPN: DNS redirect" ridentifier 1634073405 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1874(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = domain flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1875(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port 5353:5354 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1876(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = ntp flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1877(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = ftp flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1878(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = ssh flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1879(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = snmp flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1880(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = http flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1881(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = https flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1882(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = printer flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1883(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = svrloc flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1884(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = ipp flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1885(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port 8080:8081 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1886(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 8880 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1887(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 8843 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1888(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 10001 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1889(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = commplex-link flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1890(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 5900 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1891(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 9000 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1892(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = rdp flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1893(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port 49152:65535 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1894(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 17500 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1895(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port 8008:8009 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1896(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = ssdp flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1897(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 5223 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1898(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 32400 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1899(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 4886 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1900(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = netbios-ns flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1901(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = osu-nms flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1902(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 6363 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1903(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port 32410:32414 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1904(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 32469 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1905(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 37248 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1906(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 37302 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1907(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 37306 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1908(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port 48000:49000 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1909(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 8324 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1910(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 3005 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1911(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 3702 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1912(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 5335 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1913(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 8123 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1914(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 8080 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1915(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 8020 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1916(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 32500 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1917(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 30011 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1918(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = afs3-fileserver flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1919(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port 319:320 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1920(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 41722 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1921(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 35465 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1922(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 37682 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1923(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 9080 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1924(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port 5452:5453 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1925(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 37245 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1926(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port 45000:48000 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1927(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = netbios-dgm flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1928(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 7070 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1929(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 9050 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1930(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 10665 flags S/SA keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1931(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = domain keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1932(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port 5353:5354 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1933(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = ntp keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1934(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = ftp keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1935(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = ssh keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1936(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = snmp keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1937(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = http keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1938(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = https keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1939(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = printer keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1940(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = svrloc keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1941(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = ipp keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1942(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port 8080:8081 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1943(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 8880 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1944(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 8843 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1945(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 10001 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1946(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = commplex-link keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1947(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 5900 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1948(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 9000 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1949(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 3389 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1950(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port 49152:65535 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1951(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 17500 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1952(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port 8008:8009 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1953(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = ssdp keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1954(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 5223 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1955(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 32400 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1956(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 4886 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1957(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = netbios-ns keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1958(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = osu-nms keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1959(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 6363 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1960(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port 32410:32414 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1961(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 32469 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1962(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 37248 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1963(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 37302 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1964(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 37306 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1965(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port 48000:49000 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1966(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 8324 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1967(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 3005 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1968(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 3702 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1969(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 5335 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1970(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 8123 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1971(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 8080 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1972(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 8020 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1973(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 32500 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1974(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 30011 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1975(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = afs3-fileserver keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1976(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port 319:320 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1977(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 41722 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1978(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 35465 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1979(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 37682 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1980(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 9080 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1981(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port 5452:5453 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1982(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 37245 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1983(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port 45000:48000 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1984(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = netbios-dgm keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1985(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 7070 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1986(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 9050 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1987(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 10665 keep state label "USER_RULE: RW_VPN: Allow local traffic" ridentifier 1590659846 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1988(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = ftp flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1989(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = ssh flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1990(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = http flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1991(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = https flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1992(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = submission flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1993(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = imaps flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1994(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = xmpp-client flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1995(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 8080 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1996(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = smtps flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1997(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = nntp flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1998(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = imap flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @1999(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = ircd flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2000(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = ircs-u flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2001(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 8443 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2002(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 8843 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2003(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port 40000:65535 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2004(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = mdns flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2005(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 8886 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2006(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = ssdp flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2007(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 5228 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2008(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 5223 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2009(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 8883 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2010(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port 4000:4001 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2011(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 3478 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2012(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 57673 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2013(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 8787 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2014(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port 8801:8810 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2015(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 3479 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2016(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = isakmp flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2017(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = sae-urn flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2018(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port 5000:5999 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2019(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 7483 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2020(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 33935 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2021(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 16716 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2022(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 34935 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2023(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 26950 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2024(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 2418 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2025(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 9410 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2026(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 8888 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2027(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 19443 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2028(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 4501 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2029(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 6473 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2030(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 19305 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2031(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 38721 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2032(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 32393 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2033(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 19302 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2034(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 34600 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2035(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = time flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2036(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 32400 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2037(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 4070 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2038(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 35985 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2039(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 8123 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2040(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 27474 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2041(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 28415 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2042(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 35120 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2043(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = git flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2044(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 34992 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2045(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port 16384:16386 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2046(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto tcp from 192.168.200.0/24 to port = 8130 flags S/SA keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2047(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = ftp keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2048(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = ssh keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2049(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = http keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2050(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = https keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2051(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = submission keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2052(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = imaps keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2053(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = xmpp-client keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2054(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 8080 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2055(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = smtps keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2056(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = nntp keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2057(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = imap keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2058(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 6667 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2059(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 6697 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2060(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 8443 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2061(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 8843 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2062(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port 40000:65535 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2063(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = mdns keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2064(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 8886 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2065(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = ssdp keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2066(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 5228 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2067(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 5223 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2068(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 8883 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2069(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port 4000:4001 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2070(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 3478 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2071(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 57673 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2072(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 8787 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2073(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port 8801:8810 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2074(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 3479 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2075(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = isakmp keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2076(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = sae-urn keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2077(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port 5000:5999 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2078(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 7483 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2079(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 33935 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2080(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 16716 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2081(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 34935 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2082(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 26950 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2083(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 2418 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2084(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 9410 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2085(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 8888 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2086(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 19443 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2087(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 4501 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2088(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 6473 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2089(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 19305 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2090(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 38721 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2091(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 32393 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2092(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 19302 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2093(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 34600 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2094(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = time keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2095(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 32400 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2096(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 4070 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2097(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 35985 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2098(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 8123 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2099(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 27474 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2100(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 28415 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2101(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 35120 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2102(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = git keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2103(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 34992 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2104(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port 16384:16386 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2105(0) pass in quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet proto udp from 192.168.200.0/24 to port = 8130 keep state label "USER_RULE: RW_VPN: Pass Selective routing addresses through ..." ridentifier 1626277306 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2106(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = ftp flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2107(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = ssh flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2108(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = http flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2109(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = https flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2110(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = submission flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2111(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = imaps flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2112(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = xmpp-client flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2113(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 8080 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2114(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = smtps flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2115(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = nntp flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2116(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = imap flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2117(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = ircd flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2118(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = ircs-u flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2119(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 8443 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2120(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 8843 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2121(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port 40000:65535 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2122(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = mdns flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2123(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 8886 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2124(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = ssdp flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2125(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 5228 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2126(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 5223 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2127(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 8883 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2128(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port 4000:4001 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2129(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 3478 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2130(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 57673 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2131(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 8787 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2132(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port 8801:8810 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2133(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 3479 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2134(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = isakmp flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2135(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = sae-urn flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2136(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port 5000:5999 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2137(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 7483 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2138(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 33935 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2139(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 16716 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2140(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 34935 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2141(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 26950 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2142(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 2418 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2143(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 9410 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2144(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 8888 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2145(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 19443 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2146(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 4501 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2147(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 6473 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2148(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 19305 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2149(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 38721 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2150(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 32393 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2151(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 19302 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2152(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 34600 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2153(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = time flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2154(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 32400 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2155(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 4070 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2156(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 35985 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2157(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 8123 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2158(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 27474 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2159(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 28415 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2160(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 35120 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2161(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = git flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2162(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 34992 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2163(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port 16384:16386 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2164(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto tcp from 192.168.200.0/24 to ! port = 8130 flags S/SA keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2165(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = ftp keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2166(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = ssh keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2167(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = http keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2168(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = https keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2169(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = submission keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2170(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = imaps keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2171(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = xmpp-client keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2172(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 8080 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2173(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = smtps keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2174(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = nntp keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2175(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = imap keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2176(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 6667 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2177(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 6697 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2178(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 8443 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2179(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 8843 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2180(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port 40000:65535 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2181(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = mdns keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2182(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 8886 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2183(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = ssdp keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2184(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 5228 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2185(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 5223 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2186(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 8883 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2187(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port 4000:4001 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2188(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 3478 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2189(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 57673 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2190(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 8787 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2191(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port 8801:8810 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2192(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 3479 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2193(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = isakmp keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2194(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = sae-urn keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2195(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port 5000:5999 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2196(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 7483 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2197(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 33935 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2198(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 16716 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2199(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 34935 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2200(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 26950 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2201(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 2418 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2202(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 9410 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2203(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 8888 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2204(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 19443 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2205(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 4501 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2206(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 6473 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2207(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 19305 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2208(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 38721 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2209(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 32393 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2210(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 19302 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2211(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 34600 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2212(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = time keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2213(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 32400 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2214(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 4070 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2215(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 35985 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2216(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 8123 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2217(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 27474 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2218(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 28415 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2219(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 35120 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2220(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = git keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2221(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 34992 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2222(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port 16384:16386 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2223(0) pass in quick on ovpns2 route-to { (ovpnc1 10.22.142.1), (ovpnc3 10.25.142.1), (ovpnc5 10.17.14.1) } round-robin sticky-address inet proto udp from 192.168.200.0/24 to ! port = 8130 keep state label "USER_RULE: RW_VPN: Pass outbound traffic" ridentifier 1625118248 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2224(0) block return in log quick on ovpns2 reply-to (ovpns2 192.168.200.1) inet all label "USER_RULE: RW_VPN: Default reject rule IPv4" ridentifier 1590659940 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2225(0) block return in quick on ovpns2 inet6 all label "USER_RULE: RW_VPN: Default reject rule IPv6" ridentifier 1590659955 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2226(0) block return in quick on mvneta0.60 inet proto tcp from 192.168.60.0/24 to label "USER_RULE: VL60_Guest: Reject pfBlockerNG PRI1 list" ridentifier 1604532007 [ Evaluations: 9611 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2227(0) block return in quick on mvneta0.60 inet proto udp from 192.168.60.0/24 to label "USER_RULE: VL60_Guest: Reject pfBlockerNG PRI1 list" ridentifier 1604532007 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2228(0) block return in quick on mvneta0.60 inet proto tcp from 192.168.60.0/24 to (self:13) port = https label "USER_RULE: VL60_GUEST: Reject pfsense admin interfaces" ridentifier 1604531917 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2229(0) block return in quick on mvneta0.60 inet proto tcp from 192.168.60.0/24 to (self:13) port = ssh label "USER_RULE: VL60_GUEST: Reject pfsense admin interfaces" ridentifier 1604531917 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2230(0) block return in quick on mvneta0.60 inet proto tcp from 192.168.60.0/24 to (self:13) port = 8080 label "USER_RULE: VL60_GUEST: Reject pfsense admin interfaces" ridentifier 1604531917 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2231(0) block return in quick on mvneta0.60 inet proto tcp from 192.168.60.0/24 to (self:13) port = 8112 label "USER_RULE: VL60_GUEST: Reject pfsense admin interfaces" ridentifier 1604531917 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2232(0) block return in quick on mvneta0.60 inet proto tcp from 192.168.60.0/24 to (self:13) port = 6363 label "USER_RULE: VL60_GUEST: Reject pfsense admin interfaces" ridentifier 1604531917 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2233(0) block return in quick on mvneta0.60 inet proto udp from 192.168.60.0/24 to (self:13) port = https label "USER_RULE: VL60_GUEST: Reject pfsense admin interfaces" ridentifier 1604531917 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2234(0) block return in quick on mvneta0.60 inet proto udp from 192.168.60.0/24 to (self:13) port = ssh label "USER_RULE: VL60_GUEST: Reject pfsense admin interfaces" ridentifier 1604531917 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2235(0) block return in quick on mvneta0.60 inet proto udp from 192.168.60.0/24 to (self:13) port = 8080 label "USER_RULE: VL60_GUEST: Reject pfsense admin interfaces" ridentifier 1604531917 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2236(0) block return in quick on mvneta0.60 inet proto udp from 192.168.60.0/24 to (self:13) port = 8112 label "USER_RULE: VL60_GUEST: Reject pfsense admin interfaces" ridentifier 1604531917 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2237(0) block return in quick on mvneta0.60 inet proto udp from 192.168.60.0/24 to (self:13) port = 6363 label "USER_RULE: VL60_GUEST: Reject pfsense admin interfaces" ridentifier 1604531917 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2238(0) pass in quick on mvneta0.60 inet proto icmp from 192.168.60.0/24 to any icmp-type echoreq keep state label "USER_RULE: VL60_GUEST: Pass ICMP" ridentifier 1604532344 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2239(0) pass in quick on mvneta0.60 inet proto tcp from 192.168.60.0/24 to ! flags S/SA keep state label "USER_RULE: VL60_GUEST: Pass WAN" ridentifier 1604532621 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2240(0) pass in quick on mvneta0.60 inet proto udp from 192.168.60.0/24 to ! keep state label "USER_RULE: VL60_GUEST: Pass WAN" ridentifier 1604532621 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2241(0) block return in log quick on mvneta0.60 inet proto tcp from 192.168.60.0/24 to label "USER_RULE: VL60_GUEST: Reject any local traffic" ridentifier 1604532116 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2242(0) block return in log quick on mvneta0.60 inet proto udp from 192.168.60.0/24 to label "USER_RULE: VL60_GUEST: Reject any local traffic" ridentifier 1604532116 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2243(0) block return in log quick on mvneta0.60 inet all label "USER_RULE: VL60_GUEST: default block IPv4" ridentifier 1604532414 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2244(0) block return in quick on mvneta0.60 inet6 all label "USER_RULE: VL60_GUEST: default block IPv6" ridentifier 1604532444 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2245(0) anchor "tftp-proxy/*" all [ Evaluations: 433562 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] @2246(0) anchor "miniupnpd" all [ Evaluations: 433562 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: pid 17662 State Creations: 0 ] 5.677u 4.668s 0:13.07 79.0% 194+179k 1+0io 0pf+0w [22.01-RELEASE][admin@pfSense.local.lan]/tmp: