@0 scrub on em0 inet all fragment reassemble [ Evaluations: 26646070 Packets: 13251598 Bytes: 3504368929 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @1 scrub on em0 inet6 all fragment reassemble [ Evaluations: 7713 Packets: 7713 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @2 scrub on em1 inet all fragment reassemble [ Evaluations: 13386759 Packets: 13171735 Bytes: 3583299539 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @3 scrub on em1 inet6 all fragment reassemble [ Evaluations: 39833 Packets: 39833 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @4 scrub on ovpnc1 inet all fragment reassemble [ Evaluations: 175188 Packets: 43724 Bytes: 1040 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @5 scrub on ovpnc1 inet6 all fragment reassemble [ Evaluations: 26 Packets: 26 Bytes: 979 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @6 scrub on ovpnc2 inet all fragment reassemble [ Evaluations: 131438 Packets: 43676 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @7 scrub on ovpnc2 inet6 all fragment reassemble [ Evaluations: 6 Packets: 6 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @8 scrub on tun_wg0 inet all max-mss 1380 fragment reassemble [ Evaluations: 87759 Packets: 43722 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @9 scrub on tun_wg0 inet6 all max-mss 1360 fragment reassemble [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @10 scrub on tun_wg1 inet all max-mss 1380 fragment reassemble [ Evaluations: 44037 Packets: 43672 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @11 scrub on tun_wg1 inet6 all max-mss 1360 fragment reassemble [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @0 anchor "openvpn/*" all [ Evaluations: 266759 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @1 anchor "ipsec/*" all [ Evaluations: 266759 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @2 pass in quick on lo0 inet6 all flags S/SA keep state label "pass IPv6 loopback" ridentifier 1000000001 [ Evaluations: 266759 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @3 pass out quick on lo0 inet6 all flags S/SA keep state label "pass IPv6 loopback" ridentifier 1000000002 [ Evaluations: 116 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @4 block drop in log quick inet6 all label "Block all IPv6" ridentifier 1000000003 [ Evaluations: 266578 Packets: 47549 Bytes: 7898697 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @5 block drop out log quick inet6 all label "Block all IPv6" ridentifier 1000000004 [ Evaluations: 71078 Packets: 21 Bytes: 1928 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @6 block drop in log quick inet from 169.254.0.0/16 to any label "Block IPv4 link-local" ridentifier 1000000101 [ Evaluations: 219189 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @7 block drop in log quick inet from any to 169.254.0.0/16 label "Block IPv4 link-local" ridentifier 1000000102 [ Evaluations: 148016 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @8 block drop in log inet all label "Default deny rule IPv4" ridentifier 1000000103 [ Evaluations: 148016 Packets: 23154 Bytes: 1496498 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: Tue Nov 8 12:05:53 2022 ] @9 block drop out log inet all label "Default deny rule IPv4" ridentifier 1000000104 [ Evaluations: 219189 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @10 block drop in log inet6 all label "Default deny rule IPv6" ridentifier 1000000105 [ Evaluations: 219189 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @11 block drop out log inet6 all label "Default deny rule IPv6" ridentifier 1000000106 [ Evaluations: 71173 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @12 block drop log quick inet proto tcp from any port = 0 to any label "Block traffic from port 0" ridentifier 1000000107 [ Evaluations: 219189 Packets: 3 Bytes: 156 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: Tue Nov 8 11:16:12 2022 ] @13 block drop log quick inet proto udp from any port = 0 to any label "Block traffic from port 0" ridentifier 1000000107 [ Evaluations: 65826 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @14 block drop log quick inet proto tcp from any to any port = 0 label "Block traffic to port 0" ridentifier 1000000108 [ Evaluations: 219186 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @15 block drop log quick inet proto udp from any to any port = 0 label "Block traffic to port 0" ridentifier 1000000108 [ Evaluations: 65826 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @16 block drop log quick from to any label "Block snort2c hosts" ridentifier 1000000109 [ Evaluations: 219186 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @17 block drop log quick from any to label "Block snort2c hosts" ridentifier 1000000110 [ Evaluations: 219186 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @18 block drop in log quick proto tcp from to (self:14) port = ssh label "sshguard" ridentifier 1000000301 [ Evaluations: 219186 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @19 block drop in log quick proto tcp from to (self:14) port = 8282 label "GUI Lockout" ridentifier 1000000351 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @20 block drop in log quick from to any label "virusprot overload table" ridentifier 1000000400 [ Evaluations: 148013 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @21 pass in quick on em0 proto udp from any port = bootps to any port = bootpc keep state label "allow dhcp replies in WAN" ridentifier 1000000461 [ Evaluations: 148013 Packets: 2459 Bytes: 929545 States: 1 ] [ Inserted: uid 0 pid 77354 State Creations: 11 ] [ Last Active Time: Tue Nov 8 12:05:52 2022 ] @22 pass out quick on em0 proto udp from any port = bootpc to any port = bootps keep state label "allow dhcp client out WAN" ridentifier 1000000462 [ Evaluations: 73711 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @23 block drop in log on ! em0 inet from 70.188.246.0/23 to any ridentifier 1000001470 [ Evaluations: 219077 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @24 block drop in log inet from 70.188.246.181 to any ridentifier 1000001470 [ Evaluations: 204587 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @25 block drop in log on em0 inet6 from fe80::6a05:caff:fe2e:339d to any ridentifier 1000001470 [ Evaluations: 147905 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @26 block drop in log on ! em1 inet from 192.168.22.0/24 to any ridentifier 1000002520 [ Evaluations: 147905 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @27 block drop in log inet from 192.168.22.1 to any ridentifier 1000002520 [ Evaluations: 147905 Packets: 1 Bytes: 52 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @28 block drop in log on em1 inet6 from fe80::6a05:caff:fe2f:153c to any ridentifier 1000002520 [ Evaluations: 147905 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @29 block drop in log on ! ovpnc1 inet6 from fdda:d0d0:cafe:1197::/64 to any ridentifier 1000003570 [ Evaluations: 34522 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @30 block drop in log on ovpnc1 inet6 from fe80::6a05:caff:fe2e:339d to any ridentifier 1000003570 [ Evaluations: 20 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @31 block drop in log inet6 from fdda:d0d0:cafe:1197::100d to any ridentifier 1000003570 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @32 block drop in log on ! ovpnc1 inet from 10.11.0.0/16 to any ridentifier 1000003570 [ Evaluations: 146456 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @33 block drop in log inet from 10.11.0.15 to any ridentifier 1000003570 [ Evaluations: 146456 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @34 block drop in log on ! ovpnc2 inet6 from fdda:d0d0:cafe:1196::/64 to any ridentifier 1000004620 [ Evaluations: 146456 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @35 block drop in log on ovpnc2 inet6 from fe80::6a05:caff:fe2e:339d to any ridentifier 1000004620 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @36 block drop in log inet6 from fdda:d0d0:cafe:1196::100a to any ridentifier 1000004620 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @37 block drop in log on ! ovpnc2 inet from 10.10.0.0/16 to any ridentifier 1000004620 [ Evaluations: 146456 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @38 block drop in log inet from 10.10.0.12 to any ridentifier 1000004620 [ Evaluations: 146456 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @39 block drop in log on ! tun_wg0 inet from 10.65.82.233 to any ridentifier 1000005670 [ Evaluations: 148001 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @40 block drop in log inet from 10.65.82.233 to any ridentifier 1000005670 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @41 block drop in log on ! tun_wg1 inet from 10.64.137.39 to any ridentifier 1000006720 [ Evaluations: 148000 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @42 block drop in log inet from 10.64.137.39 to any ridentifier 1000006720 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @43 pass in on lo0 inet all flags S/SA keep state label "pass IPv4 loopback" ridentifier 1000009911 [ Evaluations: 148000 Packets: 130 Bytes: 10488 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 26 ] [ Last Active Time: Tue Nov 8 11:56:53 2022 ] @44 pass out on lo0 inet all flags S/SA keep state label "pass IPv4 loopback" ridentifier 1000009912 [ Evaluations: 71238 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @45 pass out inet all flags S/SA keep state allow-opts label "let out anything IPv4 from firewall host itself" ridentifier 1000009913 [ Evaluations: 219108 Packets: 251360 Bytes: 60645472 States: 49 ] [ Inserted: uid 0 pid 77354 State Creations: 14370 ] [ Last Active Time: Tue Nov 8 12:05:53 2022 ] @46 pass out route-to (em0 70.188.246.1) inet from 70.188.246.181 to ! 70.188.246.0/23 flags S/SA keep state allow-opts label "let out anything from firewall host itself" ridentifier 1000010011 [ Evaluations: 71172 Packets: 6594609 Bytes: 4664879816 States: 382 ] [ Inserted: uid 0 pid 77354 State Creations: 55549 ] [ Last Active Time: Tue Nov 8 12:05:53 2022 ] @47 pass out route-to (ovpnc1 10.11.0.15) inet from 10.11.0.15 to ! 10.11.0.0/16 flags S/SA keep state allow-opts label "let out anything from firewall host itself" ridentifier 1000010012 [ Evaluations: 70440 Packets: 23 Bytes: 667 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @48 pass out route-to (ovpnc1 fdda:d0d0:cafe:1197::) inet6 from fdda:d0d0:cafe:1197::100d to ! fdda:d0d0:cafe:1197::/64 flags S/SA keep state allow-opts label "let out anything from firewall host itself" ridentifier 1000010013 [ Evaluations: 70440 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @49 pass out route-to (ovpnc2 10.10.0.12) inet from 10.10.0.12 to ! 10.10.0.0/16 flags S/SA keep state allow-opts label "let out anything from firewall host itself" ridentifier 1000010014 [ Evaluations: 70440 Packets: 23 Bytes: 667 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @50 pass out route-to (ovpnc2 fdda:d0d0:cafe:1196::) inet6 from fdda:d0d0:cafe:1196::100a to ! fdda:d0d0:cafe:1196::/64 flags S/SA keep state allow-opts label "let out anything from firewall host itself" ridentifier 1000010015 [ Evaluations: 70440 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @51 pass out route-to (tun_wg0 10.65.82.233) inet from 10.65.82.233 to ! 10.65.82.233 flags S/SA keep state allow-opts label "let out anything from firewall host itself" ridentifier 1000010016 [ Evaluations: 71173 Packets: 39 Bytes: 1187 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @52 pass out route-to (tun_wg1 10.64.137.39) inet from 10.64.137.39 to ! 10.64.137.39 flags S/SA keep state allow-opts label "let out anything from firewall host itself" ridentifier 1000010017 [ Evaluations: 71173 Packets: 34 Bytes: 1462 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @53 pass in quick on em1 proto tcp from any to (em1:2) port = 8282 flags S/SA keep state label "anti-lockout rule" ridentifier 10001 [ Evaluations: 219173 Packets: 1791 Bytes: 1355167 States: 1 ] [ Inserted: uid 0 pid 77354 State Creations: 9 ] [ Last Active Time: Tue Nov 8 12:05:53 2022 ] @54 pass in quick on em1 proto tcp from any to (em1:2) port = ssh flags S/SA keep state label "anti-lockout rule" ridentifier 10001 [ Evaluations: 44376 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @55 anchor "userrules/*" all [ Evaluations: 219160 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @56 pass in quick on WireGuard inet all flags S/SA keep state label "USER_RULE" label "id:1623716891" ridentifier 1623716891 [ Evaluations: 219160 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @57 pass in quick on openvpn inet all flags S/SA keep state label "USER_RULE: OpenVPN Remote VPN2 wizard" label "id:1523287278" ridentifier 1523287278 [ Evaluations: 219160 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @58 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to 70.188.246.181 port = 51820 keep state label "USER_RULE: Pass traffic to WireGuard" label "id:1613233168" ridentifier 1613233168 [ Evaluations: 219064 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @59 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto icmp all keep state label "USER_RULE: Allow Pings" label "id:1419280969" ridentifier 1419280969 [ Evaluations: 35101 Packets: 346 Bytes: 13332 States: 1 ] [ Inserted: uid 0 pid 77354 State Creations: 167 ] [ Last Active Time: Tue Nov 8 12:05:46 2022 ] @60 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto tcp from any to 70.188.246.181 port = 8282 flags S/SA keep state label "USER_RULE: Allow remote admin of Pfsense" label "id:1419280970" ridentifier 1419280970 [ Evaluations: 34934 Packets: 15 Bytes: 5188 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 1 ] [ Last Active Time: Tue Nov 8 10:54:43 2022 ] @61 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to 70.188.246.181 port = 8282 keep state label "USER_RULE: Allow remote admin of Pfsense" label "id:1419280970" ridentifier 1419280970 [ Evaluations: 2536 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @62 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto tcp from any to port = ms-wbt-server flags S/SA keep state label "USER_RULE: NAT Remote Desktop Brandi" label "id:1419280971" ridentifier 1419280971 [ Evaluations: 34933 Packets: 76156 Bytes: 14659390 States: 18 ] [ Inserted: uid 0 pid 77354 State Creations: 4415 ] [ Last Active Time: Tue Nov 8 12:05:45 2022 ] @63 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to port = ms-wbt-server keep state label "USER_RULE: NAT Remote Desktop Brandi" label "id:1419280971" ridentifier 1419280971 [ Evaluations: 2537 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @64 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto tcp from any to port = 3390 flags S/SA keep state label "USER_RULE: NAT Remote Desktop Keith" label "id:1419280972" ridentifier 1419280972 [ Evaluations: 30511 Packets: 134797 Bytes: 25980090 States: 27 ] [ Inserted: uid 0 pid 77354 State Creations: 8195 ] [ Last Active Time: Tue Nov 8 12:05:51 2022 ] @65 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to port = 3390 keep state label "USER_RULE: NAT Remote Desktop Keith" label "id:1419280972" ridentifier 1419280972 [ Evaluations: 2536 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @66 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to 70.188.246.181 port = openvpn keep state label "USER_RULE: OpenVPN Remote VPN1 wizard" label "id:1434767411" ridentifier 1434767411 [ Evaluations: 22300 Packets: 1 Bytes: 46 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 1 ] [ Last Active Time: Tue Nov 8 08:49:43 2022 ] @67 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to port = discard keep state label "USER_RULE: NAT WOL KEITH-PC" label "id:1464092460" ridentifier 1464092460 [ Evaluations: 2535 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @68 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto tcp from any to port = 8096 flags S/SA keep state label "USER_RULE: NAT Emby" label "id:1464092462" ridentifier 1464092462 [ Evaluations: 22299 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @69 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to port = 8096 keep state label "USER_RULE: NAT Emby" label "id:1464092462" ridentifier 1464092462 [ Evaluations: 2535 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @70 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto tcp from any to port = 8920 flags S/SA keep state label "USER_RULE: NAT Emby" label "id:1469705408" ridentifier 1469705408 [ Evaluations: 44 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @71 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to port = 8920 keep state label "USER_RULE: NAT Emby" label "id:1469705408" ridentifier 1469705408 [ Evaluations: 1 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @72 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto tcp from any to port = 9000 flags S/SA keep state label "USER_RULE: NAT Buffalo NAS" label "id:1523759741" ridentifier 1523759741 [ Evaluations: 22299 Packets: 3561 Bytes: 2323908 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 128 ] [ Last Active Time: Tue Nov 8 10:10:55 2022 ] @73 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to port = 9000 keep state label "USER_RULE: NAT Buffalo NAS" label "id:1523759741" ridentifier 1523759741 [ Evaluations: 2535 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @74 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto tcp from any to port = 8443 flags S/SA keep state label "USER_RULE: NAT OpenConnect" label "id:1531746831" ridentifier 1531746831 [ Evaluations: 22171 Packets: 8753 Bytes: 4667774 States: 2 ] [ Inserted: uid 0 pid 77354 State Creations: 43 ] [ Last Active Time: Tue Nov 8 12:05:53 2022 ] @75 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to port = 8443 keep state label "USER_RULE: NAT OpenConnect" label "id:1531746831" ridentifier 1531746831 [ Evaluations: 2535 Packets: 1 Bytes: 1258 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 1 ] [ Last Active Time: Tue Nov 8 10:07:22 2022 ] @76 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto tcp from any to port = 9925 flags S/SA keep state label "USER_RULE: NAT Mealie Access" label "id:1626641131" ridentifier 1626641131 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @77 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to port = 9925 keep state label "USER_RULE: NAT Mealie Access" label "id:1626641131" ridentifier 1626641131 [ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @78 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto tcp from any to port = 8006 flags S/SA keep state label "USER_RULE: NAT Proxmox Access" label "id:1644072538" ridentifier 1644072538 [ Evaluations: 22127 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @79 pass in quick on em0 reply-to (em0 70.188.246.1) inet proto udp from any to port = 8006 keep state label "USER_RULE: NAT Proxmox Access" label "id:1644072538" ridentifier 1644072538 [ Evaluations: 2534 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @80 pass in quick on em1 route-to (em0 70.188.246.1) inet proto tcp from any to any port = smtp flags S/SA keep state label "USER_RULE: Send SMTP Mail out the correct gateway" label "id:1419280982" label "gw:WAN" ridentifier 1419280982 [ Evaluations: 149408 Packets: 172 Bytes: 147522 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 1 ] [ Last Active Time: Tue Nov 8 06:25:10 2022 ] @81 pass in quick on em1 route-to (em0 70.188.246.1) inet proto tcp from any to any port = smtps flags S/SA keep state label "USER_RULE: Send Cox Mail out the correct gateway" label "id:1517069208" label "gw:WAN" ridentifier 1517069208 [ Evaluations: 69434 Packets: 52 Bytes: 12849 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 2 ] [ Last Active Time: Tue Nov 8 09:36:36 2022 ] @82 pass in quick on em1 route-to (em0 70.188.246.1) inet from to any flags S/SA keep state label "USER_RULE: Allow Access - Keith" label "id:1419280987" label "gw:WAN" ridentifier 1419280987 [ Evaluations: 112703 Packets: 2576575 Bytes: 1550515702 States: 20 ] [ Inserted: uid 0 pid 77354 State Creations: 4439 ] [ Last Active Time: Tue Nov 8 12:05:53 2022 ] @83 pass in quick on em1 route-to (em0 70.188.246.1) inet from to any flags S/SA keep state label "USER_RULE: Allow Access - Brandi" label "id:1522603106" label "gw:WAN" ridentifier 1522603106 [ Evaluations: 108178 Packets: 108288 Bytes: 17940098 States: 18 ] [ Inserted: uid 0 pid 77354 State Creations: 2261 ] [ Last Active Time: Tue Nov 8 12:05:53 2022 ] @84 pass in quick on em1 route-to (em0 70.188.246.1) inet from to any flags S/SA keep state label "USER_RULE: Allow Access - HOME_PC" label "id:1427673108" label "gw:WAN" ridentifier 1427673108 [ Evaluations: 105784 Packets: 171712 Bytes: 50812107 States: 60 ] [ Inserted: uid 0 pid 77354 State Creations: 14369 ] [ Last Active Time: Tue Nov 8 12:05:50 2022 ] @85 pass in quick on em1 route-to (em0 70.188.246.1) inet from to any flags S/SA keep state label "USER_RULE: Allow Access - Kodi Media Center" label "id:1419280998" label "gw:WAN" ridentifier 1419280998 [ Evaluations: 91383 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @86 pass in quick on em1 route-to (em0 70.188.246.1) inet from to any flags S/SA keep state label "USER_RULE: Allow Access - Bedroom Chromecast" label "id:1528506444" label "gw:WAN" ridentifier 1528506444 [ Evaluations: 91383 Packets: 127304 Bytes: 128569330 States: 4 ] [ Inserted: uid 0 pid 77354 State Creations: 2201 ] [ Last Active Time: Tue Nov 8 12:05:49 2022 ] @87 pass in quick on em1 route-to (em0 70.188.246.1) inet from to any flags S/SA keep state label "USER_RULE: Allow Access - Emby" label "id:1522005928" label "gw:WAN" ridentifier 1522005928 [ Evaluations: 89150 Packets: 45609 Bytes: 38692025 States: 41 ] [ Inserted: uid 0 pid 77354 State Creations: 1606 ] [ Last Active Time: Tue Nov 8 12:05:52 2022 ] @88 pass in quick on em1 route-to (em0 70.188.246.1) inet from to any flags S/SA keep state label "USER_RULE: Allow Access - Google Home Hub" label "id:1560961857" label "gw:WAN" ridentifier 1560961857 [ Evaluations: 87541 Packets: 34130 Bytes: 9519168 States: 10 ] [ Inserted: uid 0 pid 77354 State Creations: 3537 ] [ Last Active Time: Tue Nov 8 12:05:52 2022 ] @89 pass in quick on em1 route-to (em0 70.188.246.1) inet from to any flags S/SA keep state label "USER_RULE: Allow Access - Google Home MBR" label "id:1526210099" label "gw:WAN" ridentifier 1526210099 [ Evaluations: 83908 Packets: 26613 Bytes: 6145568 States: 12 ] [ Inserted: uid 0 pid 77354 State Creations: 2199 ] [ Last Active Time: Tue Nov 8 12:05:53 2022 ] @90 pass in quick on em1 route-to (em0 70.188.246.1) inet from to any flags S/SA keep state label "USER_RULE: Allow Access - Google Home BR" label "id:1526210125" label "gw:WAN" ridentifier 1526210125 [ Evaluations: 81689 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @91 pass in quick on em1 route-to (em0 70.188.246.1) inet from to any flags S/SA keep state label "USER_RULE: Allow Access - Google Home BP" label "id:1560727664" label "gw:WAN" ridentifier 1560727664 [ Evaluations: 81689 Packets: 31186 Bytes: 7200362 States: 8 ] [ Inserted: uid 0 pid 77354 State Creations: 2547 ] [ Last Active Time: Tue Nov 8 12:05:50 2022 ] @92 pass in quick on em1 route-to (em0 70.188.246.1) inet from to any flags S/SA keep state label "USER_RULE: Allow Access - Google Home Mini LR" label "id:1537098804" label "gw:WAN" ridentifier 1537098804 [ Evaluations: 79121 Packets: 26617 Bytes: 5189453 States: 10 ] [ Inserted: uid 0 pid 77354 State Creations: 2206 ] [ Last Active Time: Tue Nov 8 12:05:51 2022 ] @93 pass in quick on em1 route-to (em0 70.188.246.1) inet from to any flags S/SA keep state label "USER_RULE: Allow Access - Smartthings Hub" label "id:1527633093" label "gw:WAN" ridentifier 1527633093 [ Evaluations: 76884 Packets: 16708 Bytes: 3977794 States: 10 ] [ Inserted: uid 0 pid 77354 State Creations: 3282 ] [ Last Active Time: Tue Nov 8 12:05:51 2022 ] @94 pass in quick on em1 route-to (em0 70.188.246.1) inet from to any flags S/SA keep state label "USER_RULE: Allow Access - ArloHome" label "id:1543081952" label "gw:WAN" ridentifier 1543081952 [ Evaluations: 73598 Packets: 813445 Bytes: 616803584 States: 69 ] [ Inserted: uid 0 pid 77354 State Creations: 13746 ] [ Last Active Time: Tue Nov 8 12:05:51 2022 ] @95 pass in quick on em1 route-to (em0 70.188.246.1) inet from to any flags S/SA keep state label "USER_RULE: Allow Access - ArloRemote" label "id:1579270767" label "gw:WAN" ridentifier 1579270767 [ Evaluations: 59731 Packets: 10613 Bytes: 3695366 States: 1 ] [ Inserted: uid 0 pid 77354 State Creations: 681 ] [ Last Active Time: Tue Nov 8 12:05:52 2022 ] @96 pass in quick on em1 route-to (em0 70.188.246.1) inet from to any flags S/SA keep state label "USER_RULE: Allow Access - ArloBridge" label "id:1579645172" label "gw:WAN" ridentifier 1579645172 [ Evaluations: 59044 Packets: 4537 Bytes: 256375 States: 1 ] [ Inserted: uid 0 pid 77354 State Creations: 42 ] [ Last Active Time: Tue Nov 8 12:05:44 2022 ] @97 pass in quick on em1 route-to (em0 70.188.246.1) inet from to any flags S/SA keep state label "USER_RULE: Allow Access - Arlo Video Doorbell" label "id:1574788520" label "gw:WAN" ridentifier 1574788520 [ Evaluations: 59002 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @98 pass in quick on em1 route-to (em0 70.188.246.1) inet from to any flags S/SA keep state label "USER_RULE: Allow Access - Hue Hub" label "id:1527633127" label "gw:WAN" ridentifier 1527633127 [ Evaluations: 59002 Packets: 7779 Bytes: 1278701 States: 2 ] [ Inserted: uid 0 pid 77354 State Creations: 435 ] [ Last Active Time: Tue Nov 8 12:05:40 2022 ] @99 pass in quick on em1 route-to (em0 70.188.246.1) inet from to any flags S/SA keep state label "USER_RULE: Allow Access - August_Connect" label "id:1581975806" label "gw:WAN" ridentifier 1581975806 [ Evaluations: 58559 Packets: 19911 Bytes: 2838828 States: 4 ] [ Inserted: uid 0 pid 77354 State Creations: 486 ] [ Last Active Time: Tue Nov 8 12:05:50 2022 ] @100 pass in quick on em1 route-to (em0 70.188.246.1) inet from to any flags S/SA keep state label "USER_RULE: Allow Access - Isaacs PC" label "id:1613838127" label "gw:WAN" ridentifier 1613838127 [ Evaluations: 58071 Packets: 573448 Bytes: 401206496 States: 31 ] [ Inserted: uid 0 pid 77354 State Creations: 3331 ] [ Last Active Time: Tue Nov 8 12:05:53 2022 ] @101 pass in quick on em1 route-to (em0 70.188.246.1) inet from to any flags S/SA keep state label "USER_RULE: Allow Access - Isaacs Phone" label "id:1528647414" label "gw:WAN" ridentifier 1528647414 [ Evaluations: 54688 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @102 pass in quick on em1 route-to (em0 70.188.246.1) inet from to any flags S/SA keep state label "USER_RULE: Allow Access - Erics PC" label "id:1613838488" label "gw:WAN" ridentifier 1613838488 [ Evaluations: 54688 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @103 pass in quick on em1 route-to (em0 70.188.246.1) inet from to any flags S/SA keep state label "USER_RULE: Allow Access - Eric TV" label "id:1521592795" label "gw:WAN" ridentifier 1521592795 [ Evaluations: 54688 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @104 pass in quick on em1 route-to (em0 70.188.246.1) inet from 192.168.22.0/24 to any flags S/SA keep state label "USER_RULE: Default allow LAN to any rule" label "id:1419281000" label "gw:WAN" ridentifier 1419281000 [ Evaluations: 54688 Packets: 2303085 Bytes: 1913883185 States: 246 ] [ Inserted: uid 0 pid 77354 State Creations: 53295 ] [ Last Active Time: Tue Nov 8 12:05:53 2022 ] @105 pass in quick on ovpnc1 reply-to (ovpnc1 10.11.0.15) inet all flags S/SA keep state label "USER_RULE" label "id:1623886753" ridentifier 1623886753 [ Evaluations: 22456 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @106 pass in quick on tun_wg1 reply-to (tun_wg1 10.64.137.39) inet all flags S/SA keep state label "USER_RULE" label "id:1648767261" ridentifier 1648767261 [ Evaluations: 23336 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @107 anchor "tftp-proxy/*" all [ Evaluations: 94393 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ] @108 anchor "miniupnpd" all [ Evaluations: 94393 Packets: 0 Bytes: 0 States: 0 ] [ Inserted: uid 0 pid 77354 State Creations: 0 ] [ Last Active Time: N/A ]