Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Помогите разобраться с сыкой котарая испl

    Scheduled Pinned Locked Moved Russian
    71 Posts 6 Posters 27.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • E
      Eugene
      last edited by

      @Evgeny:

      как проверяешь локалку и интернет?

      http://ru.doc.pfsense.org

      1 Reply Last reply Reply Quote 0
      • I
        iliaxxx
        last edited by

        параметры сети
        192.168.200.0/24
        гейт 192.168.200.254 (Онже и pfSense)
        DNS 192.168.200.1

        Захожу на 192.168.200.254
        System: Advanced functions - Снимаю галочку с "Disable NAT Reflection", кликаю на "Save"
        Захжу на комп с IP 192.168.200.145. Пытаюсь зайти на www.yandex.ru. Ничего он просто долго тупит…. Но так и не открывает сайт. Пытаюсьзайти на локальные ресурсы. Тоже самое, долго тупит, но страницу в этоге так и не открывает.

        Снимаю галочку на "Disable NAT Reflection" кликаю на "Save", интернет тут же появляются, локальные ресурсы все так же не отображаются.

        Вто то что я делаю.
        Я тут одному знакомому форумчанениу, который настраивал уже у себя этого зверька закинул свой конфиг на анализ status.php. И вот что получил в ответ

        Бегло пробежался. На сколько я понял, инет идёт через pppoe. Получается три интерфейса: локалка своя, локалка провайдера и виртуальный интерфейс с инетом. А в конфиге только два. Это уже наводит на мысли.

        Кстати, может по этому rip так у мея и не заработал….

        1 Reply Last reply Reply Quote 0
        • E
          Eugene
          last edited by

          скинь мне```
          ifconfig
          netstat -rn
          pfctl -sr
          pfctl -sn

          для двух случаев:
          1) когда disable nat reflection галка стоит
          2) галка убрана.

          http://ru.doc.pfsense.org

          1 Reply Last reply Reply Quote 0
          • I
            iliaxxx
            last edited by

            Когда галочка стоит

            $ ifconfig
            nfe0: flags=8843 <up,broadcast,running,simplex,multicast>metric 0 mtu 1500
            	options=14b <rxcsum,txcsum,vlan_mtu,polling,tso4>ether 00:1d:60:d3:aa:04
            	inet6 fe80::21d:60ff:fed3:aa04%nfe0 prefixlen 64 scopeid 0x1 
            	media: Ethernet autoselect (100baseTX <full-duplex>)
            	status: active
            ste0: flags=8843 <up,broadcast,running,simplex,multicast>metric 0 mtu 1500
            	options=48 <vlan_mtu,polling>ether 20:cf:30:b6:c1:b1
            	inet6 fe80::22cf:30ff:feb6:c1b1%ste0 prefixlen 64 scopeid 0x2 
            	inet 192.168.200.254 netmask 0xffffff00 broadcast 192.168.200.255
            	media: Ethernet autoselect (100baseTX <full-duplex>)
            	status: active
            lo0: flags=8049 <up,loopback,running,multicast>metric 0 mtu 16384
            	inet 127.0.0.1 netmask 0xff000000 
            	inet6 ::1 prefixlen 128 
            	inet6 fe80::1%lo0 prefixlen 64 scopeid 0x3 
            enc0: flags=0<> metric 0 mtu 1536
            pflog0: flags=100 <promisc>metric 0 mtu 33204
            pfsync0: flags=41 <up,running>metric 0 mtu 1460
            	pfsync: syncdev: lo0 syncpeer: 224.0.0.240 maxupd: 128
            ng0: flags=88d1 <up,pointopoint,running,noarp,simplex,multicast>metric 0 mtu 1492
            	inet6 fe80::21d:60ff:fed3:aa04%ng0 prefixlen 64 scopeid 0x7 
            	inet 217.197.240.43 --> 217.197.255.32 netmask 0xffffffff</up,pointopoint,running,noarp,simplex,multicast></up,running></promisc></up,loopback,running,multicast></full-duplex></vlan_mtu,polling></up,broadcast,running,simplex,multicast></full-duplex></rxcsum,txcsum,vlan_mtu,polling,tso4></up,broadcast,running,simplex,multicast> 
            
            $ netstat -rn
            Routing tables
            
            Internet:
            Destination        Gateway            Flags    Refs      Use  Netif Expire
            default            217.197.255.32     UGS         0 61336831    ng0
            127.0.0.1          127.0.0.1          UH          0   133499    lo0
            192.168.200.0/24   link#2             UC          0        0   ste0
            192.168.200.1      00:15:17:e5:72:77  UHLW        1 189537540   ste0    730
            192.168.200.105    00:13:e8:9b:b2:15  UHLW        1     4121   ste0    752
            217.197.240.43     lo0                UHS         0        0    lo0
            217.197.255.32     217.197.240.43     UH          1     1485    ng0
            
            Internet6:
            Destination                       Gateway                       Flags      Netif Expire
            ::1                               ::1                           UHL         lo0
            fe80::%nfe0/64                    link#1                        UC         nfe0
            fe80::21d:60ff:fed3:aa04%nfe0     00:1d:60:d3:aa:04             UHL         lo0
            fe80::%ste0/64                    link#2                        UC         ste0
            fe80::22cf:30ff:feb6:c1b1%ste0    20:cf:30:b6:c1:b1             UHL         lo0
            fe80::%lo0/64                     fe80::1%lo0                   U           lo0
            fe80::1%lo0                       link#3                        UHL         lo0
            fe80::%ng0/64                     link#7                        UC          ng0
            fe80::21d:60ff:fed3:aa04%ng0      link#7                        UHL         lo0
            ff01:1::/32                       link#1                        UC         nfe0
            ff01:2::/32                       link#2                        UC         ste0
            ff01:3::/32                       ::1                           UC          lo0
            ff01:7::/32                       link#7                        UC          ng0
            ff02::%nfe0/32                    link#1                        UC         nfe0
            ff02::%ste0/32                    link#2                        UC         ste0
            ff02::%lo0/32                     ::1                           UC          lo0
            ff02::%ng0/32                     link#7                        UC          ng0
            
            $ pfctl -sr
            scrub all random-id max-mss 1452 fragment reassemble
            anchor "ftpsesame/*" all
            anchor "firewallrules" all
            block drop quick proto tcp from any port = 0 to any
            block drop quick proto udp from any port = 0 to any
            block drop quick proto tcp from any to any port = 0
            block drop quick proto udp from any to any port = 0
            block drop quick from <snort2c> to any label "Block snort2c hosts"
            block drop quick from any to <snort2c> label "Block snort2c hosts"
            anchor "loopback" all
            pass in quick on lo0 all flags S/SA keep state label "pass loopback"
            pass out quick on lo0 all flags S/SA keep state label "pass loopback"
            anchor "packageearly" all
            anchor "carp" all
            pass quick inet proto icmp from 217.197.240.43 to any keep state
            anchor "dhcpserverlan" all
            pass in quick on ste0 inet proto udp from any port = bootpc to 255.255.255.255 port = bootps keep state label "allow access to DHCP server on LAN"
            pass in quick on ste0 inet proto udp from any port = bootpc to 192.168.200.254 port = bootps keep state label "allow access to DHCP server on LAN"
            pass out quick on ste0 inet proto udp from 192.168.200.254 port = bootps to any port = bootpc keep state label "allow access to DHCP server on LAN"
            block drop in log quick on nfe0 inet proto udp from any port = bootps to 192.168.200.0/24 port = bootpc label "block dhcp client out wan"
            block drop in log quick on ng0 inet proto udp from any port = bootps to 192.168.200.0/24 port = bootpc label "block dhcp client out wan"
            pass in quick on nfe0 proto udp from any port = bootps to any port = bootpc keep state label "allow dhcp client out wan"
            pass in quick on ng0 proto udp from any port = bootps to any port = bootpc keep state label "allow dhcp client out wan"
            block drop in on ! ste0 inet from 192.168.200.0/24 to any
            block drop in on ste0 inet6 from fe80::22cf:30ff:feb6:c1b1 to any
            block drop in inet from 192.168.200.254 to any
            anchor "spoofing" all
            anchor "limitingesr" all
            block drop in quick from <virusprot> to any label "virusprot overload table"
            pass out quick on ste0 proto icmp all keep state label "let out anything from firewall host itself"
            pass out quick on nfe0 proto icmp all keep state label "let out anything from firewall host itself"
            pass out quick on ng0 proto icmp all keep state label "let out anything from firewall host itself"
            pass out quick on ng0 all flags S/SA keep state allow-opts label "let out anything from firewall host itself"
            anchor "firewallout" all
            pass out quick on nfe0 all flags S/SA keep state allow-opts label "let out anything from firewall host itself"
            pass out quick on ng0 all flags S/SA keep state allow-opts label "let out anything from firewall host itself"
            pass out quick on ste0 all flags S/SA keep state allow-opts label "let out anything from firewall host itself"
            pass out quick on enc0 all flags S/SA keep state label "IPSEC internal host to host"
            pass out quick on ng0 proto icmp all keep state label "let out anything from firewall host itself"
            anchor "anti-lockout" all
            pass in quick on ste0 inet from any to 192.168.200.254 flags S/SA keep state label "anti-lockout web rule"
            block drop in log proto tcp from <sshlockout> to any port = ssh label "sshlockout"
            anchor "ftpproxy" all
            anchor "pftpx/*" all
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = http flags S/SA keep state label "USER_RULE: NAT "
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = http keep state label "USER_RULE: NAT "
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = http flags S/SA keep state label "USER_RULE: NAT "
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = http keep state label "USER_RULE: NAT "
            pass in quick on nfe0 inet proto icmp all keep state label "USER_RULE"
            pass in quick on ng0 inet proto icmp all keep state label "USER_RULE"
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27015 flags S/SA keep state label "USER_RULE"
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27015 keep state label "USER_RULE"
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27015 flags S/SA keep state label "USER_RULE"
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27015 keep state label "USER_RULE"
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27010 flags S/SA keep state label "USER_RULE"
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27010 keep state label "USER_RULE"
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27010 flags S/SA keep state label "USER_RULE"
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27010 keep state label "USER_RULE"
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27011 flags S/SA keep state label "USER_RULE"
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27011 keep state label "USER_RULE"
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27011 flags S/SA keep state label "USER_RULE"
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27011 keep state label "USER_RULE"
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27040 flags S/SA keep state label "USER_RULE"
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27040 keep state label "USER_RULE"
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27040 flags S/SA keep state label "USER_RULE"
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27040 keep state label "USER_RULE"
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27025 flags S/SA keep state label "USER_RULE"
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27025 keep state label "USER_RULE"
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27025 flags S/SA keep state label "USER_RULE"
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27025 keep state label "USER_RULE"
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = afs3-prserver flags S/SA keep state label "USER_RULE"
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = afs3-prserver keep state label "USER_RULE"
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = afs3-prserver flags S/SA keep state label "USER_RULE"
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = afs3-prserver keep state label "USER_RULE"
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 6003 flags S/SA keep state label "USER_RULE"
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 6003 keep state label "USER_RULE"
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 6003 flags S/SA keep state label "USER_RULE"
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 6003 keep state label "USER_RULE"
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27016 flags S/SA keep state label "USER_RULE"
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27016 keep state label "USER_RULE"
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27016 flags S/SA keep state label "USER_RULE"
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27016 keep state label "USER_RULE"
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27960 flags S/SA keep state label "USER_RULE"
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27960 keep state label "USER_RULE"
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27960 flags S/SA keep state label "USER_RULE"
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27960 keep state label "USER_RULE"
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27017 flags S/SA keep state label "USER_RULE"
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27017 keep state label "USER_RULE"
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27017 flags S/SA keep state label "USER_RULE"
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27017 keep state label "USER_RULE"
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27018 flags S/SA keep state label "USER_RULE"
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27018 keep state label "USER_RULE"
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27018 flags S/SA keep state label "USER_RULE"
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27018 keep state label "USER_RULE"
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27030 flags S/SA keep state label "USER_RULE"
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27030 keep state label "USER_RULE"
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27030 flags S/SA keep state label "USER_RULE"
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27030 keep state label "USER_RULE"
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27019 flags S/SA keep state label "USER_RULE"
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27019 keep state label "USER_RULE"
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27019 flags S/SA keep state label "USER_RULE"
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27019 keep state label "USER_RULE"
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27020 flags S/SA keep state label "USER_RULE"
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27020 keep state label "USER_RULE"
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27020 flags S/SA keep state label "USER_RULE"
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27020 keep state label "USER_RULE"
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27021 flags S/SA keep state label "USER_RULE"
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27021 keep state label "USER_RULE"
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27021 flags S/SA keep state label "USER_RULE"
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27021 keep state label "USER_RULE"
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27031 flags S/SA keep state label "USER_RULE"
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27031 keep state label "USER_RULE"
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27031 flags S/SA keep state label "USER_RULE"
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27031 keep state label "USER_RULE"
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27022 flags S/SA keep state label "USER_RULE"
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27022 keep state label "USER_RULE"
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27022 flags S/SA keep state label "USER_RULE"
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27022 keep state label "USER_RULE"
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 52001 flags S/SA keep state label "USER_RULE"
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 52001 keep state label "USER_RULE"
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 52001 flags S/SA keep state label "USER_RULE"
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 52001 keep state label "USER_RULE"
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27032 flags S/SA keep state label "USER_RULE"
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27032 keep state label "USER_RULE"
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27032 flags S/SA keep state label "USER_RULE"
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27032 keep state label "USER_RULE"
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27033 flags S/SA keep state label "USER_RULE"
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27033 keep state label "USER_RULE"
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27033 flags S/SA keep state label "USER_RULE"
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27033 keep state label "USER_RULE"
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27035 flags S/SA keep state label "USER_RULE"
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27035 keep state label "USER_RULE"
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27035 flags S/SA keep state label "USER_RULE"
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27035 keep state label "USER_RULE"
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27036 flags S/SA keep state label "USER_RULE"
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27036 keep state label "USER_RULE"
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27036 flags S/SA keep state label "USER_RULE"
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27036 keep state label "USER_RULE"
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27037 flags S/SA keep state label "USER_RULE"
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27037 keep state label "USER_RULE"
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27037 flags S/SA keep state label "USER_RULE"
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27037 keep state label "USER_RULE"
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27038 flags S/SA keep state label "USER_RULE"
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27038 keep state label "USER_RULE"
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27038 flags S/SA keep state label "USER_RULE"
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27038 keep state label "USER_RULE"
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27039 flags S/SA keep state label "USER_RULE"
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27039 keep state label "USER_RULE"
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27039 flags S/SA keep state label "USER_RULE"
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27039 keep state label "USER_RULE"
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27040 flags S/SA keep state label "USER_RULE"
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27040 keep state label "USER_RULE"
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27040 flags S/SA keep state label "USER_RULE"
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27040 keep state label "USER_RULE"
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27041 flags S/SA keep state label "USER_RULE"
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27041 keep state label "USER_RULE"
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27041 flags S/SA keep state label "USER_RULE"
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27041 keep state label "USER_RULE"
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27042 flags S/SA keep state label "USER_RULE"
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27042 keep state label "USER_RULE"
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27042 flags S/SA keep state label "USER_RULE"
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27042 keep state label "USER_RULE"
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27043 flags S/SA keep state label "USER_RULE"
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27043 keep state label "USER_RULE"
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27043 flags S/SA keep state label "USER_RULE"
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27043 keep state label "USER_RULE"
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27044 flags S/SA keep state label "USER_RULE"
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27044 keep state label "USER_RULE"
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27044 flags S/SA keep state label "USER_RULE"
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27044 keep state label "USER_RULE"
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27045 flags S/SA keep state label "USER_RULE"
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27045 keep state label "USER_RULE"
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27045 flags S/SA keep state label "USER_RULE"
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27045 keep state label "USER_RULE"
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27046 flags S/SA keep state label "USER_RULE"
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27046 keep state label "USER_RULE"
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27046 flags S/SA keep state label "USER_RULE"
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27046 keep state label "USER_RULE"
            pass in quick on nfe0 inet proto tcp from 89.20.141.32 to 192.168.200.1 port = ssh flags S/SA keep state label "USER_RULE: NAT "
            pass in quick on nfe0 inet proto udp from 89.20.141.32 to 192.168.200.1 port = ssh keep state label "USER_RULE: NAT "
            pass in quick on ng0 inet proto tcp from 89.20.141.32 to 192.168.200.1 port = ssh flags S/SA keep state label "USER_RULE: NAT "
            pass in quick on ng0 inet proto udp from 89.20.141.32 to 192.168.200.1 port = ssh keep state label "USER_RULE: NAT "
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 10000 flags S/SA keep state label "USER_RULE: NAT "
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 10000 keep state label "USER_RULE: NAT "
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 10000 flags S/SA keep state label "USER_RULE: NAT "
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 10000 keep state label "USER_RULE: NAT "
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27047 flags S/SA keep state label "USER_RULE: NAT "
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27047 keep state label "USER_RULE: NAT "
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27047 flags S/SA keep state label "USER_RULE: NAT "
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27047 keep state label "USER_RULE: NAT "
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27048 flags S/SA keep state label "USER_RULE: NAT Virtual_Server_CS_27048"
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27048 keep state label "USER_RULE: NAT Virtual_Server_CS_27048"
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27048 flags S/SA keep state label "USER_RULE: NAT Virtual_Server_CS_27048"
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27048 keep state label "USER_RULE: NAT Virtual_Server_CS_27048"
            pass in quick on ste0 inet from 192.168.200.0/24 to any flags S/SA keep state label "USER_RULE: Default LAN -> any"
            pass in quick on ste0 inet proto tcp from 192.168.200.0/24 to 127.0.0.1 port 7999 >< 8031 flags S/SA keep state label "USER_RULE: FTP-LAN-INNET"
            pass in quick on ste0 inet proto udp from 192.168.200.0/24 to 127.0.0.1 port 7999 >< 8031 keep state label "USER_RULE: FTP-LAN-INNET"
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = ftp flags S/SA keep state label "USER_RULE: NAT "
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = ftp keep state label "USER_RULE: NAT "
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = ftp flags S/SA keep state label "USER_RULE: NAT "
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = ftp keep state label "USER_RULE: NAT "
            pass in quick on nfe0 inet proto tcp from any to 217.197.240.43 port = ftp flags S/SA keep state label "USER_RULE: NAT "
            pass in quick on nfe0 inet proto udp from any to 217.197.240.43 port = ftp keep state label "USER_RULE: NAT "
            pass in quick on ng0 inet proto tcp from any to 217.197.240.43 port = ftp flags S/SA keep state label "USER_RULE: NAT "
            pass in quick on ng0 inet proto udp from any to 217.197.240.43 port = ftp keep state label "USER_RULE: NAT "
            pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = ftp-data flags S/SA keep state label "USER_RULE: NAT "
            pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = ftp-data keep state label "USER_RULE: NAT "
            pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = ftp-data flags S/SA keep state label "USER_RULE: NAT "
            pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = ftp-data keep state label "USER_RULE: NAT "
            pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = ftp-proxy flags S/SA keep state label "FTP PROXY: Allow traffic to localhost"
            pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = ftp flags S/SA keep state label "FTP PROXY: Allow traffic to localhost"
            pass in quick on ng0 inet proto tcp from any port = ftp-data to (ng0) port > 49000 flags S/SA keep state label "FTP PROXY: PASV mode data connection"
            pass in quick on ng0 inet proto tcp from any to (ng0) port > 49000 flags S/SA keep state label "FTP PROXY: RFC959 violation workaround"
            anchor "imspector" all
            anchor "miniupnpd" all
            block drop in log quick all label "Default block all just to be sure."
            block drop out log quick all label "Default block all just to be sure."</sshlockout></virusprot></snort2c></snort2c>
            
            $ pfctl -sn
            nat-anchor "pftpx/*" all
            nat-anchor "natearly/*" all
            nat-anchor "natrules/*" all
            nat on nfe0 inet from 192.168.200.0/24 port = isakmp to any port = isakmp -> (ng0) port 500 round-robin
            nat on ng0 inet from 192.168.200.0/24 port = isakmp to any port = isakmp -> (ng0) port 500 round-robin
            nat on nfe0 inet from 192.168.200.0/24 port = 5060 to any port = 5060 -> (ng0) port 5060 round-robin
            nat on ng0 inet from 192.168.200.0/24 port = 5060 to any port = 5060 -> (ng0) port 5060 round-robin
            nat on nfe0 inet from 192.168.200.0/24 to any -> (ng0) round-robin
            nat on ng0 inet from 192.168.200.0/24 to any -> (ng0) round-robin
            rdr-anchor "pftpx/*" all
            rdr-anchor "slb" all
            no rdr on ste0 proto tcp from any to <vpns> port = ftp
            rdr on ste0 inet proto tcp from any to any port = ftp -> 127.0.0.1 port 8021
            rdr on ng0 inet proto tcp from any to any port = http -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = http -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = 27015 -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = 27015 -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = 27010 -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = 27010 -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = 27011 -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = 27040 -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = 27040 -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = 27025 -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = 27025 -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = afs3-prserver -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = afs3-prserver -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = 6003 -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = 6003 -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = 27016 -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = 27016 -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to 217.197.240.43 port = 27960 -> 192.168.200.1
            rdr on ng0 inet proto udp from any to 217.197.240.43 port = 27960 -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = 27017 -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = 27017 -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = 27018 -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = 27018 -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = 27019 -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = 27019 -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = 27020 -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = 27020 -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = 27030 -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = 27030 -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = 27021 -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = 27021 -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = 27031 -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = 27031 -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = 27022 -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = 27022 -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = 52001 -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = 52001 -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = 27032 -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = 27032 -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = 27033 -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = 27033 -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = 27035 -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = 27035 -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = 27036 -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = 27036 -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = 27037 -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = 27037 -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = 27038 -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = 27038 -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = 27039 -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = 27039 -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = 27041 -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = 27041 -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = 27042 -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = 27042 -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = 27043 -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = 27043 -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = 27044 -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = 27044 -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = 27045 -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = 27045 -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = 27046 -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = 27046 -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = 27047 -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = 27047 -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = 27048 -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = 27048 -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = ssh -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = ssh -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to any port = 10000 -> 192.168.200.1
            rdr on ng0 inet proto udp from any to any port = 10000 -> 192.168.200.1
            rdr on ng0 inet proto tcp from any to 217.197.240.43 port = ftp-data -> 192.168.200.1
            rdr on ng0 inet proto udp from any to 217.197.240.43 port = ftp-data -> 192.168.200.1
            rdr-anchor "imspector" all
            rdr-anchor "miniupnpd" all
            rdr on ste0 inet proto tcp from any to (ste0) port = 3128 -> 127.0.0.1 port 3128
            rdr on ng0 inet proto tcp from any to (ng0) port = 3128 -> 127.0.0.1 port 3128</vpns>
            
            1 Reply Last reply Reply Quote 0
            • I
              iliaxxx
              last edited by

              Когда галочка снята

              $ ifconfig
              nfe0: flags=8843 <up,broadcast,running,simplex,multicast>metric 0 mtu 1500
              	options=14b <rxcsum,txcsum,vlan_mtu,polling,tso4>ether 00:1d:60:d3:aa:04
              	inet6 fe80::21d:60ff:fed3:aa04%nfe0 prefixlen 64 scopeid 0x1 
              	media: Ethernet autoselect (100baseTX <full-duplex>)
              	status: active
              ste0: flags=8843 <up,broadcast,running,simplex,multicast>metric 0 mtu 1500
              	options=48 <vlan_mtu,polling>ether 20:cf:30:b6:c1:b1
              	inet6 fe80::22cf:30ff:feb6:c1b1%ste0 prefixlen 64 scopeid 0x2 
              	inet 192.168.200.254 netmask 0xffffff00 broadcast 192.168.200.255
              	media: Ethernet autoselect (100baseTX <full-duplex>)
              	status: active
              lo0: flags=8049 <up,loopback,running,multicast>metric 0 mtu 16384
              	inet 127.0.0.1 netmask 0xff000000 
              	inet6 ::1 prefixlen 128 
              	inet6 fe80::1%lo0 prefixlen 64 scopeid 0x3 
              enc0: flags=0<> metric 0 mtu 1536
              pflog0: flags=100 <promisc>metric 0 mtu 33204
              pfsync0: flags=41 <up,running>metric 0 mtu 1460
              	pfsync: syncdev: lo0 syncpeer: 224.0.0.240 maxupd: 128
              ng0: flags=88d1 <up,pointopoint,running,noarp,simplex,multicast>metric 0 mtu 1492
              	inet6 fe80::21d:60ff:fed3:aa04%ng0 prefixlen 64 scopeid 0x7 
              	inet 217.197.240.43 --> 217.197.255.32 netmask 0xffffffff</up,pointopoint,running,noarp,simplex,multicast></up,running></promisc></up,loopback,running,multicast></full-duplex></vlan_mtu,polling></up,broadcast,running,simplex,multicast></full-duplex></rxcsum,txcsum,vlan_mtu,polling,tso4></up,broadcast,running,simplex,multicast> 
              
              $ netstat -rn
              Routing tables
              
              Internet:
              Destination        Gateway            Flags    Refs      Use  Netif Expire
              default            217.197.255.32     UGS         0 62701504    ng0
              127.0.0.1          127.0.0.1          UH          0   133499    lo0
              192.168.200.0/24   link#2             UC          0        0   ste0
              192.168.200.1      00:15:17:e5:72:77  UHLW        1 190708362   ste0    330
              192.168.200.105    00:13:e8:9b:b2:15  UHLW        1     4968   ste0    352
              217.197.240.43     lo0                UHS         0        0    lo0
              217.197.255.32     217.197.240.43     UH          1     1520    ng0
              
              Internet6:
              Destination                       Gateway                       Flags      Netif Expire
              ::1                               ::1                           UHL         lo0
              fe80::%nfe0/64                    link#1                        UC         nfe0
              fe80::21d:60ff:fed3:aa04%nfe0     00:1d:60:d3:aa:04             UHL         lo0
              fe80::%ste0/64                    link#2                        UC         ste0
              fe80::22cf:30ff:feb6:c1b1%ste0    20:cf:30:b6:c1:b1             UHL         lo0
              fe80::%lo0/64                     fe80::1%lo0                   U           lo0
              fe80::1%lo0                       link#3                        UHL         lo0
              fe80::%ng0/64                     link#7                        UC          ng0
              fe80::21d:60ff:fed3:aa04%ng0      link#7                        UHL         lo0
              ff01:1::/32                       link#1                        UC         nfe0
              ff01:2::/32                       link#2                        UC         ste0
              ff01:3::/32                       ::1                           UC          lo0
              ff01:7::/32                       link#7                        UC          ng0
              ff02::%nfe0/32                    link#1                        UC         nfe0
              ff02::%ste0/32                    link#2                        UC         ste0
              ff02::%lo0/32                     ::1                           UC          lo0
              ff02::%ng0/32                     link#7                        UC          ng0
              
              $ pfctl -sr
              scrub all random-id max-mss 1452 fragment reassemble
              anchor "ftpsesame/*" all
              anchor "firewallrules" all
              block drop quick proto tcp from any port = 0 to any
              block drop quick proto udp from any port = 0 to any
              block drop quick proto tcp from any to any port = 0
              block drop quick proto udp from any to any port = 0
              block drop quick from <snort2c> to any label "Block snort2c hosts"
              block drop quick from any to <snort2c> label "Block snort2c hosts"
              anchor "loopback" all
              pass in quick on lo0 all flags S/SA keep state label "pass loopback"
              pass out quick on lo0 all flags S/SA keep state label "pass loopback"
              anchor "packageearly" all
              anchor "carp" all
              pass quick inet proto icmp from 217.197.240.43 to any keep state
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19000 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19001 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19002 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19003 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19004 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19005 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19006 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19007 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19008 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19009 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19010 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19011 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19012 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19013 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19014 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19015 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19016 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19017 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19018 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19019 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19020 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19021 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19022 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19023 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19024 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19025 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19026 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19027 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19028 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19029 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19030 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19031 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19032 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19033 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19034 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19035 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19036 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19037 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19038 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19039 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19040 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19041 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19042 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19043 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19044 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19045 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19046 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19047 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19048 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19049 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19050 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19051 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19052 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19053 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19054 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19055 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19056 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19057 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19058 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19059 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19060 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19061 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19062 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19063 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19064 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19065 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19066 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19067 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19068 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19069 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19070 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19071 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19072 keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19073 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19074 keep state label "NAT REFLECT: Allow traffic to localhost"
              anchor "dhcpserverlan" all
              pass in quick on ste0 inet proto udp from any port = bootpc to 255.255.255.255 port = bootps keep state label "allow access to DHCP server on LAN"
              pass in quick on ste0 inet proto udp from any port = bootpc to 192.168.200.254 port = bootps keep state label "allow access to DHCP server on LAN"
              pass out quick on ste0 inet proto udp from 192.168.200.254 port = bootps to any port = bootpc keep state label "allow access to DHCP server on LAN"
              block drop in log quick on nfe0 inet proto udp from any port = bootps to 192.168.200.0/24 port = bootpc label "block dhcp client out wan"
              block drop in log quick on ng0 inet proto udp from any port = bootps to 192.168.200.0/24 port = bootpc label "block dhcp client out wan"
              pass in quick on nfe0 proto udp from any port = bootps to any port = bootpc keep state label "allow dhcp client out wan"
              pass in quick on ng0 proto udp from any port = bootps to any port = bootpc keep state label "allow dhcp client out wan"
              block drop in on ! ste0 inet from 192.168.200.0/24 to any
              block drop in on ste0 inet6 from fe80::22cf:30ff:feb6:c1b1 to any
              block drop in inet from 192.168.200.254 to any
              anchor "spoofing" all
              anchor "limitingesr" all
              block drop in quick from <virusprot> to any label "virusprot overload table"
              pass out quick on ste0 proto icmp all keep state label "let out anything from firewall host itself"
              pass out quick on nfe0 proto icmp all keep state label "let out anything from firewall host itself"
              pass out quick on ng0 proto icmp all keep state label "let out anything from firewall host itself"
              pass out quick on ng0 all flags S/SA keep state allow-opts label "let out anything from firewall host itself"
              anchor "firewallout" all
              pass out quick on nfe0 all flags S/SA keep state allow-opts label "let out anything from firewall host itself"
              pass out quick on ng0 all flags S/SA keep state allow-opts label "let out anything from firewall host itself"
              pass out quick on ste0 all flags S/SA keep state allow-opts label "let out anything from firewall host itself"
              pass out quick on enc0 all flags S/SA keep state label "IPSEC internal host to host"
              pass out quick on ng0 proto icmp all keep state label "let out anything from firewall host itself"
              anchor "anti-lockout" all
              pass in quick on ste0 inet from any to 192.168.200.254 flags S/SA keep state label "anti-lockout web rule"
              block drop in log proto tcp from <sshlockout> to any port = ssh label "sshlockout"
              anchor "ftpproxy" all
              anchor "pftpx/*" all
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = http flags S/SA keep state label "USER_RULE: NAT "
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = http keep state label "USER_RULE: NAT "
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = http flags S/SA keep state label "USER_RULE: NAT "
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = http keep state label "USER_RULE: NAT "
              pass in quick on nfe0 inet proto icmp all keep state label "USER_RULE"
              pass in quick on ng0 inet proto icmp all keep state label "USER_RULE"
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27015 flags S/SA keep state label "USER_RULE"
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27015 keep state label "USER_RULE"
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27015 flags S/SA keep state label "USER_RULE"
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27015 keep state label "USER_RULE"
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27010 flags S/SA keep state label "USER_RULE"
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27010 keep state label "USER_RULE"
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27010 flags S/SA keep state label "USER_RULE"
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27010 keep state label "USER_RULE"
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27011 flags S/SA keep state label "USER_RULE"
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27011 keep state label "USER_RULE"
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27011 flags S/SA keep state label "USER_RULE"
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27011 keep state label "USER_RULE"
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27040 flags S/SA keep state label "USER_RULE"
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27040 keep state label "USER_RULE"
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27040 flags S/SA keep state label "USER_RULE"
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27040 keep state label "USER_RULE"
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27025 flags S/SA keep state label "USER_RULE"
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27025 keep state label "USER_RULE"
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27025 flags S/SA keep state label "USER_RULE"
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27025 keep state label "USER_RULE"
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = afs3-prserver flags S/SA keep state label "USER_RULE"
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = afs3-prserver keep state label "USER_RULE"
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = afs3-prserver flags S/SA keep state label "USER_RULE"
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = afs3-prserver keep state label "USER_RULE"
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 6003 flags S/SA keep state label "USER_RULE"
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 6003 keep state label "USER_RULE"
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 6003 flags S/SA keep state label "USER_RULE"
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 6003 keep state label "USER_RULE"
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27016 flags S/SA keep state label "USER_RULE"
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27016 keep state label "USER_RULE"
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27016 flags S/SA keep state label "USER_RULE"
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27016 keep state label "USER_RULE"
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27960 flags S/SA keep state label "USER_RULE"
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27960 keep state label "USER_RULE"
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27960 flags S/SA keep state label "USER_RULE"
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27960 keep state label "USER_RULE"
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27017 flags S/SA keep state label "USER_RULE"
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27017 keep state label "USER_RULE"
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27017 flags S/SA keep state label "USER_RULE"
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27017 keep state label "USER_RULE"
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27018 flags S/SA keep state label "USER_RULE"
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27018 keep state label "USER_RULE"
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27018 flags S/SA keep state label "USER_RULE"
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27018 keep state label "USER_RULE"
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27030 flags S/SA keep state label "USER_RULE"
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27030 keep state label "USER_RULE"
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27030 flags S/SA keep state label "USER_RULE"
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27030 keep state label "USER_RULE"
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27019 flags S/SA keep state label "USER_RULE"
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27019 keep state label "USER_RULE"
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27019 flags S/SA keep state label "USER_RULE"
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27019 keep state label "USER_RULE"
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27020 flags S/SA keep state label "USER_RULE"
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27020 keep state label "USER_RULE"
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27020 flags S/SA keep state label "USER_RULE"
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27020 keep state label "USER_RULE"
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27021 flags S/SA keep state label "USER_RULE"
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27021 keep state label "USER_RULE"
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27021 flags S/SA keep state label "USER_RULE"
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27021 keep state label "USER_RULE"
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27031 flags S/SA keep state label "USER_RULE"
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27031 keep state label "USER_RULE"
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27031 flags S/SA keep state label "USER_RULE"
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27031 keep state label "USER_RULE"
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27022 flags S/SA keep state label "USER_RULE"
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27022 keep state label "USER_RULE"
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27022 flags S/SA keep state label "USER_RULE"
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27022 keep state label "USER_RULE"
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 52001 flags S/SA keep state label "USER_RULE"
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 52001 keep state label "USER_RULE"
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 52001 flags S/SA keep state label "USER_RULE"
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 52001 keep state label "USER_RULE"
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27032 flags S/SA keep state label "USER_RULE"
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27032 keep state label "USER_RULE"
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27032 flags S/SA keep state label "USER_RULE"
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27032 keep state label "USER_RULE"
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27033 flags S/SA keep state label "USER_RULE"
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27033 keep state label "USER_RULE"
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27033 flags S/SA keep state label "USER_RULE"
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27033 keep state label "USER_RULE"
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27035 flags S/SA keep state label "USER_RULE"
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27035 keep state label "USER_RULE"
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27035 flags S/SA keep state label "USER_RULE"
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27035 keep state label "USER_RULE"
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27036 flags S/SA keep state label "USER_RULE"
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27036 keep state label "USER_RULE"
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27036 flags S/SA keep state label "USER_RULE"
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27036 keep state label "USER_RULE"
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27037 flags S/SA keep state label "USER_RULE"
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27037 keep state label "USER_RULE"
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27037 flags S/SA keep state label "USER_RULE"
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27037 keep state label "USER_RULE"
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27038 flags S/SA keep state label "USER_RULE"
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27038 keep state label "USER_RULE"
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27038 flags S/SA keep state label "USER_RULE"
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27038 keep state label "USER_RULE"
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27039 flags S/SA keep state label "USER_RULE"
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27039 keep state label "USER_RULE"
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27039 flags S/SA keep state label "USER_RULE"
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27039 keep state label "USER_RULE"
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27040 flags S/SA keep state label "USER_RULE"
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27040 keep state label "USER_RULE"
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27040 flags S/SA keep state label "USER_RULE"
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27040 keep state label "USER_RULE"
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27041 flags S/SA keep state label "USER_RULE"
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27041 keep state label "USER_RULE"
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27041 flags S/SA keep state label "USER_RULE"
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27041 keep state label "USER_RULE"
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27042 flags S/SA keep state label "USER_RULE"
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27042 keep state label "USER_RULE"
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27042 flags S/SA keep state label "USER_RULE"
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27042 keep state label "USER_RULE"
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27043 flags S/SA keep state label "USER_RULE"
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27043 keep state label "USER_RULE"
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27043 flags S/SA keep state label "USER_RULE"
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27043 keep state label "USER_RULE"
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27044 flags S/SA keep state label "USER_RULE"
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27044 keep state label "USER_RULE"
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27044 flags S/SA keep state label "USER_RULE"
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27044 keep state label "USER_RULE"
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27045 flags S/SA keep state label "USER_RULE"
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27045 keep state label "USER_RULE"
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27045 flags S/SA keep state label "USER_RULE"
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27045 keep state label "USER_RULE"
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27046 flags S/SA keep state label "USER_RULE"
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27046 keep state label "USER_RULE"
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27046 flags S/SA keep state label "USER_RULE"
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27046 keep state label "USER_RULE"
              pass in quick on nfe0 inet proto tcp from 89.20.141.32 to 192.168.200.1 port = ssh flags S/SA keep state label "USER_RULE: NAT "
              pass in quick on nfe0 inet proto udp from 89.20.141.32 to 192.168.200.1 port = ssh keep state label "USER_RULE: NAT "
              pass in quick on ng0 inet proto tcp from 89.20.141.32 to 192.168.200.1 port = ssh flags S/SA keep state label "USER_RULE: NAT "
              pass in quick on ng0 inet proto udp from 89.20.141.32 to 192.168.200.1 port = ssh keep state label "USER_RULE: NAT "
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 10000 flags S/SA keep state label "USER_RULE: NAT "
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 10000 keep state label "USER_RULE: NAT "
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 10000 flags S/SA keep state label "USER_RULE: NAT "
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 10000 keep state label "USER_RULE: NAT "
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27047 flags S/SA keep state label "USER_RULE: NAT "
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27047 keep state label "USER_RULE: NAT "
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27047 flags S/SA keep state label "USER_RULE: NAT "
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27047 keep state label "USER_RULE: NAT "
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27048 flags S/SA keep state label "USER_RULE: NAT Virtual_Server_CS_27048"
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27048 keep state label "USER_RULE: NAT Virtual_Server_CS_27048"
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27048 flags S/SA keep state label "USER_RULE: NAT Virtual_Server_CS_27048"
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27048 keep state label "USER_RULE: NAT Virtual_Server_CS_27048"
              pass in quick on ste0 inet from 192.168.200.0/24 to any flags S/SA keep state label "USER_RULE: Default LAN -> any"
              pass in quick on ste0 inet proto tcp from 192.168.200.0/24 to 127.0.0.1 port 7999 >< 8031 flags S/SA keep state label "USER_RULE: FTP-LAN-INNET"
              pass in quick on ste0 inet proto udp from 192.168.200.0/24 to 127.0.0.1 port 7999 >< 8031 keep state label "USER_RULE: FTP-LAN-INNET"
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = ftp flags S/SA keep state label "USER_RULE: NAT "
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = ftp keep state label "USER_RULE: NAT "
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = ftp flags S/SA keep state label "USER_RULE: NAT "
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = ftp keep state label "USER_RULE: NAT "
              pass in quick on nfe0 inet proto tcp from any to 217.197.240.43 port = ftp flags S/SA keep state label "USER_RULE: NAT "
              pass in quick on nfe0 inet proto udp from any to 217.197.240.43 port = ftp keep state label "USER_RULE: NAT "
              pass in quick on ng0 inet proto tcp from any to 217.197.240.43 port = ftp flags S/SA keep state label "USER_RULE: NAT "
              pass in quick on ng0 inet proto udp from any to 217.197.240.43 port = ftp keep state label "USER_RULE: NAT "
              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = ftp-data flags S/SA keep state label "USER_RULE: NAT "
              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = ftp-data keep state label "USER_RULE: NAT "
              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = ftp-data flags S/SA keep state label "USER_RULE: NAT "
              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = ftp-data keep state label "USER_RULE: NAT "
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = ftp-proxy flags S/SA keep state label "FTP PROXY: Allow traffic to localhost"
              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = ftp flags S/SA keep state label "FTP PROXY: Allow traffic to localhost"
              pass in quick on ng0 inet proto tcp from any port = ftp-data to (ng0) port > 49000 flags S/SA keep state label "FTP PROXY: PASV mode data connection"
              pass in quick on ng0 inet proto tcp from any to (ng0) port > 49000 flags S/SA keep state label "FTP PROXY: RFC959 violation workaround"
              anchor "imspector" all
              anchor "miniupnpd" all
              block drop in log quick all label "Default block all just to be sure."
              block drop out log quick all label "Default block all just to be sure."</sshlockout></virusprot></snort2c></snort2c>
              
              $ pfctl -sn
              nat-anchor "pftpx/*" all
              nat-anchor "natearly/*" all
              nat-anchor "natrules/*" all
              nat on nfe0 inet from 192.168.200.0/24 port = isakmp to any port = isakmp -> (ng0) port 500 round-robin
              nat on ng0 inet from 192.168.200.0/24 port = isakmp to any port = isakmp -> (ng0) port 500 round-robin
              nat on nfe0 inet from 192.168.200.0/24 port = 5060 to any port = 5060 -> (ng0) port 5060 round-robin
              nat on ng0 inet from 192.168.200.0/24 port = 5060 to any port = 5060 -> (ng0) port 5060 round-robin
              nat on nfe0 inet from 192.168.200.0/24 to any -> (ng0) round-robin
              nat on ng0 inet from 192.168.200.0/24 to any -> (ng0) round-robin
              rdr-anchor "pftpx/*" all
              rdr-anchor "slb" all
              no rdr on ste0 proto tcp from any to <vpns> port = ftp
              rdr on ste0 inet proto tcp from any to any port = ftp -> 127.0.0.1 port 8021
              rdr on ng0 inet proto tcp from any to any port = http -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = http -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = http -> 127.0.0.1 port 19000
              rdr on ste0 inet proto udp from any to any port = http -> 127.0.0.1 port 19001
              rdr on ng0 inet proto tcp from any to any port = 27015 -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = 27015 -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = 27015 -> 127.0.0.1 port 19002
              rdr on ste0 inet proto udp from any to any port = 27015 -> 127.0.0.1 port 19003
              rdr on ng0 inet proto tcp from any to any port = 27010 -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = 27010 -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = 27010 -> 127.0.0.1 port 19004
              rdr on ste0 inet proto udp from any to any port = 27010 -> 127.0.0.1 port 19005
              rdr on ng0 inet proto tcp from any to any port = 27011 -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = 27011 -> 127.0.0.1 port 19006
              rdr on ng0 inet proto tcp from any to any port = 27040 -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = 27040 -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = 27040 -> 127.0.0.1 port 19007
              rdr on ste0 inet proto udp from any to any port = 27040 -> 127.0.0.1 port 19008
              rdr on ng0 inet proto tcp from any to any port = 27025 -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = 27025 -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = 27025 -> 127.0.0.1 port 19009
              rdr on ste0 inet proto udp from any to any port = 27025 -> 127.0.0.1 port 19010
              rdr on ng0 inet proto tcp from any to any port = afs3-prserver -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = afs3-prserver -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = afs3-prserver -> 127.0.0.1 port 19011
              rdr on ste0 inet proto udp from any to any port = afs3-prserver -> 127.0.0.1 port 19012
              rdr on ng0 inet proto tcp from any to any port = 6003 -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = 6003 -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = 6003 -> 127.0.0.1 port 19013
              rdr on ste0 inet proto udp from any to any port = 6003 -> 127.0.0.1 port 19014
              rdr on ng0 inet proto tcp from any to any port = 27016 -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = 27016 -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = 27016 -> 127.0.0.1 port 19015
              rdr on ste0 inet proto udp from any to any port = 27016 -> 127.0.0.1 port 19016
              rdr on ng0 inet proto tcp from any to 217.197.240.43 port = 27960 -> 192.168.200.1
              rdr on ng0 inet proto udp from any to 217.197.240.43 port = 27960 -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to 217.197.240.43 port = 27960 -> 127.0.0.1 port 19017
              rdr on ste0 inet proto udp from any to 217.197.240.43 port = 27960 -> 127.0.0.1 port 19018
              rdr on ng0 inet proto tcp from any to any port = 27017 -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = 27017 -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = 27017 -> 127.0.0.1 port 19019
              rdr on ste0 inet proto udp from any to any port = 27017 -> 127.0.0.1 port 19020
              rdr on ng0 inet proto tcp from any to any port = 27018 -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = 27018 -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = 27018 -> 127.0.0.1 port 19021
              rdr on ste0 inet proto udp from any to any port = 27018 -> 127.0.0.1 port 19022
              rdr on ng0 inet proto tcp from any to any port = 27019 -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = 27019 -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = 27019 -> 127.0.0.1 port 19023
              rdr on ste0 inet proto udp from any to any port = 27019 -> 127.0.0.1 port 19024
              rdr on ng0 inet proto tcp from any to any port = 27020 -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = 27020 -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = 27020 -> 127.0.0.1 port 19025
              rdr on ste0 inet proto udp from any to any port = 27020 -> 127.0.0.1 port 19026
              rdr on ng0 inet proto tcp from any to any port = 27030 -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = 27030 -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = 27030 -> 127.0.0.1 port 19027
              rdr on ste0 inet proto udp from any to any port = 27030 -> 127.0.0.1 port 19028
              rdr on ng0 inet proto tcp from any to any port = 27021 -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = 27021 -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = 27021 -> 127.0.0.1 port 19029
              rdr on ste0 inet proto udp from any to any port = 27021 -> 127.0.0.1 port 19030
              rdr on ng0 inet proto tcp from any to any port = 27031 -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = 27031 -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = 27031 -> 127.0.0.1 port 19031
              rdr on ste0 inet proto udp from any to any port = 27031 -> 127.0.0.1 port 19032
              rdr on ng0 inet proto tcp from any to any port = 27022 -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = 27022 -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = 27022 -> 127.0.0.1 port 19033
              rdr on ste0 inet proto udp from any to any port = 27022 -> 127.0.0.1 port 19034
              rdr on ng0 inet proto tcp from any to any port = 52001 -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = 52001 -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = 52001 -> 127.0.0.1 port 19035
              rdr on ste0 inet proto udp from any to any port = 52001 -> 127.0.0.1 port 19036
              rdr on ng0 inet proto tcp from any to any port = 27032 -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = 27032 -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = 27032 -> 127.0.0.1 port 19037
              rdr on ste0 inet proto udp from any to any port = 27032 -> 127.0.0.1 port 19038
              rdr on ng0 inet proto tcp from any to any port = 27033 -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = 27033 -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = 27033 -> 127.0.0.1 port 19039
              rdr on ste0 inet proto udp from any to any port = 27033 -> 127.0.0.1 port 19040
              rdr on ng0 inet proto tcp from any to any port = 27035 -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = 27035 -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = 27035 -> 127.0.0.1 port 19041
              rdr on ste0 inet proto udp from any to any port = 27035 -> 127.0.0.1 port 19042
              rdr on ng0 inet proto tcp from any to any port = 27036 -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = 27036 -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = 27036 -> 127.0.0.1 port 19043
              rdr on ste0 inet proto udp from any to any port = 27036 -> 127.0.0.1 port 19044
              rdr on ng0 inet proto tcp from any to any port = 27037 -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = 27037 -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = 27037 -> 127.0.0.1 port 19045
              rdr on ste0 inet proto udp from any to any port = 27037 -> 127.0.0.1 port 19046
              rdr on ng0 inet proto tcp from any to any port = 27038 -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = 27038 -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = 27038 -> 127.0.0.1 port 19047
              rdr on ste0 inet proto udp from any to any port = 27038 -> 127.0.0.1 port 19048
              rdr on ng0 inet proto tcp from any to any port = 27039 -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = 27039 -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = 27039 -> 127.0.0.1 port 19049
              rdr on ste0 inet proto udp from any to any port = 27039 -> 127.0.0.1 port 19050
              rdr on ng0 inet proto tcp from any to any port = 27041 -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = 27041 -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = 27041 -> 127.0.0.1 port 19051
              rdr on ste0 inet proto udp from any to any port = 27041 -> 127.0.0.1 port 19052
              rdr on ng0 inet proto tcp from any to any port = 27042 -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = 27042 -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = 27042 -> 127.0.0.1 port 19053
              rdr on ste0 inet proto udp from any to any port = 27042 -> 127.0.0.1 port 19054
              rdr on ng0 inet proto tcp from any to any port = 27043 -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = 27043 -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = 27043 -> 127.0.0.1 port 19055
              rdr on ste0 inet proto udp from any to any port = 27043 -> 127.0.0.1 port 19056
              rdr on ng0 inet proto tcp from any to any port = 27044 -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = 27044 -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = 27044 -> 127.0.0.1 port 19057
              rdr on ste0 inet proto udp from any to any port = 27044 -> 127.0.0.1 port 19058
              rdr on ng0 inet proto tcp from any to any port = 27045 -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = 27045 -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = 27045 -> 127.0.0.1 port 19059
              rdr on ste0 inet proto udp from any to any port = 27045 -> 127.0.0.1 port 19060
              rdr on ng0 inet proto tcp from any to any port = 27046 -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = 27046 -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = 27046 -> 127.0.0.1 port 19061
              rdr on ste0 inet proto udp from any to any port = 27046 -> 127.0.0.1 port 19062
              rdr on ng0 inet proto tcp from any to any port = 27047 -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = 27047 -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = 27047 -> 127.0.0.1 port 19063
              rdr on ste0 inet proto udp from any to any port = 27047 -> 127.0.0.1 port 19064
              rdr on ng0 inet proto tcp from any to any port = 27048 -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = 27048 -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = 27048 -> 127.0.0.1 port 19065
              rdr on ste0 inet proto udp from any to any port = 27048 -> 127.0.0.1 port 19066
              rdr on ng0 inet proto tcp from any to any port = ssh -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = ssh -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = ssh -> 127.0.0.1 port 19067
              rdr on ste0 inet proto udp from any to any port = ssh -> 127.0.0.1 port 19068
              rdr on ng0 inet proto tcp from any to any port = 10000 -> 192.168.200.1
              rdr on ng0 inet proto udp from any to any port = 10000 -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to any port = 10000 -> 127.0.0.1 port 19069
              rdr on ste0 inet proto udp from any to any port = 10000 -> 127.0.0.1 port 19070
              rdr on ng0 inet proto tcp from any to 217.197.240.43 port = ftp-data -> 192.168.200.1
              rdr on ng0 inet proto udp from any to 217.197.240.43 port = ftp-data -> 192.168.200.1
              rdr on ste0 inet proto tcp from any to 217.197.240.43 port = ftp-data -> 127.0.0.1 port 19071
              rdr on ste0 inet proto udp from any to 217.197.240.43 port = ftp-data -> 127.0.0.1 port 19072
              rdr-anchor "imspector" all
              rdr-anchor "miniupnpd" all
              rdr on ste0 inet proto tcp from any to (ste0) port = 3128 -> 127.0.0.1 port 3128
              rdr on ng0 inet proto tcp from any to (ng0) port = 3128 -> 127.0.0.1 port 3128</vpns>
              
              1 Reply Last reply Reply Quote 0
              • E
                Eugene
                last edited by

                Забавно… а скриншот nat port-forward пожалуйста

                http://ru.doc.pfsense.org

                1 Reply Last reply Reply Quote 0
                • I
                  iliaxxx
                  last edited by

                  он у меня большой

                  http://cs.ms-home.ru/01.jpeg
                  http://cs.ms-home.ru/02.jpeg
                  http://cs.ms-home.ru/03.jpeg

                  1 Reply Last reply Reply Quote 0
                  • E
                    Eugene
                    last edited by

                    замени any на wan interface в Nat->port forwad

                    http://ru.doc.pfsense.org

                    1 Reply Last reply Reply Quote 0
                    • I
                      iliaxxx
                      last edited by

                      замени any на wan interface в Nat->port forwad

                      Заменить any на interface address?
                      Я заменил, снял галочку с Disable NAT Reflection.
                      Интерент появился. А вот локальные ресурсы нет.

                      1 Reply Last reply Reply Quote 0
                      • E
                        Eugene
                        last edited by

                        @iliaxxx:

                        Интерент появился. А вот локальные ресурсы нет.

                        подробнее пожалуйста, как тестируем локальные ресурсы?

                        http://ru.doc.pfsense.org

                        1 Reply Last reply Reply Quote 0
                        • I
                          iliaxxx
                          last edited by

                          Захожу на комп, который находится в локальной сети. Проверяю инет, есть. Набираю сайт который находится на сервере 192.168.200.1.
                          (Но при наборе ping  с этого же компа, который находится в локальной сети. Я получаю не ip 192.168.200.1, а прямой ip который я арендую.)
                          Сайт не виден… Он долго думает, а потом пишет: Невозможно отобразить страницу

                          1 Reply Last reply Reply Quote 0
                          • E
                            Eugene
                            last edited by

                            тогда ещё разок
                            скинь мне

                            pfctl -sr
                            pfctl -sn
                            

                            галка убрана.

                            http://ru.doc.pfsense.org

                            1 Reply Last reply Reply Quote 0
                            • I
                              iliaxxx
                              last edited by

                              $ pfctl -sr
                              scrub all random-id max-mss 1452 fragment reassemble
                              anchor "ftpsesame/*" all
                              anchor "firewallrules" all
                              block drop quick proto tcp from any port = 0 to any
                              block drop quick proto udp from any port = 0 to any
                              block drop quick proto tcp from any to any port = 0
                              block drop quick proto udp from any to any port = 0
                              block drop quick from <snort2c> to any label "Block snort2c hosts"
                              block drop quick from any to <snort2c> label "Block snort2c hosts"
                              anchor "loopback" all
                              pass in quick on lo0 all flags S/SA keep state label "pass loopback"
                              pass out quick on lo0 all flags S/SA keep state label "pass loopback"
                              anchor "packageearly" all
                              anchor "carp" all
                              pass quick inet proto icmp from 217.197.240.43 to any keep state
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19000 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19001 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19002 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19003 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19004 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19005 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19006 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19007 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19008 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19009 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19010 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19011 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19012 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19013 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19014 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19015 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19016 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19017 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19018 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19019 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19020 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19021 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19022 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19023 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19024 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19025 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19026 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19027 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19028 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19029 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19030 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19031 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19032 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19033 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19034 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19035 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19036 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19037 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19038 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19039 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19040 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19041 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19042 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19043 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19044 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19045 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19046 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19047 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19048 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19049 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19050 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19051 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19052 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19053 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19054 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19055 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19056 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19057 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19058 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19059 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19060 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19061 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19062 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19063 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19064 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19065 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19066 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19067 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19068 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19069 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19070 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19071 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19072 keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = 19073 flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost"
                              pass in quick on ste0 inet proto udp from any to 127.0.0.1 port = 19074 keep state label "NAT REFLECT: Allow traffic to localhost"
                              anchor "dhcpserverlan" all
                              pass in quick on ste0 inet proto udp from any port = bootpc to 255.255.255.255 port = bootps keep state label "allow access to DHCP server on LAN"
                              pass in quick on ste0 inet proto udp from any port = bootpc to 192.168.200.254 port = bootps keep state label "allow access to DHCP server on LAN"
                              pass out quick on ste0 inet proto udp from 192.168.200.254 port = bootps to any port = bootpc keep state label "allow access to DHCP server on LAN"
                              block drop in log quick on nfe0 inet proto udp from any port = bootps to 192.168.200.0/24 port = bootpc label "block dhcp client out wan"
                              block drop in log quick on ng0 inet proto udp from any port = bootps to 192.168.200.0/24 port = bootpc label "block dhcp client out wan"
                              pass in quick on nfe0 proto udp from any port = bootps to any port = bootpc keep state label "allow dhcp client out wan"
                              pass in quick on ng0 proto udp from any port = bootps to any port = bootpc keep state label "allow dhcp client out wan"
                              block drop in on ! ste0 inet from 192.168.200.0/24 to any
                              block drop in on ste0 inet6 from fe80::22cf:30ff:feb6:c1b1 to any
                              block drop in inet from 192.168.200.254 to any
                              anchor "spoofing" all
                              anchor "limitingesr" all
                              block drop in quick from <virusprot> to any label "virusprot overload table"
                              pass out quick on ste0 proto icmp all keep state label "let out anything from firewall host itself"
                              pass out quick on nfe0 proto icmp all keep state label "let out anything from firewall host itself"
                              pass out quick on ng0 proto icmp all keep state label "let out anything from firewall host itself"
                              pass out quick on ng0 all flags S/SA keep state allow-opts label "let out anything from firewall host itself"
                              anchor "firewallout" all
                              pass out quick on nfe0 all flags S/SA keep state allow-opts label "let out anything from firewall host itself"
                              pass out quick on ng0 all flags S/SA keep state allow-opts label "let out anything from firewall host itself"
                              pass out quick on ste0 all flags S/SA keep state allow-opts label "let out anything from firewall host itself"
                              pass out quick on enc0 all flags S/SA keep state label "IPSEC internal host to host"
                              pass out quick on ng0 proto icmp all keep state label "let out anything from firewall host itself"
                              anchor "anti-lockout" all
                              pass in quick on ste0 inet from any to 192.168.200.254 flags S/SA keep state label "anti-lockout web rule"
                              block drop in log proto tcp from <sshlockout> to any port = ssh label "sshlockout"
                              anchor "ftpproxy" all
                              anchor "pftpx/*" all
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = http flags S/SA keep state label "USER_RULE: NAT "
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = http keep state label "USER_RULE: NAT "
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = http flags S/SA keep state label "USER_RULE: NAT "
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = http keep state label "USER_RULE: NAT "
                              pass in quick on nfe0 inet proto icmp all keep state label "USER_RULE"
                              pass in quick on ng0 inet proto icmp all keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27015 flags S/SA keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27015 keep state label "USER_RULE"
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27015 flags S/SA keep state label "USER_RULE"
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27015 keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27010 flags S/SA keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27010 keep state label "USER_RULE"
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27010 flags S/SA keep state label "USER_RULE"
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27010 keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27011 flags S/SA keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27011 keep state label "USER_RULE"
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27011 flags S/SA keep state label "USER_RULE"
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27011 keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27040 flags S/SA keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27040 keep state label "USER_RULE"
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27040 flags S/SA keep state label "USER_RULE"
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27040 keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27025 flags S/SA keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27025 keep state label "USER_RULE"
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27025 flags S/SA keep state label "USER_RULE"
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27025 keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = afs3-prserver flags S/SA keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = afs3-prserver keep state label "USER_RULE"
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = afs3-prserver flags S/SA keep state label "USER_RULE"
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = afs3-prserver keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 6003 flags S/SA keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 6003 keep state label "USER_RULE"
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 6003 flags S/SA keep state label "USER_RULE"
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 6003 keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27016 flags S/SA keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27016 keep state label "USER_RULE"
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27016 flags S/SA keep state label "USER_RULE"
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27016 keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27960 flags S/SA keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27960 keep state label "USER_RULE"
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27960 flags S/SA keep state label "USER_RULE"
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27960 keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27017 flags S/SA keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27017 keep state label "USER_RULE"
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27017 flags S/SA keep state label "USER_RULE"
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27017 keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27018 flags S/SA keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27018 keep state label "USER_RULE"
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27018 flags S/SA keep state label "USER_RULE"
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27018 keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27030 flags S/SA keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27030 keep state label "USER_RULE"
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27030 flags S/SA keep state label "USER_RULE"
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27030 keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27019 flags S/SA keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27019 keep state label "USER_RULE"
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27019 flags S/SA keep state label "USER_RULE"
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27019 keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27020 flags S/SA keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27020 keep state label "USER_RULE"
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27020 flags S/SA keep state label "USER_RULE"
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27020 keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27021 flags S/SA keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27021 keep state label "USER_RULE"
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27021 flags S/SA keep state label "USER_RULE"
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27021 keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27031 flags S/SA keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27031 keep state label "USER_RULE"
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27031 flags S/SA keep state label "USER_RULE"
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27031 keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27022 flags S/SA keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27022 keep state label "USER_RULE"
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27022 flags S/SA keep state label "USER_RULE"
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27022 keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 52001 flags S/SA keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 52001 keep state label "USER_RULE"
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 52001 flags S/SA keep state label "USER_RULE"
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 52001 keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27032 flags S/SA keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27032 keep state label "USER_RULE"
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27032 flags S/SA keep state label "USER_RULE"
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27032 keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27033 flags S/SA keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27033 keep state label "USER_RULE"
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27033 flags S/SA keep state label "USER_RULE"
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27033 keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27035 flags S/SA keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27035 keep state label "USER_RULE"
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27035 flags S/SA keep state label "USER_RULE"
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27035 keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27036 flags S/SA keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27036 keep state label "USER_RULE"
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27036 flags S/SA keep state label "USER_RULE"
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27036 keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27037 flags S/SA keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27037 keep state label "USER_RULE"
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27037 flags S/SA keep state label "USER_RULE"
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27037 keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27038 flags S/SA keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27038 keep state label "USER_RULE"
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27038 flags S/SA keep state label "USER_RULE"
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27038 keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27039 flags S/SA keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27039 keep state label "USER_RULE"
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27039 flags S/SA keep state label "USER_RULE"
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27039 keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27040 flags S/SA keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27040 keep state label "USER_RULE"
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27040 flags S/SA keep state label "USER_RULE"
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27040 keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27041 flags S/SA keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27041 keep state label "USER_RULE"
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27041 flags S/SA keep state label "USER_RULE"
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27041 keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27042 flags S/SA keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27042 keep state label "USER_RULE"
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27042 flags S/SA keep state label "USER_RULE"
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27042 keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27043 flags S/SA keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27043 keep state label "USER_RULE"
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27043 flags S/SA keep state label "USER_RULE"
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27043 keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27044 flags S/SA keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27044 keep state label "USER_RULE"
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27044 flags S/SA keep state label "USER_RULE"
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27044 keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27045 flags S/SA keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27045 keep state label "USER_RULE"
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27045 flags S/SA keep state label "USER_RULE"
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27045 keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27046 flags S/SA keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27046 keep state label "USER_RULE"
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27046 flags S/SA keep state label "USER_RULE"
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27046 keep state label "USER_RULE"
                              pass in quick on nfe0 inet proto tcp from 89.20.141.32 to 192.168.200.1 port = ssh flags S/SA keep state label "USER_RULE: NAT "
                              pass in quick on nfe0 inet proto udp from 89.20.141.32 to 192.168.200.1 port = ssh keep state label "USER_RULE: NAT "
                              pass in quick on ng0 inet proto tcp from 89.20.141.32 to 192.168.200.1 port = ssh flags S/SA keep state label "USER_RULE: NAT "
                              pass in quick on ng0 inet proto udp from 89.20.141.32 to 192.168.200.1 port = ssh keep state label "USER_RULE: NAT "
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 10000 flags S/SA keep state label "USER_RULE: NAT "
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 10000 keep state label "USER_RULE: NAT "
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 10000 flags S/SA keep state label "USER_RULE: NAT "
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 10000 keep state label "USER_RULE: NAT "
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27047 flags S/SA keep state label "USER_RULE: NAT "
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27047 keep state label "USER_RULE: NAT "
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27047 flags S/SA keep state label "USER_RULE: NAT "
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27047 keep state label "USER_RULE: NAT "
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = 27048 flags S/SA keep state label "USER_RULE: NAT Virtual_Server_CS_27048"
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = 27048 keep state label "USER_RULE: NAT Virtual_Server_CS_27048"
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = 27048 flags S/SA keep state label "USER_RULE: NAT Virtual_Server_CS_27048"
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = 27048 keep state label "USER_RULE: NAT Virtual_Server_CS_27048"
                              pass in quick on ste0 inet from 192.168.200.0/24 to any flags S/SA keep state label "USER_RULE: Default LAN -> any"
                              pass in quick on ste0 inet proto tcp from 192.168.200.0/24 to 127.0.0.1 port 7999 >< 8031 flags S/SA keep state label "USER_RULE: FTP-LAN-INNET"
                              pass in quick on ste0 inet proto udp from 192.168.200.0/24 to 127.0.0.1 port 7999 >< 8031 keep state label "USER_RULE: FTP-LAN-INNET"
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = ftp flags S/SA keep state label "USER_RULE: NAT "
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = ftp keep state label "USER_RULE: NAT "
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = ftp flags S/SA keep state label "USER_RULE: NAT "
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = ftp keep state label "USER_RULE: NAT "
                              pass in quick on nfe0 inet proto tcp from any to 217.197.240.43 port = ftp flags S/SA keep state label "USER_RULE: NAT "
                              pass in quick on nfe0 inet proto udp from any to 217.197.240.43 port = ftp keep state label "USER_RULE: NAT "
                              pass in quick on ng0 inet proto tcp from any to 217.197.240.43 port = ftp flags S/SA keep state label "USER_RULE: NAT "
                              pass in quick on ng0 inet proto udp from any to 217.197.240.43 port = ftp keep state label "USER_RULE: NAT "
                              pass in quick on nfe0 inet proto tcp from any to 192.168.200.1 port = ftp-data flags S/SA keep state label "USER_RULE: NAT "
                              pass in quick on nfe0 inet proto udp from any to 192.168.200.1 port = ftp-data keep state label "USER_RULE: NAT "
                              pass in quick on ng0 inet proto tcp from any to 192.168.200.1 port = ftp-data flags S/SA keep state label "USER_RULE: NAT "
                              pass in quick on ng0 inet proto udp from any to 192.168.200.1 port = ftp-data keep state label "USER_RULE: NAT "
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = ftp-proxy flags S/SA keep state label "FTP PROXY: Allow traffic to localhost"
                              pass in quick on ste0 inet proto tcp from any to 127.0.0.1 port = ftp flags S/SA keep state label "FTP PROXY: Allow traffic to localhost"
                              pass in quick on ng0 inet proto tcp from any port = ftp-data to (ng0) port > 49000 flags S/SA keep state label "FTP PROXY: PASV mode data connection"
                              pass in quick on ng0 inet proto tcp from any to (ng0) port > 49000 flags S/SA keep state label "FTP PROXY: RFC959 violation workaround"
                              anchor "imspector" all
                              anchor "miniupnpd" all
                              block drop in log quick all label "Default block all just to be sure."
                              block drop out log quick all label "Default block all just to be sure."</sshlockout></virusprot></snort2c></snort2c>
                              
                              $ pfctl -sn
                              nat-anchor "pftpx/*" all
                              nat-anchor "natearly/*" all
                              nat-anchor "natrules/*" all
                              nat on nfe0 inet from 192.168.200.0/24 port = isakmp to any port = isakmp -> (ng0) port 500 round-robin
                              nat on ng0 inet from 192.168.200.0/24 port = isakmp to any port = isakmp -> (ng0) port 500 round-robin
                              nat on nfe0 inet from 192.168.200.0/24 port = 5060 to any port = 5060 -> (ng0) port 5060 round-robin
                              nat on ng0 inet from 192.168.200.0/24 port = 5060 to any port = 5060 -> (ng0) port 5060 round-robin
                              nat on nfe0 inet from 192.168.200.0/24 to any -> (ng0) round-robin
                              nat on ng0 inet from 192.168.200.0/24 to any -> (ng0) round-robin
                              rdr-anchor "pftpx/*" all
                              rdr-anchor "slb" all
                              no rdr on ste0 proto tcp from any to <vpns> port = ftp
                              rdr on ste0 inet proto tcp from any to any port = ftp -> 127.0.0.1 port 8021
                              rdr on ng0 inet proto tcp from any to 217.197.240.43 port = http -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to 217.197.240.43 port = http -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to 217.197.240.43 port = http -> 127.0.0.1 port 19000
                              rdr on ste0 inet proto udp from any to 217.197.240.43 port = http -> 127.0.0.1 port 19001
                              rdr on ng0 inet proto tcp from any to any port = 27015 -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to any port = 27015 -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = 27015 -> 127.0.0.1 port 19002
                              rdr on ste0 inet proto udp from any to any port = 27015 -> 127.0.0.1 port 19003
                              rdr on ng0 inet proto tcp from any to any port = 27010 -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to any port = 27010 -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = 27010 -> 127.0.0.1 port 19004
                              rdr on ste0 inet proto udp from any to any port = 27010 -> 127.0.0.1 port 19005
                              rdr on ng0 inet proto tcp from any to any port = 27011 -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = 27011 -> 127.0.0.1 port 19006
                              rdr on ng0 inet proto tcp from any to any port = 27040 -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to any port = 27040 -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = 27040 -> 127.0.0.1 port 19007
                              rdr on ste0 inet proto udp from any to any port = 27040 -> 127.0.0.1 port 19008
                              rdr on ng0 inet proto tcp from any to any port = 27025 -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to any port = 27025 -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = 27025 -> 127.0.0.1 port 19009
                              rdr on ste0 inet proto udp from any to any port = 27025 -> 127.0.0.1 port 19010
                              rdr on ng0 inet proto tcp from any to any port = afs3-prserver -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to any port = afs3-prserver -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = afs3-prserver -> 127.0.0.1 port 19011
                              rdr on ste0 inet proto udp from any to any port = afs3-prserver -> 127.0.0.1 port 19012
                              rdr on ng0 inet proto tcp from any to any port = 6003 -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to any port = 6003 -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = 6003 -> 127.0.0.1 port 19013
                              rdr on ste0 inet proto udp from any to any port = 6003 -> 127.0.0.1 port 19014
                              rdr on ng0 inet proto tcp from any to any port = 27016 -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to any port = 27016 -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = 27016 -> 127.0.0.1 port 19015
                              rdr on ste0 inet proto udp from any to any port = 27016 -> 127.0.0.1 port 19016
                              rdr on ng0 inet proto tcp from any to 217.197.240.43 port = 27960 -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to 217.197.240.43 port = 27960 -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to 217.197.240.43 port = 27960 -> 127.0.0.1 port 19017
                              rdr on ste0 inet proto udp from any to 217.197.240.43 port = 27960 -> 127.0.0.1 port 19018
                              rdr on ng0 inet proto tcp from any to any port = 27017 -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to any port = 27017 -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = 27017 -> 127.0.0.1 port 19019
                              rdr on ste0 inet proto udp from any to any port = 27017 -> 127.0.0.1 port 19020
                              rdr on ng0 inet proto tcp from any to any port = 27018 -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to any port = 27018 -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = 27018 -> 127.0.0.1 port 19021
                              rdr on ste0 inet proto udp from any to any port = 27018 -> 127.0.0.1 port 19022
                              rdr on ng0 inet proto tcp from any to any port = 27019 -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to any port = 27019 -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = 27019 -> 127.0.0.1 port 19023
                              rdr on ste0 inet proto udp from any to any port = 27019 -> 127.0.0.1 port 19024
                              rdr on ng0 inet proto tcp from any to any port = 27020 -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to any port = 27020 -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = 27020 -> 127.0.0.1 port 19025
                              rdr on ste0 inet proto udp from any to any port = 27020 -> 127.0.0.1 port 19026
                              rdr on ng0 inet proto tcp from any to any port = 27030 -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to any port = 27030 -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = 27030 -> 127.0.0.1 port 19027
                              rdr on ste0 inet proto udp from any to any port = 27030 -> 127.0.0.1 port 19028
                              rdr on ng0 inet proto tcp from any to any port = 27021 -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to any port = 27021 -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = 27021 -> 127.0.0.1 port 19029
                              rdr on ste0 inet proto udp from any to any port = 27021 -> 127.0.0.1 port 19030
                              rdr on ng0 inet proto tcp from any to any port = 27031 -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to any port = 27031 -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = 27031 -> 127.0.0.1 port 19031
                              rdr on ste0 inet proto udp from any to any port = 27031 -> 127.0.0.1 port 19032
                              rdr on ng0 inet proto tcp from any to any port = 27022 -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to any port = 27022 -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = 27022 -> 127.0.0.1 port 19033
                              rdr on ste0 inet proto udp from any to any port = 27022 -> 127.0.0.1 port 19034
                              rdr on ng0 inet proto tcp from any to any port = 52001 -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to any port = 52001 -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = 52001 -> 127.0.0.1 port 19035
                              rdr on ste0 inet proto udp from any to any port = 52001 -> 127.0.0.1 port 19036
                              rdr on ng0 inet proto tcp from any to any port = 27032 -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to any port = 27032 -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = 27032 -> 127.0.0.1 port 19037
                              rdr on ste0 inet proto udp from any to any port = 27032 -> 127.0.0.1 port 19038
                              rdr on ng0 inet proto tcp from any to any port = 27033 -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to any port = 27033 -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = 27033 -> 127.0.0.1 port 19039
                              rdr on ste0 inet proto udp from any to any port = 27033 -> 127.0.0.1 port 19040
                              rdr on ng0 inet proto tcp from any to any port = 27035 -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to any port = 27035 -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = 27035 -> 127.0.0.1 port 19041
                              rdr on ste0 inet proto udp from any to any port = 27035 -> 127.0.0.1 port 19042
                              rdr on ng0 inet proto tcp from any to any port = 27036 -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to any port = 27036 -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = 27036 -> 127.0.0.1 port 19043
                              rdr on ste0 inet proto udp from any to any port = 27036 -> 127.0.0.1 port 19044
                              rdr on ng0 inet proto tcp from any to any port = 27037 -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to any port = 27037 -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = 27037 -> 127.0.0.1 port 19045
                              rdr on ste0 inet proto udp from any to any port = 27037 -> 127.0.0.1 port 19046
                              rdr on ng0 inet proto tcp from any to any port = 27038 -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to any port = 27038 -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = 27038 -> 127.0.0.1 port 19047
                              rdr on ste0 inet proto udp from any to any port = 27038 -> 127.0.0.1 port 19048
                              rdr on ng0 inet proto tcp from any to any port = 27039 -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to any port = 27039 -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = 27039 -> 127.0.0.1 port 19049
                              rdr on ste0 inet proto udp from any to any port = 27039 -> 127.0.0.1 port 19050
                              rdr on ng0 inet proto tcp from any to any port = 27041 -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to any port = 27041 -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = 27041 -> 127.0.0.1 port 19051
                              rdr on ste0 inet proto udp from any to any port = 27041 -> 127.0.0.1 port 19052
                              rdr on ng0 inet proto tcp from any to any port = 27042 -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to any port = 27042 -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = 27042 -> 127.0.0.1 port 19053
                              rdr on ste0 inet proto udp from any to any port = 27042 -> 127.0.0.1 port 19054
                              rdr on ng0 inet proto tcp from any to any port = 27043 -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to any port = 27043 -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = 27043 -> 127.0.0.1 port 19055
                              rdr on ste0 inet proto udp from any to any port = 27043 -> 127.0.0.1 port 19056
                              rdr on ng0 inet proto tcp from any to any port = 27044 -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to any port = 27044 -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = 27044 -> 127.0.0.1 port 19057
                              rdr on ste0 inet proto udp from any to any port = 27044 -> 127.0.0.1 port 19058
                              rdr on ng0 inet proto tcp from any to any port = 27045 -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to any port = 27045 -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = 27045 -> 127.0.0.1 port 19059
                              rdr on ste0 inet proto udp from any to any port = 27045 -> 127.0.0.1 port 19060
                              rdr on ng0 inet proto tcp from any to any port = 27046 -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to any port = 27046 -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = 27046 -> 127.0.0.1 port 19061
                              rdr on ste0 inet proto udp from any to any port = 27046 -> 127.0.0.1 port 19062
                              rdr on ng0 inet proto tcp from any to any port = 27047 -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to any port = 27047 -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = 27047 -> 127.0.0.1 port 19063
                              rdr on ste0 inet proto udp from any to any port = 27047 -> 127.0.0.1 port 19064
                              rdr on ng0 inet proto tcp from any to any port = 27048 -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to any port = 27048 -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = 27048 -> 127.0.0.1 port 19065
                              rdr on ste0 inet proto udp from any to any port = 27048 -> 127.0.0.1 port 19066
                              rdr on ng0 inet proto tcp from any to any port = ssh -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to any port = ssh -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = ssh -> 127.0.0.1 port 19067
                              rdr on ste0 inet proto udp from any to any port = ssh -> 127.0.0.1 port 19068
                              rdr on ng0 inet proto tcp from any to any port = 10000 -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to any port = 10000 -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to any port = 10000 -> 127.0.0.1 port 19069
                              rdr on ste0 inet proto udp from any to any port = 10000 -> 127.0.0.1 port 19070
                              rdr on ng0 inet proto tcp from any to 217.197.240.43 port = ftp-data -> 192.168.200.1
                              rdr on ng0 inet proto udp from any to 217.197.240.43 port = ftp-data -> 192.168.200.1
                              rdr on ste0 inet proto tcp from any to 217.197.240.43 port = ftp-data -> 127.0.0.1 port 19071
                              rdr on ste0 inet proto udp from any to 217.197.240.43 port = ftp-data -> 127.0.0.1 port 19072
                              rdr-anchor "imspector" all
                              rdr-anchor "miniupnpd" all
                              rdr on ste0 inet proto tcp from any to (ste0) port = 3128 -> 127.0.0.1 port 3128
                              rdr on ng0 inet proto tcp from any to (ng0) port = 3128 -> 127.0.0.1 port 3128</vpns>
                              
                              1 Reply Last reply Reply Quote 0
                              • E
                                Eugene
                                last edited by

                                странно, должно вроде работать.
                                придётся тисипидампить

                                tcpdump -ni ste0 host 192.168.20.x
                                

                                x возьми из ip компьютера, с которого тестируешь.

                                http://ru.doc.pfsense.org

                                1 Reply Last reply Reply Quote 0
                                • I
                                  iliaxxx
                                  last edited by

                                  05 IP 192.168.200.105.35075 > 192.168.200.254.443: F 4885:4885(0) ack 18709 win 849 <nop,nop,timestamp 9127872="" 1815776298="">
                                  23:18:02.471957 IP 192.168.200.254.443 > 192.168.200.105.35075: . ack 4886 win 4140 <nop,nop,timestamp 9127872="" 1815777917="">
                                  23:18:02.472101 IP 192.168.200.254.443 > 192.168.200.105.35075: P 18709:18746(37) ack 4886 win 4140 <nop,nop,timestamp 9127872="" 1815777917="">
                                  23:18:02.472139 IP 192.168.200.254.443 > 192.168.200.105.35075: F 18746:18746(0) ack 4886 win 4140 <nop,nop,timestamp 9127872="" 1815777917="">
                                  23:18:02.472876 IP 192.168.200.105.35077 > 192.168.200.254.443: S 433524396:433524396(0) win 5840 <mss 6="" 9127872="" 1460,sackok,timestamp="" 0,nop,wscale="">
                                  23:18:02.472976 IP 192.168.200.254.443 > 192.168.200.105.35077: S 201885656:201885656(0) ack 433524397 win 65228 <mss 9127872="" 546556651="" 1452,nop,wscale="" 4,sackok,timestamp="">
                                  23:18:02.473875 IP 192.168.200.105.35075 > 192.168.200.254.443: R 211861402:211861402(0) win 0
                                  23:18:02.473910 IP 192.168.200.105.35075 > 192.168.200.254.443: R 211861402:211861402(0) win 0
                                  23:18:02.474929 IP 192.168.200.105.35077 > 192.168.200.254.443: . ack 1 win 92 <nop,nop,timestamp 9127873="" 546556651="">
                                  23:18:02.477874 IP 192.168.200.105.35077 > 192.168.200.254.443: P 1:151(150) ack 1 win 92 <nop,nop,timestamp 9127873="" 546556651="">
                                  23:18:02.477911 IP 192.168.200.254.443 > 192.168.200.105.35077: . ack 151 win 4130 <nop,nop,timestamp 9127873="" 546556656="">
                                  23:18:02.478200 IP 192.168.200.254.443 > 192.168.200.105.35077: P 1:139(138) ack 151 win 4140 <nop,nop,timestamp 9127873="" 546556656="">
                                  23:18:02.479874 IP 192.168.200.105.35077 > 192.168.200.254.443: . ack 139 win 108 <nop,nop,timestamp 9127874="" 546556656="">
                                  23:18:02.480908 IP 192.168.200.105.35077 > 192.168.200.254.443: P 151:157(6) ack 139 win 108 <nop,nop,timestamp 9127874="" 546556656="">
                                  23:18:02.480930 IP 192.168.200.254.443 > 192.168.200.105.35077: . ack 157 win 4139 <nop,nop,timestamp 9127874="" 546556659="">
                                  23:18:02.483017 IP 192.168.200.105.35077 > 192.168.200.254.443: P 157:210(53) ack 139 win 108 <nop,nop,timestamp 9127875="" 546556659="">
                                  23:18:02.483039 IP 192.168.200.254.443 > 192.168.200.105.35077: . ack 210 win 4136 <nop,nop,timestamp 9127875="" 546556661="">
                                  23:18:02.487892 IP 192.168.200.105.35077 > 192.168.200.254.443: P 210:983(773) ack 139 win 108 <nop,nop,timestamp 9127876="" 546556661="">
                                  23:18:02.487929 IP 192.168.200.254.443 > 192.168.200.105.35077: . ack 983 win 4091 <nop,nop,timestamp 9127876="" 546556666="">
                                  23:18:02.503686 IP 192.168.200.254.443 > 192.168.200.105.35077: P 139:517(378) ack 983 win 4140 <nop,nop,timestamp 9127876="" 546556681="">
                                  23:18:02.511874 IP 192.168.200.105.35076 > 192.168.200.254.443: P 2966:3611(645) ack 3089 win 259 <nop,nop,timestamp 9127882="" 4115385897="">
                                  23:18:02.511919 IP 192.168.200.254.443 > 192.168.200.105.35076: . ack 3611 win 4099 <nop,nop,timestamp 9127882="" 4115386523="">
                                  23:18:02.531391 IP 192.168.200.254.443 > 192.168.200.105.35076: P 3089:3291(202) ack 3611 win 4140 <nop,nop,timestamp 9127882="" 4115386542="">
                                  23:18:02.532922 IP 192.168.200.105.35076 > 192.168.200.254.443: . ack 3291 win 276 <nop,nop,timestamp 9127887="" 4115386542="">
                                  23:18:02.532985 IP 192.168.200.254.443 > 192.168.200.105.35076: P 3291:3545(254) ack 3611 win 4140 <nop,nop,timestamp 9127887="" 4115386544="">
                                  23:18:02.534061 IP 192.168.200.105.35076 > 192.168.200.254.443: . ack 3545 win 293 <nop,nop,timestamp 9127888="" 4115386544="">
                                  23:18:02.534102 IP 192.168.200.254.443 > 192.168.200.105.35076: P 3545:3619(74) ack 3611 win 4140 <nop,nop,timestamp 9127888="" 4115386545="">
                                  23:18:02.535890 IP 192.168.200.105.35076 > 192.168.200.254.443: . ack 3619 win 293 <nop,nop,timestamp 9127888="" 4115386545="">
                                  23:18:02.541906 IP 192.168.200.105.35077 > 192.168.200.254.443: . ack 517 win 125 <nop,nop,timestamp 9127890="" 546556681="">
                                  23:18:02.541942 IP 192.168.200.254.443 > 192.168.200.105.35077: P 517:739(222) ack 983 win 4140 <nop,nop,timestamp 9127890="" 546556720="">
                                  23:18:02.543874 IP 192.168.200.105.35077 > 192.168.200.254.443: . ack 739 win 142 <nop,nop,timestamp 9127890="" 546556720="">
                                  23:18:02.820345 IP 192.168.200.254.443 > 192.168.200.105.35068: P 786133:786207(74) ack 0 win 4140 <nop,nop,timestamp 9127711="" 4240374817="">
                                  23:18:02.821070 IP 192.168.200.254.443 > 192.168.200.105.35068: . 786207:787647(1440) ack 0 win 4140 <nop,nop,timestamp 9127711="" 4240374818="">
                                  23:18:02.821693 IP 192.168.200.254.443 > 192.168.200.105.35068: . 787647:789087(1440) ack 0 win 4140 <nop,nop,timestamp 9127711="" 4240374818="">
                                  23:18:02.822032 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 786207 win 1435 <nop,nop,timestamp 9127959="" 4240374817="">
                                  23:18:02.822219 IP 192.168.200.254.443 > 192.168.200.105.35068: . 789087:790527(1440) ack 0 win 4140 <nop,nop,timestamp 9127959="" 4240374819="">
                                  23:18:02.822495 IP 192.168.200.254.443 > 192.168.200.105.35068: . 790527:791967(1440) ack 0 win 4140 <nop,nop,timestamp 9127959="" 4240374819="">
                                  23:18:02.822753 IP 192.168.200.254.443 > 192.168.200.105.35068: . 791967:793407(1440) ack 0 win 4140 <nop,nop,timestamp 9127959="" 4240374819="">
                                  23:18:02.822913 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 787647 win 1435 <nop,nop,timestamp 9127960="" 4240374818="">
                                  23:18:02.823220 IP 192.168.200.254.443 > 192.168.200.105.35068: . 793407:794847(1440) ack 0 win 4140 <nop,nop,timestamp 9127960="" 4240374820="">
                                  23:18:02.824055 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 789087 win 1435 <nop,nop,timestamp 9127960="" 4240374818="">
                                  23:18:02.824082 IP 192.168.200.254.443 > 192.168.200.105.35068: . 794847:796287(1440) ack 0 win 4140 <nop,nop,timestamp 9127960="" 4240374821="">
                                  23:18:02.824088 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 790527 win 1413 <nop,nop,timestamp 9127960="" 4240374819="">
                                  23:18:02.824909 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 791967 win 1435 <nop,nop,timestamp 9127960="" 4240374819="">
                                  23:18:02.826905 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 793407 win 1413 <nop,nop,timestamp 9127960="" 4240374819="">
                                  23:18:02.826924 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 794847 win 1391 <nop,nop,timestamp 9127960="" 4240374820="">
                                  23:18:02.826941 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 796287 win 1369 <nop,nop,timestamp 9127961="" 4240374821="">
                                  23:18:02.826964 IP 192.168.200.254.443 > 192.168.200.105.35068: P 796287:797239(952) ack 0 win 4140 <nop,nop,timestamp 9127961="" 4240374824="">
                                  23:18:02.828874 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 797239 win 1435 <nop,nop,timestamp 9127961="" 4240374824="">
                                  23:18:02.916273 IP 192.168.200.254.443 > 192.168.200.105.35072: P 8941:9319(378) ack 10157 win 4140 <nop,nop,timestamp 9127727="" 2452254241="">
                                  23:18:02.917885 IP 192.168.200.105.35072 > 192.168.200.254.443: . ack 9319 win 594 <nop,nop,timestamp 9127983="" 2452254241="">
                                  23:18:02.917979 IP 192.168.200.254.443 > 192.168.200.105.35072: P 9319:9541(222) ack 10157 win 4140 <nop,nop,timestamp 9127983="" 2452254243="">
                                  23:18:02.919875 IP 192.168.200.105.35072 > 192.168.200.254.443: . ack 9541 win 611 <nop,nop,timestamp 9127984="" 2452254243="">
                                  23:18:02.919924 IP 192.168.200.254.443 > 192.168.200.105.35072: P 9541:9615(74) ack 10157 win 4140 <nop,nop,timestamp 9127984="" 2452254245="">
                                  23:18:02.921004 IP 192.168.200.105.35072 > 192.168.200.254.443: . ack 9615 win 611 <nop,nop,timestamp 9127984="" 2452254245="">
                                  23:18:02.925910 IP 192.168.200.105.35072 > 192.168.200.254.443: P 10157:10818(661) ack 9615 win 611 <nop,nop,timestamp 9127985="" 2452254245="">
                                  23:18:02.925934 IP 192.168.200.254.443 > 192.168.200.105.35072: . ack 10818 win 4098 <nop,nop,timestamp 9127985="" 2452254251="">
                                  23:18:03.319903 IP 192.168.200.105.42907 > 91.203.96.252.443: S 444611511:444611511(0) win 5840 <mss 6="" 9128084="" 1460,sackok,timestamp="" 0,nop,wscale="">
                                  23:18:03.358999 IP 91.203.96.252.443 > 192.168.200.105.42907: S 2441822829:2441822829(0) ack 444611512 win 5792 <mss 7="" 1842063049="" 1452,sackok,timestamp="" 9128084,nop,wscale="">
                                  23:18:03.360893 IP 192.168.200.105.42907 > 91.203.96.252.443: . ack 1 win 92 <nop,nop,timestamp 9128094="" 1842063049="">
                                  23:18:03.363016 IP 192.168.200.105.42907 > 91.203.96.252.443: P 1:181(180) ack 1 win 92 <nop,nop,timestamp 9128095="" 1842063049="">
                                  23:18:03.402942 IP 91.203.96.252.443 > 192.168.200.105.42907: . ack 181 win 54 <nop,nop,timestamp 9128095="" 1842063060="">
                                  23:18:03.407974 IP 91.203.96.252.443 > 192.168.200.105.42907: P 1:139(138) ack 181 win 54 <nop,nop,timestamp 9128095="" 1842063061="">
                                  23:18:03.412890 IP 192.168.200.105.42907 > 91.203.96.252.443: . ack 139 win 108 <nop,nop,timestamp 9128106="" 1842063061="">
                                  23:18:03.413887 IP 192.168.200.105.42907 > 91.203.96.252.443: P 181:187(6) ack 139 win 108 <nop,nop,timestamp 9128107="" 1842063061="">
                                  23:18:03.493971 IP 91.203.96.252.443 > 192.168.200.105.42907: . ack 187 win 54 <nop,nop,timestamp 9128107="" 1842063083="">
                                  23:18:03.495874 IP 192.168.200.105.42907 > 91.203.96.252.443: P 187:1557(1370) ack 139 win 108 <nop,nop,timestamp 9128128="" 1842063083="">
                                  23:18:03.533436 IP 192.168.200.254.443 > 192.168.200.105.35077: P 739:813(74) ack 983 win 4140 <nop,nop,timestamp 9127890="" 546557711="">
                                  23:18:03.534992 IP 192.168.200.105.35077 > 192.168.200.254.443: . ack 813 win 142 <nop,nop,timestamp 9128138="" 546557711="">
                                  23:18:03.535054 IP 192.168.200.254.443 > 192.168.200.105.35077: P 813:993(180) ack 983 win 4140 <nop,nop,timestamp 9128138="" 546557713="">
                                  23:18:03.536877 IP 192.168.200.105.35077 > 192.168.200.254.443: . ack 993 win 159 <nop,nop,timestamp 9128138="" 546557713="">
                                  23:18:03.536935 IP 192.168.200.254.443 > 192.168.200.105.35077: P 993:1067(74) ack 983 win 4140 <nop,nop,timestamp 9128138="" 546557715="">
                                  23:18:03.537006 IP 91.203.96.252.443 > 192.168.200.105.42907: . ack 1557 win 77 <nop,nop,timestamp 9128128="" 1842063093="">
                                  23:18:03.538875 IP 192.168.200.105.35077 > 192.168.200.254.443: . ack 1067 win 159 <nop,nop,timestamp 9128139="" 546557715="">
                                  23:18:03.820324 IP 192.168.200.254.443 > 192.168.200.105.35068: P 797239:797313(74) ack 0 win 4140 <nop,nop,timestamp 9127961="" 4240375817="">
                                  23:18:03.821204 IP 192.168.200.254.443 > 192.168.200.105.35068: . 797313:798753(1440) ack 0 win 4140 <nop,nop,timestamp 9127961="" 4240375818="">
                                  23:18:03.821968 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 797313 win 1435 <nop,nop,timestamp 9128209="" 4240375817="">
                                  23:18:03.822427 IP 192.168.200.254.443 > 192.168.200.105.35068: . 798753:800193(1440) ack 0 win 4140 <nop,nop,timestamp 9128209="" 4240375819="">
                                  23:18:03.822682 IP 192.168.200.254.443 > 192.168.200.105.35068: . 800193:801633(1440) ack 0 win 4140 <nop,nop,timestamp 9128209="" 4240375819="">
                                  23:18:03.823044 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 798753 win 1413 <nop,nop,timestamp 9128210="" 4240375818="">
                                  23:18:03.823166 IP 192.168.200.254.443 > 192.168.200.105.35068: . 801633:803073(1440) ack 0 win 4140 <nop,nop,timestamp 9128210="" 4240375820="">
                                  23:18:03.823421 IP 192.168.200.254.443 > 192.168.200.105.35068: . 803073:804513(1440) ack 0 win 4140 <nop,nop,timestamp 9128210="" 4240375820="">
                                  23:18:03.823676 IP 192.168.200.254.443 > 192.168.200.105.35068: . 804513:805953(1440) ack 0 win 4140 <nop,nop,timestamp 9128210="" 4240375820="">
                                  23:18:03.825894 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 800193 win 1391 <nop,nop,timestamp 9128210="" 4240375819="">
                                  23:18:03.825930 IP 192.168.200.254.443 > 192.168.200.105.35068: . 805953:807393(1440) ack 0 win 4140 <nop,nop,timestamp 9128210="" 4240375823="">
                                  23:18:03.825937 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 801633 win 1369 <nop,nop,timestamp 9128210="" 4240375819="">
                                  23:18:03.825958 IP 192.168.200.254.443 > 192.168.200.105.35068: . 807393:808833(1440) ack 0 win 4140 <nop,nop,timestamp 9128210="" 4240375823="">
                                  23:18:03.825984 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 803073 win 1347 <nop,nop,timestamp 9128210="" 4240375820="">
                                  23:18:03.826013 IP 192.168.200.254.443 > 192.168.200.105.35068: . 808833:810273(1440) ack 0 win 4140 <nop,nop,timestamp 9128210="" 4240375823="">
                                  23:18:03.827875 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 804513 win 1325 <nop,nop,timestamp 9128210="" 4240375820="">
                                  23:18:03.827905 IP 192.168.200.254.443 > 192.168.200.105.35068: . 810273:811713(1440) ack 0 win 4140 <nop,nop,timestamp 9128210="" 4240375825="">
                                  23:18:03.827912 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 805953 win 1303 <nop,nop,timestamp 9128210="" 4240375820="">
                                  23:18:03.827936 IP 192.168.200.254.443 > 192.168.200.105.35068: . 811713:813153(1440) ack 0 win 4140 <nop,nop,timestamp 9128210="" 4240375825="">
                                  23:18:03.827947 IP 192.168.200.254.443 > 192.168.200.105.35068: . 813153:814593(1440) ack 0 win 4140 <nop,nop,timestamp 9128210="" 4240375825="">
                                  23:18:03.829873 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 807393 win 1281 <nop,nop,timestamp 9128211="" 4240375823="">
                                  23:18:03.829903 IP 192.168.200.254.443 > 192.168.200.105.35068: . 814593:816033(1440) ack 0 win 4140 <nop,nop,timestamp 9128211="" 4240375827="">
                                  23:18:03.837993 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 816033 win 1146 <nop,nop,timestamp 9128214="" 4240375823="">
                                  23:18:03.838041 IP 192.168.200.254.443 > 192.168.200.105.35068: . 816033:817473(1440) ack 0 win 4140 <nop,nop,timestamp 9128214="" 4240375835="">
                                  23:18:03.838052 IP 192.168.200.254.443 > 192.168.200.105.35068: . 817473:818913(1440) ack 0 win 4140 <nop,nop,timestamp 9128214="" 4240375835="">
                                  23:18:03.838067 IP 192.168.200.254.443 > 192.168.200.105.35068: P 818913:819769(856) ack 0 win 4140 <nop,nop,timestamp 9128214="" 4240375835="">
                                  23:18:03.840875 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 818913 win 1334 <nop,nop,timestamp 9128214="" 4240375835="">
                                  23:18:03.877875 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 819769 win 1321 <nop,nop,timestamp 9128224="" 4240375835="">
                                  23:18:03.950188 IP 192.168.200.254.443 > 192.168.200.105.35072: P 9615:9993(378) ack 10818 win 4140 <nop,nop,timestamp 9127985="" 2452255275="">
                                  23:18:03.989887 IP 192.168.200.105.35072 > 192.168.200.254.443: . ack 9993 win 628 <nop,nop,timestamp 9128252="" 2452255275="">
                                  23:18:03.989938 IP 192.168.200.254.443 > 192.168.200.105.35072: P 9993:10289(296) ack 10818 win 4140 <nop,nop,timestamp 9128252="" 2452255315="">
                                  23:18:03.991924 IP 192.168.200.105.35072 > 192.168.200.254.443: . ack 10289 win 644 <nop,nop,timestamp 9128252="" 2452255315="">
                                  23:18:04.091889 IP 192.168.200.105.35077 > 192.168.200.254.443: P 983:1644(661) ack 1067 win 159 <nop,nop,timestamp 9128277="" 546557715="">
                                  23:18:04.091934 IP 192.168.200.254.443 > 192.168.200.105.35077: . ack 1644 win 4098 <nop,nop,timestamp 9128277="" 546558270="">
                                  23:18:04.096086 IP 91.203.96.252.443 > 192.168.200.105.42907: P 139:528(389) ack 1557 win 77 <nop,nop,timestamp 9128128="" 1842063233="">
                                  23:18:04.096116 IP 91.203.96.252.443 > 192.168.200.105.42907: P 528:725(197) ack 1557 win 77 <nop,nop,timestamp 9128128="" 1842063233="">
                                  23:18:04.096201 IP 91.203.96.252.443 > 192.168.200.105.42907: F 725:725(0) ack 1557 win 77 <nop,nop,timestamp 9128128="" 1842063233="">
                                  23:18:04.097894 IP 192.168.200.105.42907 > 91.203.96.252.443: . ack 725 win 142 <nop,nop,timestamp 9128278="" 1842063233="">
                                  23:18:04.133874 IP 192.168.200.105.42907 > 91.203.96.252.443: . ack 726 win 142 <nop,nop,timestamp 9128288="" 1842063233="">
                                  23:18:04.136888 IP 192.168.200.105.42907 > 91.203.96.252.443: F 1557:1557(0) ack 726 win 142 <nop,nop,timestamp 9128288="" 1842063233="">
                                  23:18:04.175900 IP 91.203.96.252.443 > 192.168.200.105.42907: . ack 1558 win 77 <nop,nop,timestamp 9128288="" 1842063253="">
                                  23:18:04.820326 IP 192.168.200.254.443 > 192.168.200.105.35068: P 819769:819843(74) ack 0 win 4140 <nop,nop,timestamp 9128224="" 4240376817="">
                                  23:18:04.820849 IP 192.168.200.254.443 > 192.168.200.105.35068: . 819843:821283(1440) ack 0 win 4140 <nop,nop,timestamp 9128224="" 4240376817="">
                                  23:18:04.821501 IP 192.168.200.254.443 > 192.168.200.105.35068: . 821283:822723(1440) ack 0 win 4140 <nop,nop,timestamp 9128224="" 4240376818="">
                                  23:18:04.821897 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 819843 win 1435 <nop,nop,timestamp 9128459="" 4240376817="">
                                  23:18:04.822021 IP 192.168.200.254.443 > 192.168.200.105.35068: . 822723:824163(1440) ack 0 win 4140 <nop,nop,timestamp 9128459="" 4240376819="">
                                  23:18:04.822404 IP 192.168.200.254.443 > 192.168.200.105.35068: P 824163:825603(1440) ack 0 win 4140 <nop,nop,timestamp 9128459="" 4240376819="">
                                  23:18:04.822828 IP 192.168.200.254.443 > 192.168.200.105.35068: . 825603:827043(1440) ack 0 win 4140 <nop,nop,timestamp 9128459="" 4240376819="">
                                  23:18:04.822950 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 821283 win 1435 <nop,nop,timestamp 9128460="" 4240376817="">
                                  23:18:04.823460 IP 192.168.200.254.443 > 192.168.200.105.35068: . 827043:828483(1440) ack 0 win 4140 <nop,nop,timestamp 9128460="" 4240376820="">
                                  23:18:04.824899 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 822723 win 1413 <nop,nop,timestamp 9128460="" 4240376818="">
                                  23:18:04.824933 IP 192.168.200.254.443 > 192.168.200.105.35068: . 828483:829923(1440) ack 0 win 4140 <nop,nop,timestamp 9128460="" 4240376822="">
                                  23:18:04.824939 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 824163 win 1391 <nop,nop,timestamp 9128460="" 4240376819="">
                                  23:18:04.824954 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 825603 win 1369 <nop,nop,timestamp 9128460="" 4240376819="">
                                  23:18:04.825873 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 827043 win 1347 <nop,nop,timestamp 9128460="" 4240376819="">
                                  23:18:04.825889 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 828483 win 1325 <nop,nop,timestamp 9128460="" 4240376820="">
                                  23:18:04.826874 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 829923 win 1303 <nop,nop,timestamp 9128461="" 4240376822="">
                                  23:18:04.826896 IP 192.168.200.254.443 > 192.168.200.105.35068: P 829923:830907(984) ack 0 win 4140 <nop,nop,timestamp 9128461="" 4240376824="">
                                  23:18:04.828899 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 830907 win 1288 <nop,nop,timestamp 9128461="" 4240376824="">
                                  23:18:05.116291 IP 192.168.200.254.443 > 192.168.200.105.35077: P 1067:1445(378) ack 1644 win 4140 <nop,nop,timestamp 9128277="" 546559294="">
                                  23:18:05.117973 IP 192.168.200.105.35077 > 192.168.200.254.443: . ack 1445 win 175 <nop,nop,timestamp 9128533="" 546559294="">
                                  23:18:05.118045 IP 192.168.200.254.443 > 192.168.200.105.35077: P 1445:1667(222) ack 1644 win 4140 <nop,nop,timestamp 9128533="" 546559296="">
                                  23:18:05.119056 IP 192.168.200.105.35077 > 192.168.200.254.443: . ack 1667 win 192 <nop,nop,timestamp 9128534="" 546559296="">
                                  23:18:05.119097 IP 192.168.200.254.443 > 192.168.200.105.35077: P 1667:1741(74) ack 1644 win 4140 <nop,nop,timestamp 9128534="" 546559297="">
                                  23:18:05.120875 IP 192.168.200.105.35077 > 192.168.200.254.443: . ack 1741 win 192 <nop,nop,timestamp 9128534="" 546559297="">
                                  23:18:05.122874 IP 192.168.200.105.35076 > 192.168.200.254.443: P 3611:4272(661) ack 3619 win 293 <nop,nop,timestamp 9128535="" 4115386545="">
                                  23:18:05.122899 IP 192.168.200.254.443 > 192.168.200.105.35076: . ack 4272 win 4098 <nop,nop,timestamp 9128535="" 4115389134="">
                                  23:18:05.538903 IP 192.168.200.105.35072 > 192.168.200.254.443: P 10818:11463(645) ack 10289 win 644 <nop,nop,timestamp 9128638="" 2452255315="">
                                  23:18:05.538950 IP 192.168.200.254.443 > 192.168.200.105.35072: . ack 11463 win 4099 <nop,nop,timestamp 9128638="" 2452256864="">
                                  23:18:05.558521 IP 192.168.200.254.443 > 192.168.200.105.35072: P 10289:10507(218) ack 11463 win 4140 <nop,nop,timestamp 9128638="" 2452256883="">
                                  23:18:05.560081 IP 192.168.200.105.35072 > 192.168.200.254.443: . ack 10507 win 661 <nop,nop,timestamp 9128644="" 2452256883="">
                                  23:18:05.560141 IP 192.168.200.254.443 > 192.168.200.105.35072: P 10507:10761(254) ack 11463 win 4140 <nop,nop,timestamp 9128644="" 2452256885="">
                                  23:18:05.561134 IP 192.168.200.254.443 > 192.168.200.105.35072: FP 10761:10872(111) ack 11463 win 4140 <nop,nop,timestamp 9128644="" 2452256886="">
                                  23:18:05.563894 IP 192.168.200.105.35072 > 192.168.200.254.443: . ack 10761 win 678 <nop,nop,timestamp 9128645="" 2452256885="">
                                  23:18:05.564903 IP 192.168.200.105.35072 > 192.168.200.254.443: P 11463:11500(37) ack 10873 win 678 <nop,nop,timestamp 9128645="" 2452256886="">
                                  23:18:05.564946 IP 192.168.200.254.443 > 192.168.200.105.35072: R 2591590999:2591590999(0) win 0
                                  23:18:05.564951 IP 192.168.200.105.35072 > 192.168.200.254.443: F 11500:11500(0) ack 10873 win 678 <nop,nop,timestamp 9128645="" 2452256886="">
                                  23:18:05.564969 IP 192.168.200.254.443 > 192.168.200.105.35072: R 2591590999:2591590999(0) win 0
                                  23:18:05.820228 IP 192.168.200.254.443 > 192.168.200.105.35068: P 830907:830981(74) ack 0 win 4140 <nop,nop,timestamp 9128461="" 4240377817="">
                                  23:18:05.820764 IP 192.168.200.254.443 > 192.168.200.105.35068: . 830981:832421(1440) ack 0 win 4140 <nop,nop,timestamp 9128461="" 4240377817="">
                                  23:18:05.821401 IP 192.168.200.254.443 > 192.168.200.105.35068: P 832421:833861(1440) ack 0 win 4140 <nop,nop,timestamp 9128461="" 4240377818="">
                                  23:18:05.821820 IP 192.168.200.254.443 > 192.168.200.105.35068: . 833861:835301(1440) ack 0 win 4140 <nop,nop,timestamp 9128461="" 4240377818="">
                                  23:18:05.821919 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 830981 win 1435 <nop,nop,timestamp 9128709="" 4240377817="">
                                  23:18:05.822376 IP 192.168.200.254.443 > 192.168.200.105.35068: . 835301:836741(1440) ack 0 win 4140 <nop,nop,timestamp 9128709="" 4240377819="">
                                  23:18:05.822776 IP 192.168.200.254.443 > 192.168.200.105.35068: . 836741:838181(1440) ack 0 win 4140 <nop,nop,timestamp 9128709="" 4240377819="">
                                  23:18:05.822947 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 832421 win 1435 <nop,nop,timestamp 9128710="" 4240377817="">
                                  23:18:05.823509 IP 192.168.200.254.443 > 192.168.200.105.35068: . 838181:839621(1440) ack 0 win 4140 <nop,nop,timestamp 9128710="" 4240377820="">
                                  23:18:05.823895 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 833861 win 1435 <nop,nop,timestamp 9128710="" 4240377818="">
                                  23:18:05.823918 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 835301 win 1413 <nop,nop,timestamp 9128710="" 4240377818="">
                                  23:18:05.824054 IP 192.168.200.254.443 > 192.168.200.105.35068: . 839621:841061(1440) ack 0 win 4140 <nop,nop,timestamp 9128710="" 4240377821="">
                                  23:18:05.824876 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 836741 win 1391 <nop,nop,timestamp 9128710="" 4240377819="">
                                  23:18:05.825898 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 838181 win 1369 <nop,nop,timestamp 9128710="" 4240377819="">
                                  23:18:05.825918 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 839621 win 1347 <nop,nop,timestamp 9128710="" 4240377820="">
                                  23:18:05.826887 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 841061 win 1435 <nop,nop,timestamp 9128710="" 4240377821="">
                                  23:18:05.826915 IP 192.168.200.254.443 > 192.168.200.105.35068: P 841061:842029(968) ack 0 win 4140 <nop,nop,timestamp 9128710="" 4240377824="">
                                  23:18:05.828874 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 842029 win 1420 <nop,nop,timestamp 9128711="" 4240377824="">
                                  23:18:06.118892 IP 192.168.200.105.46667 > 64.12.28.222.443: P 6:12(6) ack 1 win 47600
                                  23:18:06.147124 IP 192.168.200.254.443 > 192.168.200.105.35076: P 3619:3997(378) ack 4272 win 4140 <nop,nop,timestamp 9128535="" 4115390158="">
                                  23:18:06.148883 IP 192.168.200.105.35076 > 192.168.200.254.443: . ack 3997 win 309 <nop,nop,timestamp 9128791="" 4115390158="">
                                  23:18:06.148952 IP 192.168.200.254.443 > 192.168.200.105.35076: P 3997:4219(222) ack 4272 win 4140 <nop,nop,timestamp 9128791="" 4115390160="">
                                  23:18:06.150074 IP 192.168.200.105.35076 > 192.168.200.254.443: . ack 4219 win 326 <nop,nop,timestamp 9128792="" 4115390160="">
                                  23:18:06.150115 IP 192.168.200.254.443 > 192.168.200.105.35076: P 4219:4293(74) ack 4272 win 4140 <nop,nop,timestamp 9128792="" 4115390161="">
                                  23:18:06.151899 IP 192.168.200.105.35076 > 192.168.200.254.443: . ack 4293 win 326 <nop,nop,timestamp 9128792="" 4115390161="">
                                  23:18:06.155941 IP 192.168.200.105.35077 > 192.168.200.254.443: P 1644:2305(661) ack 1741 win 192 <nop,nop,timestamp 9128793="" 546559297="">
                                  23:18:06.155977 IP 192.168.200.254.443 > 192.168.200.105.35077: . ack 2305 win 4098 <nop,nop,timestamp 9128793="" 546560334="">
                                  23:18:06.268948 IP 64.12.28.222.443 > 192.168.200.105.46667: . ack 12 win 16384
                                  23:18:06.820230 IP 192.168.200.254.443 > 192.168.200.105.35068: P 842029:842103(74) ack 0 win 4140 <nop,nop,timestamp 9128711="" 4240378817="">
                                  23:18:06.820776 IP 192.168.200.254.443 > 192.168.200.105.35068: . 842103:843543(1440) ack 0 win 4140 <nop,nop,timestamp 9128711="" 4240378817="">
                                  23:18:06.821361 IP 192.168.200.254.443 > 192.168.200.105.35068: . 843543:844983(1440) ack 0 win 4140 <nop,nop,timestamp 9128711="" 4240378818="">
                                  23:18:06.821759 IP 192.168.200.254.443 > 192.168.200.105.35068: . 844983:846423(1440) ack 0 win 4140 <nop,nop,timestamp 9128711="" 4240378818="">
                                  23:18:06.821898 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 842103 win 1435 <nop,nop,timestamp 9128959="" 4240378817="">
                                  23:18:06.822288 IP 192.168.200.254.443 > 192.168.200.105.35068: . 846423:847863(1440) ack 0 win 4140 <nop,nop,timestamp 9128959="" 4240378819="">
                                  23:18:06.822690 IP 192.168.200.254.443 > 192.168.200.105.35068: . 847863:849303(1440) ack 0 win 4140 <nop,nop,timestamp 9128959="" 4240378819="">
                                  23:18:06.823897 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 843543 win 1435 <nop,nop,timestamp 9128960="" 4240378817="">
                                  23:18:06.823942 IP 192.168.200.254.443 > 192.168.200.105.35068: . 849303:850743(1440) ack 0 win 4140 <nop,nop,timestamp 9128960="" 4240378821="">
                                  23:18:06.823948 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 844983 win 1435 <nop,nop,timestamp 9128960="" 4240378818="">
                                  23:18:06.823970 IP 192.168.200.254.443 > 192.168.200.105.35068: . 850743:852183(1440) ack 0 win 4140 <nop,nop,timestamp 9128960="" 4240378821="">
                                  23:18:06.825898 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 846423 win 1413 <nop,nop,timestamp 9128960="" 4240378818="">
                                  23:18:06.825920 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 847863 win 1391 <nop,nop,timestamp 9128960="" 4240378819="">
                                  23:18:06.825936 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 849303 win 1369 <nop,nop,timestamp 9128960="" 4240378819="">
                                  23:18:06.826931 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 850743 win 1347 <nop,nop,timestamp 9128960="" 4240378821="">
                                  23:18:06.827874 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 852183 win 1435 <nop,nop,timestamp 9128961="" 4240378821="">
                                  23:18:06.827902 IP 192.168.200.254.443 > 192.168.200.105.35068: P 852183:853437(1254) ack 0 win 4140 <nop,nop,timestamp 9128961="" 4240378825="">
                                  23:18:06.829892 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 853437 win 1416 <nop,nop,timestamp 9128961="" 4240378825="">
                                  23:18:07.180617 IP 192.168.200.254.443 > 192.168.200.105.35077: P 1741:2119(378) ack 2305 win 4140 <nop,nop,timestamp 9128793="" 546561358="">
                                  23:18:07.182105 IP 192.168.200.105.35077 > 192.168.200.254.443: . ack 2119 win 209 <nop,nop,timestamp 9129049="" 546561358="">
                                  23:18:07.182162 IP 192.168.200.254.443 > 192.168.200.105.35077: P 2119:2341(222) ack 2305 win 4140 <nop,nop,timestamp 9129049="" 546561360="">
                                  23:18:07.183922 IP 192.168.200.105.35077 > 192.168.200.254.443: . ack 2341 win 226 <nop,nop,timestamp 9129050="" 546561360="">
                                  23:18:07.183970 IP 192.168.200.254.443 > 192.168.200.105.35077: P 2341:2415(74) ack 2305 win 4140 <nop,nop,timestamp 9129050="" 546561362="">
                                  23:18:07.185874 IP 192.168.200.105.35077 > 192.168.200.254.443: . ack 2415 win 226 <nop,nop,timestamp 9129050="" 546561362="">
                                  23:18:07.189911 IP 192.168.200.105.35076 > 192.168.200.254.443: P 4272:4933(661) ack 4293 win 326 <nop,nop,timestamp 9129051="" 4115390161="">
                                  23:18:07.189940 IP 192.168.200.254.443 > 192.168.200.105.35076: . ack 4933 win 4098 <nop,nop,timestamp 9129051="" 4115391201="">
                                  23:18:07.820264 IP 192.168.200.254.443 > 192.168.200.105.35068: P 853437:853511(74) ack 0 win 4140 <nop,nop,timestamp 9128961="" 4240379817="">
                                  23:18:07.820791 IP 192.168.200.254.443 > 192.168.200.105.35068: . 853511:854951(1440) ack 0 win 4140 <nop,nop,timestamp 9128961="" 4240379817="">
                                  23:18:07.821307 IP 192.168.200.254.443 > 192.168.200.105.35068: . 854951:856391(1440) ack 0 win 4140 <nop,nop,timestamp 9128961="" 4240379818="">
                                  23:18:07.821701 IP 192.168.200.254.443 > 192.168.200.105.35068: . 856391:857831(1440) ack 0 win 4140 <nop,nop,timestamp 9128961="" 4240379818="">
                                  23:18:07.821877 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 853511 win 1435 <nop,nop,timestamp 9129209="" 4240379817="">
                                  23:18:07.822291 IP 192.168.200.254.443 > 192.168.200.105.35068: . 857831:859271(1440) ack 0 win 4140 <nop,nop,timestamp 9129209="" 4240379819="">
                                  23:18:07.822687 IP 192.168.200.254.443 > 192.168.200.105.35068: . 859271:860711(1440) ack 0 win 4140 <nop,nop,timestamp 9129209="" 4240379819="">
                                  23:18:07.822949 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 854951 win 1435 <nop,nop,timestamp 9129210="" 4240379817="">
                                  23:18:07.823237 IP 192.168.200.254.443 > 192.168.200.105.35068: . 860711:862151(1440) ack 0 win 4140 <nop,nop,timestamp 9129210="" 4240379820="">
                                  23:18:07.823875 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 856391 win 1435 <nop,nop,timestamp 9129210="" 4240379818="">
                                  23:18:07.823906 IP 192.168.200.254.443 > 192.168.200.105.35068: . 862151:863591(1440) ack 0 win 4140 <nop,nop,timestamp 9129210="" 4240379821="">
                                  23:18:07.824902 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 857831 win 1413 <nop,nop,timestamp 9129210="" 4240379818="">
                                  23:18:07.825874 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 859271 win 1391 <nop,nop,timestamp 9129210="" 4240379819="">
                                  23:18:07.825897 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 860711 win 1369 <nop,nop,timestamp 9129210="" 4240379819="">
                                  23:18:07.826924 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 862151 win 1347 <nop,nop,timestamp 9129211="" 4240379820="">
                                  23:18:07.826941 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 863591 win 1325 <nop,nop,timestamp 9129211="" 4240379821="">
                                  23:18:07.826965 IP 192.168.200.254.443 > 192.168.200.105.35068: P 863591:864781(1190) ack 0 win 4140 <nop,nop,timestamp 9129211="" 4240379824="">
                                  23:18:07.828889 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 864781 win 1435 <nop,nop,timestamp 9129211="" 4240379824="">
                                  23:18:08.213175 IP 192.168.200.254.443 > 192.168.200.105.35076: P 4293:4671(378) ack 4933 win 4140 <nop,nop,timestamp 9129051="" 4115392224="">
                                  23:18:08.214885 IP 192.168.200.105.35076 > 192.168.200.254.443: . ack 4671 win 343 <nop,nop,timestamp 9129308="" 4115392224="">
                                  23:18:08.214956 IP 192.168.200.254.443 > 192.168.200.105.35076: P 4671:4893(222) ack 4933 win 4140 <nop,nop,timestamp 9129308="" 4115392226="">
                                  23:18:08.216877 IP 192.168.200.105.35076 > 192.168.200.254.443: . ack 4893 win 360 <nop,nop,timestamp 9129308="" 4115392226="">
                                  23:18:08.216940 IP 192.168.200.254.443 > 192.168.200.105.35076: P 4893:4967(74) ack 4933 win 4140 <nop,nop,timestamp 9129308="" 4115392228="">
                                  23:18:08.217973 IP 192.168.200.105.35076 > 192.168.200.254.443: . ack 4967 win 360 <nop,nop,timestamp 9129309="" 4115392228="">
                                  23:18:08.222874 IP 192.168.200.105.35077 > 192.168.200.254.443: P 2305:2966(661) ack 2415 win 226 <nop,nop,timestamp 9129309="" 546561362="">
                                  23:18:08.222900 IP 192.168.200.254.443 > 192.168.200.105.35077: . ack 2966 win 4098 <nop,nop,timestamp 9129309="" 546562401="">
                                  23:18:08.568970 IP 192.168.200.105.35076 > 192.168.200.254.443: P 4933:5578(645) ack 4967 win 360 <nop,nop,timestamp 9129396="" 4115392228="">
                                  23:18:08.569017 IP 192.168.200.254.443 > 192.168.200.105.35076: . ack 5578 win 4099 <nop,nop,timestamp 9129396="" 4115392580="">
                                  23:18:08.588471 IP 192.168.200.254.443 > 192.168.200.105.35076: P 4967:5169(202) ack 5578 win 4140 <nop,nop,timestamp 9129396="" 4115392599="">
                                  23:18:08.589951 IP 192.168.200.105.35076 > 192.168.200.254.443: . ack 5169 win 376 <nop,nop,timestamp 9129401="" 4115392599="">
                                  23:18:08.590015 IP 192.168.200.254.443 > 192.168.200.105.35076: P 5169:5423(254) ack 5578 win 4140 <nop,nop,timestamp 9129401="" 4115392601="">
                                  23:18:08.591876 IP 192.168.200.105.35076 > 192.168.200.254.443: . ack 5423 win 393 <nop,nop,timestamp 9129402="" 4115392601="">
                                  23:18:08.591921 IP 192.168.200.254.443 > 192.168.200.105.35076: P 5423:5497(74) ack 5578 win 4140 <nop,nop,timestamp 9129402="" 4115392603="">
                                  23:18:08.593013 IP 192.168.200.105.35076 > 192.168.200.254.443: . ack 5497 win 393 <nop,nop,timestamp 9129402="" 4115392603="">
                                  23:18:08.820313 IP 192.168.200.254.443 > 192.168.200.105.35068: P 864781:864855(74) ack 0 win 4140 <nop,nop,timestamp 9129211="" 4240380817="">
                                  23:18:08.820858 IP 192.168.200.254.443 > 192.168.200.105.35068: . 864855:866295(1440) ack 0 win 4140 <nop,nop,timestamp 9129211="" 4240380817="">
                                  23:18:08.821491 IP 192.168.200.254.443 > 192.168.200.105.35068: . 866295:867735(1440) ack 0 win 4140 <nop,nop,timestamp 9129211="" 4240380818="">
                                  23:18:08.821934 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 864855 win 1435 <nop,nop,timestamp 9129459="" 4240380817="">
                                  23:18:08.822307 IP 192.168.200.254.443 > 192.168.200.105.35068: . 867735:869175(1440) ack 0 win 4140 <nop,nop,timestamp 9129459="" 4240380819="">
                                  23:18:08.822578 IP 192.168.200.254.443 > 192.168.200.105.35068: . 869175:870615(1440) ack 0 win 4140 <nop,nop,timestamp 9129459="" 4240380819="">
                                  23:18:08.822837 IP 192.168.200.254.443 > 192.168.200.105.35068: . 870615:872055(1440) ack 0 win 4140 <nop,nop,timestamp 9129459="" 4240380819="">
                                  23:18:08.822906 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 866295 win 1435 <nop,nop,timestamp 9129460="" 4240380817="">
                                  23:18:08.823242 IP 192.168.200.254.443 > 192.168.200.105.35068: . 872055:873495(1440) ack 0 win 4140 <nop,nop,timestamp 9129460="" 4240380820="">
                                  23:18:08.823917 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 867735 win 1435 <nop,nop,timestamp 9129460="" 4240380818="">
                                  23:18:08.823949 IP 192.168.200.254.443 > 192.168.200.105.35068: . 873495:874935(1440) ack 0 win 4140 <nop,nop,timestamp 9129460="" 4240380821="">
                                  23:18:08.824874 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 869175 win 1413 <nop,nop,timestamp 9129460="" 4240380819="">
                                  23:18:08.825890 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 870615 win 1391 <nop,nop,timestamp 9129460="" 4240380819="">
                                  23:18:08.826893 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 872055 win 1369 <nop,nop,timestamp 9129460="" 4240380819="">
                                  23:18:08.826910 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 873495 win 1347 <nop,nop,timestamp 9129460="" 4240380820="">
                                  23:18:08.826926 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 874935 win 1325 <nop,nop,timestamp 9129460="" 4240380821="">
                                  23:18:08.826951 IP 192.168.200.254.443 > 192.168.200.105.35068: P 874935:875855(920) ack 0 win 4140 <nop,nop,timestamp 9129460="" 4240380824="">
                                  23:18:08.828895 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 875855 win 1435 <nop,nop,timestamp 9129461="" 4240380824="">
                                  23:18:09.246336 IP 192.168.200.254.443 > 192.168.200.105.35077: P 2415:2793(378) ack 2966 win 4140 <nop,nop,timestamp 9129309="" 546563424="">
                                  23:18:09.250927 IP 192.168.200.105.35077 > 192.168.200.254.443: . ack 2793 win 242 <nop,nop,timestamp 9129567="" 546563424="">
                                  23:18:09.250975 IP 192.168.200.254.443 > 192.168.200.105.35077: P 2793:3089(296) ack 2966 win 4140 <nop,nop,timestamp 9129567="" 546563429="">
                                  23:18:09.252873 IP 192.168.200.105.35077 > 192.168.200.254.443: . ack 3089 win 259 <nop,nop,timestamp 9129567="" 546563429="">
                                  23:18:09.257874 IP 192.168.200.105.35077 > 192.168.200.254.443: P 2966:3627(661) ack 3089 win 259 <nop,nop,timestamp 9129568="" 546563429="">
                                  23:18:09.257907 IP 192.168.200.254.443 > 192.168.200.105.35077: . ack 3627 win 4098 <nop,nop,timestamp 9129568="" 546563436="">
                                  23:18:09.473899 IP 192.168.200.105.35076 > 192.168.200.254.443: F 5578:5578(0) ack 5497 win 393 <nop,nop,timestamp 9129622="" 4115392603="">
                                  23:18:09.473951 IP 192.168.200.254.443 > 192.168.200.105.35076: . ack 5579 win 4140 <nop,nop,timestamp 9129622="" 4115393485="">
                                  23:18:09.474075 IP 192.168.200.105.35079 > 192.168.200.254.443: S 546726299:546726299(0) win 5840 <mss 6="" 9129622="" 1460,sackok,timestamp="" 0,nop,wscale="">
                                  23:18:09.474177 IP 192.168.200.254.443 > 192.168.200.105.35079: S 2823562714:2823562714(0) ack 546726300 win 65228 <mss 9129622="" 2197200979="" 1452,nop,wscale="" 4,sackok,timestamp="">
                                  23:18:09.474307 IP 192.168.200.254.443 > 192.168.200.105.35076: P 5497:5534(37) ack 5579 win 4140 <nop,nop,timestamp 9129622="" 4115393485="">
                                  23:18:09.474345 IP 192.168.200.254.443 > 192.168.200.105.35076: F 5534:5534(0) ack 5579 win 4140 <nop,nop,timestamp 9129622="" 4115393485="">
                                  23:18:09.475874 IP 192.168.200.105.35079 > 192.168.200.254.443: . ack 1 win 92 <nop,nop,timestamp 9129623="" 2197200979="">
                                  23:18:09.476900 IP 192.168.200.105.35076 > 192.168.200.254.443: R 337515393:337515393(0) win 0
                                  23:18:09.476934 IP 192.168.200.105.35079 > 192.168.200.254.443: P 1:151(150) ack 1 win 92 <nop,nop,timestamp 9129623="" 2197200979="">
                                  23:18:09.476962 IP 192.168.200.254.443 > 192.168.200.105.35079: . ack 151 win 4130 <nop,nop,timestamp 9129623="" 2197200982="">
                                  23:18:09.476986 IP 192.168.200.105.35076 > 192.168.200.254.443: R 337515393:337515393(0) win 0
                                  23:18:09.477340 IP 192.168.200.254.443 > 192.168.200.105.35079: P 1:139(138) ack 151 win 4140 <nop,nop,timestamp 9129623="" 2197200982="">
                                  23:18:09.478889 IP 192.168.200.105.35079 > 192.168.200.254.443: . ack 139 win 108 <nop,nop,timestamp 9129623="" 2197200982="">
                                  23:18:09.480874 IP 192.168.200.105.35079 > 192.168.200.254.443: P 151:157(6) ack 139 win 108 <nop,nop,timestamp 9129624="" 2197200982="">
                                  23:18:09.480906 IP 192.168.200.254.443 > 192.168.200.105.35079: . ack 157 win 4139 <nop,nop,timestamp 9129624="" 2197200986="">
                                  23:18:09.481875 IP 192.168.200.105.35079 > 192.168.200.254.443: P 157:210(53) ack 139 win 108 <nop,nop,timestamp 9129624="" 2197200986="">
                                  23:18:09.481898 IP 192.168.200.254.443 > 192.168.200.105.35079: . ack 210 win 4136 <nop,nop,timestamp 9129624="" 2197200987="">
                                  23:18:09.483874 IP 192.168.200.105.35079 > 192.168.200.254.443: P 210:983(773) ack 139 win 108 <nop,nop,timestamp 9129625="" 2197200987="">
                                  23:18:09.483901 IP 192.168.200.254.443 > 192.168.200.105.35079: . ack 983 win 4091 <nop,nop,timestamp 9129625="" 2197200989="">
                                  23:18:09.500115 IP 192.168.200.254.443 > 192.168.200.105.35079: P 139:517(378) ack 983 win 4140 <nop,nop,timestamp 9129625="" 2197201004="">
                                  23:18:09.538902 IP 192.168.200.105.35079 > 192.168.200.254.443: . ack 517 win 125 <nop,nop,timestamp 9129639="" 2197201004="">
                                  23:18:09.538956 IP 192.168.200.254.443 > 192.168.200.105.35079: P 517:739(222) ack 983 win 4140 <nop,nop,timestamp 9129639="" 2197201044="">
                                  23:18:09.540873 IP 192.168.200.105.35079 > 192.168.200.254.443: . ack 739 win 142 <nop,nop,timestamp 9129639="" 2197201044="">
                                  23:18:09.820291 IP 192.168.200.254.443 > 192.168.200.105.35068: P 875855:875929(74) ack 0 win 4140 <nop,nop,timestamp 9129461="" 4240381817="">
                                  23:18:09.821117 IP 192.168.200.254.443 > 192.168.200.105.35068: . 875929:877369(1440) ack 0 win 4140 <nop,nop,timestamp 9129461="" 4240381818="">
                                  23:18:09.821876 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 875929 win 1435 <nop,nop,timestamp 9129709="" 4240381817="">
                                  23:18:09.822265 IP 192.168.200.254.443 > 192.168.200.105.35068: . 877369:878809(1440) ack 0 win 4140 <nop,nop,timestamp 9129709="" 4240381819="">
                                  23:18:09.822521 IP 192.168.200.254.443 > 192.168.200.105.35068: . 878809:880249(1440) ack 0 win 4140 <nop,nop,timestamp 9129709="" 4240381819="">
                                  23:18:09.822778 IP 192.168.200.254.443 > 192.168.200.105.35068: . 880249:881689(1440) ack 0 win 4140 <nop,nop,timestamp 9129709="" 4240381819="">
                                  23:18:09.823168 IP 192.168.200.254.443 > 192.168.200.105.35068: . 881689:883129(1440) ack 0 win 4140 <nop,nop,timestamp 9129709="" 4240381820="">
                                  23:18:09.823875 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 877369 win 1435 <nop,nop,timestamp 9129710="" 4240381818="">
                                  23:18:09.823901 IP 192.168.200.254.443 > 192.168.200.105.35068: . 883129:884569(1440) ack 0 win 4140 <nop,nop,timestamp 9129710="" 4240381821="">
                                  23:18:09.824892 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 878809 win 1435 <nop,nop,timestamp 9129710="" 4240381819="">
                                  23:18:09.824919 IP 192.168.200.254.443 > 192.168.200.105.35068: . 884569:886009(1440) ack 0 win 4140 <nop,nop,timestamp 9129710="" 4240381822="">
                                  23:18:09.825089 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 880249 win 1413 <nop,nop,timestamp 9129710="" 4240381819="">
                                  23:18:09.825112 IP 192.168.200.254.443 > 192.168.200.105.35068: . 886009:887449(1440) ack 0 win 4140 <nop,nop,timestamp 9129710="" 4240381822="">
                                  23:18:09.825908 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 881689 win 1391 <nop,nop,timestamp 9129710="" 4240381819="">
                                  23:18:09.825934 IP 192.168.200.254.443 > 192.168.200.105.35068: . 887449:888889(1440) ack 0 win 4140 <nop,nop,timestamp 9129710="" 4240381823="">
                                  23:18:09.827873 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 883129 win 1369 <nop,nop,timestamp 9129710="" 4240381820="">
                                  23:18:09.827904 IP 192.168.200.254.443 > 192.168.200.105.35068: . 888889:890329(1440) ack 0 win 4140 <nop,nop,timestamp 9129710="" 4240381825="">
                                  23:18:09.828906 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 884569 win 1347 <nop,nop,timestamp 9129710="" 4240381821="">
                                  23:18:09.828935 IP 192.168.200.254.443 > 192.168.200.105.35068: . 890329:891769(1440) ack 0 win 4140 <nop,nop,timestamp 9129710="" 4240381826="">
                                  23:18:09.828946 IP 192.168.200.254.443 > 192.168.200.105.35068: . 891769:893209(1440) ack 0 win 4140 <nop,nop,timestamp 9129710="" 4240381826="">
                                  23:18:09.828952 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 886009 win 1435 <nop,nop,timestamp 9129711="" 4240381822="">
                                  23:18:09.828977 IP 192.168.200.254.443 > 192.168.200.105.35068: . 893209:894649(1440) ack 0 win 4140 <nop,nop,timestamp 9129711="" 4240381826="">
                                  23:18:09.828983 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 887449 win 1413 <nop,nop,timestamp 9129711="" 4240381822="">
                                  23:18:09.829001 IP 192.168.200.254.443 > 192.168.200.105.35068: . 894649:896089(1440) ack 0 win 4140 <nop,nop,timestamp 9129711="" 4240381826="">
                                  23:18:09.829124 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 888889 win 1391 <nop,nop,timestamp 9129711="" 4240381823="">
                                  23:18:09.829148 IP 192.168.200.254.443 > 192.168.200.105.35068: . 896089:897529(1440) ack 0 win 4140 <nop,nop,timestamp 9129711="" 4240381826="">
                                  23:18:09.830876 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 890329 win 1369 <nop,nop,timestamp 9129711="" 4240381825="">
                                  23:18:09.831874 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 891769 win 1347 <nop,nop,timestamp 9129712="" 4240381826="">
                                  23:18:09.831897 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 893209 win 1325 <nop,nop,timestamp 9129712="" 4240381826="">
                                  23:18:09.831939 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 894649 win 1303 <nop,nop,timestamp 9129712="" 4240381826="">
                                  23:18:09.832890 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 896089 win 1281 <nop,nop,timestamp 9129712="" 4240381826="">
                                  23:18:09.870893 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 897529 win 1441 <nop,nop,timestamp 9129722="" 4240381826="">
                                  23:18:09.870944 IP 192.168.200.254.443 > 192.168.200.105.35068: P 897529:898385(856) ack 0 win 4140 <nop,nop,timestamp 9129722="" 4240381868="">
                                  23:18:09.872921 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 898385 win 1441 <nop,nop,timestamp 9129722="" 4240381868="">
                                  23:18:10.282461 IP 192.168.200.254.443 > 192.168.200.105.35077: P 3089:3467(378) ack 3627 win 4140 <nop,nop,timestamp 9129568="" 546564460="">
                                  23:18:10.322891 IP 192.168.200.105.35077 > 192.168.200.254.443: . ack 3467 win 276 <nop,nop,timestamp 9129835="" 546564460="">
                                  23:18:10.322943 IP 192.168.200.254.443 > 192.168.200.105.35077: P 3467:3763(296) ack 3627 win 4140 <nop,nop,timestamp 9129835="" 546564501="">
                                  23:18:10.324873 IP 192.168.200.105.35077 > 192.168.200.254.443: . ack 3763 win 293 <nop,nop,timestamp 9129835="" 546564501="">
                                  23:18:10.329874 IP 192.168.200.105.35077 > 192.168.200.254.443: P 3627:4288(661) ack 3763 win 293 <nop,nop,timestamp 9129836="" 546564501="">
                                  23:18:10.329905 IP 192.168.200.254.443 > 192.168.200.105.35077: . ack 4288 win 4098 <nop,nop,timestamp 9129836="" 546564508="">
                                  23:18:10.529521 IP 192.168.200.254.443 > 192.168.200.105.35079: P 739:813(74) ack 983 win 4140 <nop,nop,timestamp 9129639="" 2197202034="">
                                  23:18:10.530992 IP 192.168.200.105.35079 > 192.168.200.254.443: . ack 813 win 142 <nop,nop,timestamp 9129887="" 2197202034="">
                                  23:18:10.531055 IP 192.168.200.254.443 > 192.168.200.105.35079: P 813:993(180) ack 983 win 4140 <nop,nop,timestamp 9129887="" 2197202036="">
                                  23:18:10.532876 IP 192.168.200.105.35079 > 192.168.200.254.443: . ack 993 win 159 <nop,nop,timestamp 9129887="" 2197202036="">
                                  23:18:10.532925 IP 192.168.200.254.443 > 192.168.200.105.35079: P 993:1067(74) ack 983 win 4140 <nop,nop,timestamp 9129887="" 2197202038="">
                                  23:18:10.533945 IP 192.168.200.105.35079 > 192.168.200.254.443: . ack 1067 win 159 <nop,nop,timestamp 9129887="" 2197202038="">
                                  23:18:10.820317 IP 192.168.200.254.443 > 192.168.200.105.35068: P 898385:898459(74) ack 0 win 4140 <nop,nop,timestamp 9129722="" 4240382817="">
                                  23:18:10.820845 IP 192.168.200.254.443 > 192.168.200.105.35068: . 898459:899899(1440) ack 0 win 4140 <nop,nop,timestamp 9129722="" 4240382817="">
                                  23:18:10.821393 IP 192.168.200.254.443 > 192.168.200.105.35068: . 899899:901339(1440) ack 0 win 4140 <nop,nop,timestamp 9129722="" 4240382818="">
                                  23:18:10.821794 IP 192.168.200.254.443 > 192.168.200.105.35068: . 901339:902779(1440) ack 0 win 4140 <nop,nop,timestamp 9129722="" 4240382818="">
                                  23:18:10.822932 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 898459 win 1440 <nop,nop,timestamp 9129959="" 4240382817="">
                                  23:18:10.822968 IP 192.168.200.254.443 > 192.168.200.105.35068: . 902779:904219(1440) ack 0 win 4140 <nop,nop,timestamp 9129959="" 4240382820="">
                                  23:18:10.822980 IP 192.168.200.254.443 > 192.168.200.105.35068: . 904219:905659(1440) ack 0 win 4140 <nop,nop,timestamp 9129959="" 4240382820="">
                                  23:18:10.822985 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 899899 win 1435 <nop,nop,timestamp 9129960="" 4240382817="">
                                  23:18:10.823335 IP 192.168.200.254.443 > 192.168.200.105.35068: . 905659:907099(1440) ack 0 win 4140 <nop,nop,timestamp 9129960="" 4240382820="">
                                  23:18:10.824875 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 901339 win 1435 <nop,nop,timestamp 9129960="" 4240382818="">
                                  23:18:10.824909 IP 192.168.200.254.443 > 192.168.200.105.35068: . 907099:908539(1440) ack 0 win 4140 <nop,nop,timestamp 9129960="" 4240382822="">
                                  23:18:10.827873 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 902779 win 1413 <nop,nop,timestamp 9129960="" 4240382818="">
                                  23:18:10.827897 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 904219 win 1391 <nop,nop,timestamp 9129960="" 4240382820="">
                                  23:18:10.827917 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 905659 win 1369 <nop,nop,timestamp 9129961="" 4240382820="">
                                  23:18:10.827932 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 907099 win 1435 <nop,nop,timestamp 9129961="" 4240382820="">
                                  23:18:10.827946 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 908539 win 1413 <nop,nop,timestamp 9129961="" 4240382822="">
                                  23:18:10.827970 IP 192.168.200.254.443 > 192.168.200.105.35068: P 908539:909491(952) ack 0 win 4140 <nop,nop,timestamp 9129961="" 4240382825="">
                                  23:18:10.829874 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 909491 win 1399 <nop,nop,timestamp 9129961="" 4240382825="">
                                  23:18:11.354141 IP 192.168.200.254.443 > 192.168.200.105.35077: P 3763:4141(378) ack 4288 win 4140 <nop,nop,timestamp 9129836="" 546565532="">
                                  23:18:11.394874 IP 192.168.200.105.35077 > 192.168.200.254.443: . ack 4141 win 309 <nop,nop,timestamp 9130103="" 546565532="">
                                  23:18:11.394924 IP 192.168.200.254.443 > 192.168.200.105.35077: P 4141:4437(296) ack 4288 win 4140 <nop,nop,timestamp 9130103="" 546565573="">
                                  23:18:11.396874 IP 192.168.200.105.35077 > 192.168.200.254.443: . ack 4437 win 326 <nop,nop,timestamp 9130103="" 546565573="">
                                  23:18:11.400874 IP 192.168.200.105.35079 > 192.168.200.254.443: P 983:1644(661) ack 1067 win 159 <nop,nop,timestamp 9130104="" 2197202038="">
                                  23:18:11.400903 IP 192.168.200.254.443 > 192.168.200.105.35079: . ack 1644 win 4098 <nop,nop,timestamp 9130104="" 2197202906="">
                                  23:18:11.596874 IP 192.168.200.105.35077 > 192.168.200.254.443: P 4288:4933(645) ack 4437 win 326 <nop,nop,timestamp 9130153="" 546565573="">
                                  23:18:11.596921 IP 192.168.200.254.443 > 192.168.200.105.35077: . ack 4933 win 4099 <nop,nop,timestamp 9130153="" 546565775="">
                                  23:18:11.617487 IP 192.168.200.254.443 > 192.168.200.105.35077: P 4437:4639(202) ack 4933 win 4140 <nop,nop,timestamp 9130153="" 546565795="">
                                  23:18:11.618921 IP 192.168.200.105.35077 > 192.168.200.254.443: . ack 4639 win 343 <nop,nop,timestamp 9130158="" 546565795="">
                                  23:18:11.619001 IP 192.168.200.254.443 > 192.168.200.105.35077: P 4639:4893(254) ack 4933 win 4140 <nop,nop,timestamp 9130158="" 546565797="">
                                  23:18:11.620876 IP 192.168.200.105.35077 > 192.168.200.254.443: . ack 4893 win 360 <nop,nop,timestamp 9130159="" 546565797="">
                                  23:18:11.620930 IP 192.168.200.254.443 > 192.168.200.105.35077: P 4893:4967(74) ack 4933 win 4140 <nop,nop,timestamp 9130159="" 546565799="">
                                  23:18:11.621983 IP 192.168.200.105.35077 > 192.168.200.254.443: . ack 4967 win 360 <nop,nop,timestamp 9130159="" 546565799="">
                                  23:18:11.820390 IP 192.168.200.254.443 > 192.168.200.105.35068: P 909491:909565(74) ack 0 win 4140 <nop,nop,timestamp 9129961="" 4240383817="">
                                  23:18:11.821090 IP 192.168.200.254.443 > 192.168.200.105.35068: . 909565:911005(1440) ack 0 win 4140 <nop,nop,timestamp 9129961="" 4240383818="">
                                  23:18:11.821501 IP 192.168.200.254.443 > 192.168.200.105.35068: . 911005:912445(1440) ack 0 win 4140 <nop,nop,timestamp 9129961="" 4240383818="">
                                  23:18:11.822099 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 909565 win 1435 <nop,nop,timestamp 9130209="" 4240383817="">
                                  23:18:11.822228 IP 192.168.200.254.443 > 192.168.200.105.35068: . 912445:913885(1440) ack 0 win 4140 <nop,nop,timestamp 9130209="" 4240383819="">
                                  23:18:11.822661 IP 192.168.200.254.443 > 192.168.200.105.35068: . 913885:915325(1440) ack 0 win 4140 <nop,nop,timestamp 9130209="" 4240383819="">
                                  23:18:11.823284 IP 192.168.200.254.443 > 192.168.200.105.35068: . 915325:916765(1440) ack 0 win 4140 <nop,nop,timestamp 9130209="" 4240383820="">
                                  23:18:11.823934 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 911005 win 1435 <nop,nop,timestamp 9130210="" 4240383818="">
                                  23:18:11.823971 IP 192.168.200.254.443 > 192.168.200.105.35068: . 916765:918205(1440) ack 0 win 4140 <nop,nop,timestamp 9130210="" 4240383821="">
                                  23:18:11.823977 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 912445 win 1435 <nop,nop,timestamp 9130210="" 4240383818="">
                                  23:18:11.824239 IP 192.168.200.254.443 > 192.168.200.105.35068: . 918205:919645(1440) ack 0 win 4140 <nop,nop,timestamp 9130210="" 4240383821="">
                                  23:18:11.824876 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 913885 win 1413 <nop,nop,timestamp 9130210="" 4240383819="">
                                  23:18:11.825874 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 915325 win 1391 <nop,nop,timestamp 9130210="" 4240383819="">
                                  23:18:11.825892 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 916765 win 1435 <nop,nop,timestamp 9130210="" 4240383820="">
                                  23:18:11.826902 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 918205 win 1413 <nop,nop,timestamp 9130210="" 4240383821="">
                                  23:18:11.826923 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 919645 win 1391 <nop,nop,timestamp 9130210="" 4240383821="">
                                  23:18:11.826955 IP 192.168.200.254.443 > 192.168.200.105.35068: P 919645:920581(936) ack 0 win 4140 <nop,nop,timestamp 9130210="" 4240383824="">
                                  23:18:11.828895 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 920581 win 1377 <nop,nop,timestamp 9130211="" 4240383824="">
                                  23:18:12.425312 IP 192.168.200.254.443 > 192.168.200.105.35079: P 1067:1445(378) ack 1644 win 4140 <nop,nop,timestamp 9130104="" 2197203930="">
                                  23:18:12.426948 IP 192.168.200.105.35079 > 192.168.200.254.443: . ack 1445 win 175 <nop,nop,timestamp 9130361="" 2197203930="">
                                  23:18:12.427012 IP 192.168.200.254.443 > 192.168.200.105.35079: P 1445:1667(222) ack 1644 win 4140 <nop,nop,timestamp 9130361="" 2197203932="">
                                  23:18:12.428113 IP 192.168.200.105.35079 > 192.168.200.254.443: . ack 1667 win 192 <nop,nop,timestamp 9130361="" 2197203932="">
                                  23:18:12.428154 IP 192.168.200.254.443 > 192.168.200.105.35079: P 1667:1741(74) ack 1644 win 4140 <nop,nop,timestamp 9130361="" 2197203933="">
                                  23:18:12.429874 IP 192.168.200.105.35079 > 192.168.200.254.443: . ack 1741 win 192 <nop,nop,timestamp 9130361="" 2197203933="">
                                  23:18:12.432923 IP 192.168.200.105.35079 > 192.168.200.254.443: P 1644:2305(661) ack 1741 win 192 <nop,nop,timestamp 9130362="" 2197203933="">
                                  23:18:12.432947 IP 192.168.200.254.443 > 192.168.200.105.35079: . ack 2305 win 4098 <nop,nop,timestamp 9130362="" 2197203938="">
                                  23:18:12.820334 IP 192.168.200.254.443 > 192.168.200.105.35068: P 920581:920655(74) ack 0 win 4140 <nop,nop,timestamp 9130211="" 4240384817="">
                                  23:18:12.820861 IP 192.168.200.254.443 > 192.168.200.105.35068: . 920655:922095(1440) ack 0 win 4140 <nop,nop,timestamp 9130211="" 4240384817="">
                                  23:18:12.821652 IP 192.168.200.254.443 > 192.168.200.105.35068: . 922095:923535(1440) ack 0 win 4140 <nop,nop,timestamp 9130211="" 4240384818="">
                                  23:18:12.822041 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 920655 win 1435 <nop,nop,timestamp 9130459="" 4240384817="">
                                  23:18:12.822399 IP 192.168.200.254.443 > 192.168.200.105.35068: . 923535:924975(1440) ack 0 win 4140 <nop,nop,timestamp 9130459="" 4240384819="">
                                  23:18:12.822800 IP 192.168.200.254.443 > 192.168.200.105.35068: . 924975:926415(1440) ack 0 win 4140 <nop,nop,timestamp 9130459="" 4240384819="">
                                  23:18:12.822896 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 922095 win 1435 <nop,nop,timestamp 9130460="" 4240384817="">
                                  23:18:12.823311 IP 192.168.200.254.443 > 192.168.200.105.35068: . 926415:927855(1440) ack 0 win 4140 <nop,nop,timestamp 9130460="" 4240384820="">
                                  23:18:12.823713 IP 192.168.200.254.443 > 192.168.200.105.35068: . 927855:929295(1440) ack 0 win 4140 <nop,nop,timestamp 9130460="" 4240384820="">
                                  23:18:12.823930 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 923535 win 1435 <nop,nop,timestamp 9130460="" 4240384818="">
                                  23:18:12.824275 IP 192.168.200.254.443 > 192.168.200.105.35068: . 929295:930735(1440) ack 0 win 4140 <nop,nop,timestamp 9130460="" 4240384821="">
                                  23:18:12.824906 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 924975 win 1413 <nop,nop,timestamp 9130460="" 4240384819="">
                                  23:18:12.824940 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 926415 win 1391 <nop,nop,timestamp 9130460="" 4240384819="">
                                  23:18:12.825874 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 927855 win 1369 <nop,nop,timestamp 9130460="" 4240384820="">
                                  23:18:12.825908 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 929295 win 1347 <nop,nop,timestamp 9130460="" 4240384820="">
                                  23:18:12.826903 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 930735 win 1325 <nop,nop,timestamp 9130461="" 4240384821="">
                                  23:18:12.826941 IP 192.168.200.254.443 > 192.168.200.105.35068: P 930735:931687(952) ack 0 win 4140 <nop,nop,timestamp 9130461="" 4240384824="">
                                  23:18:12.828982 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 931687 win 1435 <nop,nop,timestamp 9130461="" 4240384824="">
                                  23:18:13.457096 IP 192.168.200.254.443 > 192.168.200.105.35079: P 1741:2119(378) ack 2305 win 4140 <nop,nop,timestamp 9130362="" 2197204962="">
                                  23:18:13.521874 IP 192.168.200.105.35079 > 192.168.200.254.443: . ack 2119 win 209 <nop,nop,timestamp 9130628="" 2197204962="">
                                  23:18:13.521931 IP 192.168.200.254.443 > 192.168.200.105.35079: P 2119:2415(296) ack 2305 win 4140 <nop,nop,timestamp 9130628="" 2197205027="">
                                  23:18:13.523873 IP 192.168.200.105.35079 > 192.168.200.254.443: . ack 2415 win 226 <nop,nop,timestamp 9130635="" 2197205027="">
                                  23:18:13.527873 IP 192.168.200.105.35077 > 192.168.200.254.443: P 4933:5594(661) ack 4967 win 360 <nop,nop,timestamp 9130636="" 546565799="">
                                  23:18:13.527902 IP 192.168.200.254.443 > 192.168.200.105.35077: . ack 5594 win 4098 <nop,nop,timestamp 9130636="" 546567706="">
                                  23:18:13.820309 IP 192.168.200.254.443 > 192.168.200.105.35068: P 931687:931761(74) ack 0 win 4140 <nop,nop,timestamp 9130461="" 4240385817="">
                                  23:18:13.820795 IP 192.168.200.254.443 > 192.168.200.105.35068: . 931761:933201(1440) ack 0 win 4140 <nop,nop,timestamp 9130461="" 4240385817="">
                                  23:18:13.821349 IP 192.168.200.254.443 > 192.168.200.105.35068: . 933201:934641(1440) ack 0 win 4140 <nop,nop,timestamp 9130461="" 4240385818="">
                                  23:18:13.822093 IP 192.168.200.254.443 > 192.168.200.105.35068: . 934641:936081(1440) ack 0 win 4140 <nop,nop,timestamp 9130461="" 4240385819="">
                                  23:18:13.822929 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 931761 win 1435 <nop,nop,timestamp 9130709="" 4240385817="">
                                  23:18:13.822974 IP 192.168.200.254.443 > 192.168.200.105.35068: . 936081:937521(1440) ack 0 win 4140 <nop,nop,timestamp 9130709="" 4240385820="">
                                  23:18:13.822986 IP 192.168.200.254.443 > 192.168.200.105.35068: . 937521:938961(1440) ack 0 win 4140 <nop,nop,timestamp 9130709="" 4240385820="">
                                  23:18:13.822992 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 933201 win 1435 <nop,nop,timestamp 9130710="" 4240385817="">
                                  23:18:13.823012 IP 192.168.200.254.443 > 192.168.200.105.35068: . 938961:940401(1440) ack 0 win 4140 <nop,nop,timestamp 9130710="" 4240385820="">
                                  23:18:13.823876 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 934641 win 1435 <nop,nop,timestamp 9130710="" 4240385818="">
                                  23:18:13.823912 IP 192.168.200.254.443 > 192.168.200.105.35068: . 940401:941841(1440) ack 0 win 4140 <nop,nop,timestamp 9130710="" 4240385821="">
                                  23:18:13.824904 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 936081 win 1413 <nop,nop,timestamp 9130710="" 4240385819="">
                                  23:18:13.824929 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 937521 win 1391 <nop,nop,timestamp 9130710="" 4240385820="">
                                  23:18:13.826888 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 938961 win 1369 <nop,nop,timestamp 9130710="" 4240385820="">
                                  23:18:13.826945 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 940401 win 1347 <nop,nop,timestamp 9130710="" 4240385820="">
                                  23:18:13.827009 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 941841 win 1325 <nop,nop,timestamp 9130710="" 4240385821="">
                                  23:18:13.827035 IP 192.168.200.254.443 > 192.168.200.105.35068: P 941841:943127(1286) ack 0 win 4140 <nop,nop,timestamp 9130710="" 4240385824="">
                                  23:18:13.828902 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 943127 win 1435 <nop,nop,timestamp 9130711="" 4240385824="">
                                  23:18:14.552371 IP 192.168.200.254.443 > 192.168.200.105.35077: P 4967:5345(378) ack 5594 win 4140 <nop,nop,timestamp 9130636="" 546568730="">
                                  23:18:14.554935 IP 192.168.200.105.35077 > 192.168.200.254.443: . ack 5345 win 376 <nop,nop,timestamp 9130892="" 546568730="">
                                  23:18:14.555006 IP 192.168.200.254.443 > 192.168.200.105.35077: P 5345:5641(296) ack 5594 win 4140 <nop,nop,timestamp 9130892="" 546568733="">
                                  23:18:14.556873 IP 192.168.200.105.35077 > 192.168.200.254.443: . ack 5641 win 393 <nop,nop,timestamp 9130893="" 546568733="">
                                  23:18:14.560910 IP 192.168.200.105.35079 > 192.168.200.254.443: P 2305:2966(661) ack 2415 win 226 <nop,nop,timestamp 9130894="" 2197205027="">
                                  23:18:14.560939 IP 192.168.200.254.443 > 192.168.200.105.35079: . ack 2966 win 4098 <nop,nop,timestamp 9130894="" 2197206066="">
                                  23:18:14.626873 IP 192.168.200.105.35077 > 192.168.200.254.443: P 5594:6239(645) ack 5641 win 393 <nop,nop,timestamp 9130910="" 546568733="">
                                  23:18:14.626920 IP 192.168.200.254.443 > 192.168.200.105.35077: . ack 6239 win 4099 <nop,nop,timestamp 9130910="" 546568805="">
                                  23:18:14.646668 IP 192.168.200.254.443 > 192.168.200.105.35077: P 5641:5843(202) ack 6239 win 4140 <nop,nop,timestamp 9130910="" 546568824="">
                                  23:18:14.647938 IP 192.168.200.105.35077 > 192.168.200.254.443: . ack 5843 win 410 <nop,nop,timestamp 9130916="" 546568824="">
                                  23:18:14.648016 IP 192.168.200.254.443 > 192.168.200.105.35077: P 5843:6097(254) ack 6239 win 4140 <nop,nop,timestamp 9130916="" 546568826="">
                                  23:18:14.649914 IP 192.168.200.105.35077 > 192.168.200.254.443: . ack 6097 win 427 <nop,nop,timestamp 9130916="" 546568826="">
                                  23:18:14.649973 IP 192.168.200.254.443 > 192.168.200.105.35077: P 6097:6171(74) ack 6239 win 4140 <nop,nop,timestamp 9130916="" 546568828="">
                                  23:18:14.650951 IP 192.168.200.105.35077 > 192.168.200.254.443: . ack 6171 win 427 <nop,nop,timestamp 9130917="" 546568828="">
                                  23:18:14.820358 IP 192.168.200.254.443 > 192.168.200.105.35068: P 943127:943201(74) ack 0 win 4140 <nop,nop,timestamp 9130711="" 4240386817="">
                                  23:18:14.820848 IP 192.168.200.254.443 > 192.168.200.105.35068: . 943201:944641(1440) ack 0 win 4140 <nop,nop,timestamp 9130711="" 4240386817="">
                                  23:18:14.821431 IP 192.168.200.254.443 > 192.168.200.105.35068: . 944641:946081(1440) ack 0 win 4140 <nop,nop,timestamp 9130711="" 4240386818="">
                                  23:18:14.821920 IP 192.168.200.105.35068 > 192.168.200.254.443: . ack 943201 win 1435 <nop,nop,timestamp 9130959="" 4240386817="">
                                  23:18:14.822214 IP 192.168.200.254.443 > 192.168.200.105.35068: . 946081:947521(1440) ack 0 win 4140 <nop,nop,timestamp 9130959="" 4240386819="">
                                  23:18:14.822472 IP 192.168.200.254.443 > 192.168.200.105.35068: P 947521:948961(1440) ack 0 win 4140 <nop,nop,timestamp 9130959="" 4240386819=""></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp>
                                  
                                  1 Reply Last reply Reply Quote 0
                                  • E
                                    Eugene
                                    last edited by

                                    Что-то я вообще не видел твоей попытки.

                                    tcpdump -ni ste0 host 192.168.200.x and host not 192.168.200.254
                                    

                                    x возьми из ip компьютера, с которого тестируешь.

                                    http://ru.doc.pfsense.org

                                    1 Reply Last reply Reply Quote 0
                                    • I
                                      iliaxxx
                                      last edited by

                                      В этот раз без отрыва жал на вход на сайты которые находятся в сети.

                                      $ tcpdump -ni ste0 host 192.168.200.105 and host not 192.168.200.254
                                      23:36:36.176822 IP 192.168.200.105.46667 > 64.12.28.222.443: P 4080956869:4080956875(6) ack 2314299230 win 60328
                                      23:36:36.322982 IP 64.12.28.222.443 > 192.168.200.105.46667: . ack 6 win 16384
                                      23:36:40.706852 IP 192.168.200.105.39963 > 217.197.240.43.80: F 4255941587:4255941587(0) ack 2586285149 win 92 <nop,nop,timestamp 9407416="" 2850120243="">
                                      23:36:40.706903 IP 217.197.240.43.80 > 192.168.200.105.39963: . ack 1 win 4140 <nop,nop,timestamp 9407416="" 2850174274="">
                                      23:36:43.818820 IP 192.168.200.105.39980 > 217.197.240.43.80: S 840259736:840259736(0) win 5840 <mss 6="" 9408194="" 1460,sackok,timestamp="" 0,nop,wscale="">
                                      23:36:43.818895 IP 217.197.240.43.80 > 192.168.200.105.39980: S 868167903:868167903(0) ack 840259737 win 65228 <mss 9408194="" 4057725176="" 1452,nop,wscale="" 4,sackok,timestamp="">
                                      23:36:43.819945 IP 192.168.200.105.39980 > 217.197.240.43.80: . ack 1 win 92 <nop,nop,timestamp 9408194="" 4057725176="">
                                      23:36:44.076803 IP 192.168.200.105.39980 > 217.197.240.43.80: P 1:414(413) ack 1 win 92 <nop,nop,timestamp 9408258="" 4057725176="">
                                      23:36:44.076849 IP 217.197.240.43.80 > 192.168.200.105.39980: . ack 414 win 4114 <nop,nop,timestamp 9408258="" 4057725434="">
                                      23:36:44.078135 IP 217.197.240.43.80 > 192.168.200.105.39980: F 1:1(0) ack 414 win 4140 <nop,nop,timestamp 9408258="" 4057725435="">
                                      23:36:44.081853 IP 192.168.200.105.39980 > 217.197.240.43.80: . ack 2 win 92 <nop,nop,timestamp 9408260="" 4057725435="">
                                      23:36:44.106817 IP 192.168.200.105.39980 > 217.197.240.43.80: F 414:414(0) ack 2 win 92 <nop,nop,timestamp 9408266="" 4057725435="">
                                      23:36:44.106850 IP 217.197.240.43.80 > 192.168.200.105.39980: . ack 415 win 4139 <nop,nop,timestamp 9408266="" 4057725464="">
                                      23:36:44.107804 IP 192.168.200.105.39981 > 217.197.240.43.80: S 854989346:854989346(0) win 5840 <mss 6="" 9408266="" 1460,sackok,timestamp="" 0,nop,wscale="">
                                      23:36:44.107877 IP 217.197.240.43.80 > 192.168.200.105.39981: S 4096095959:4096095959(0) ack 854989347 win 65228 <mss 9408266="" 2638174282="" 1452,nop,wscale="" 4,sackok,timestamp="">
                                      23:36:44.109803 IP 192.168.200.105.39981 > 217.197.240.43.80: . ack 1 win 92 <nop,nop,timestamp 9408267="" 2638174282="">
                                      23:36:44.112928 IP 192.168.200.105.39981 > 217.197.240.43.80: P 1:414(413) ack 1 win 92 <nop,nop,timestamp 9408267="" 2638174282="">
                                      23:36:44.112967 IP 217.197.240.43.80 > 192.168.200.105.39981: . ack 414 win 4114 <nop,nop,timestamp 9408267="" 2638174287="">
                                      23:36:44.115171 IP 217.197.240.43.80 > 192.168.200.105.39981: F 1:1(0) ack 414 win 4140 <nop,nop,timestamp 9408267="" 2638174289="">
                                      23:36:44.116957 IP 192.168.200.105.39981 > 217.197.240.43.80: F 414:414(0) ack 2 win 92 <nop,nop,timestamp 9408268="" 2638174289="">
                                      23:36:44.117020 IP 217.197.240.43.80 > 192.168.200.105.39981: . ack 415 win 4139 <nop,nop,timestamp 9408268="" 2638174291="">
                                      23:36:44.117096 IP 192.168.200.105.39982 > 217.197.240.43.80: S 857816297:857816297(0) win 5840 <mss 6="" 9408268="" 1460,sackok,timestamp="" 0,nop,wscale="">
                                      23:36:44.117161 IP 217.197.240.43.80 > 192.168.200.105.39982: S 2516335955:2516335955(0) ack 857816298 win 65228 <mss 9408268="" 189518156="" 1452,nop,wscale="" 4,sackok,timestamp="">
                                      23:36:44.118881 IP 192.168.200.105.39982 > 217.197.240.43.80: . ack 1 win 92 <nop,nop,timestamp 9408269="" 189518156="">
                                      23:36:44.120815 IP 192.168.200.105.39982 > 217.197.240.43.80: P 1:414(413) ack 1 win 92 <nop,nop,timestamp 9408269="" 189518156="">
                                      23:36:44.120883 IP 217.197.240.43.80 > 192.168.200.105.39982: . ack 414 win 4114 <nop,nop,timestamp 9408269="" 189518160="">
                                      23:36:44.124200 IP 217.197.240.43.80 > 192.168.200.105.39982: F 1:1(0) ack 414 win 4140 <nop,nop,timestamp 9408269="" 189518163="">
                                      23:36:44.125825 IP 192.168.200.105.39982 > 217.197.240.43.80: F 414:414(0) ack 2 win 92 <nop,nop,timestamp 9408271="" 189518163="">
                                      23:36:44.125907 IP 217.197.240.43.80 > 192.168.200.105.39982: . ack 415 win 4139 <nop,nop,timestamp 9408271="" 189518165="">
                                      23:36:44.125921 IP 192.168.200.105.39983 > 217.197.240.43.80: S 851810395:851810395(0) win 5840 <mss 6="" 9408271="" 1460,sackok,timestamp="" 0,nop,wscale="">
                                      23:36:44.125998 IP 217.197.240.43.80 > 192.168.200.105.39983: S 715802331:715802331(0) ack 851810396 win 65228 <mss 9408271="" 2954357851="" 1452,nop,wscale="" 4,sackok,timestamp="">
                                      23:36:44.127822 IP 192.168.200.105.39983 > 217.197.240.43.80: . ack 1 win 92 <nop,nop,timestamp 9408271="" 2954357851="">
                                      23:36:44.130898 IP 192.168.200.105.39983 > 217.197.240.43.80: P 1:414(413) ack 1 win 92 <nop,nop,timestamp 9408272="" 2954357851="">
                                      23:36:44.130957 IP 217.197.240.43.80 > 192.168.200.105.39983: . ack 414 win 4114 <nop,nop,timestamp 9408272="" 2954357856="">
                                      23:36:44.133219 IP 217.197.240.43.80 > 192.168.200.105.39983: F 1:1(0) ack 414 win 4140 <nop,nop,timestamp 9408272="" 2954357858="">
                                      23:36:44.134814 IP 192.168.200.105.39983 > 217.197.240.43.80: F 414:414(0) ack 2 win 92 <nop,nop,timestamp 9408273="" 2954357858="">
                                      23:36:44.134903 IP 217.197.240.43.80 > 192.168.200.105.39983: . ack 415 win 4139 <nop,nop,timestamp 9408273="" 2954357860="">
                                      23:36:44.135846 IP 192.168.200.105.39984 > 217.197.240.43.80: S 852136377:852136377(0) win 5840 <mss 6="" 9408273="" 1460,sackok,timestamp="" 0,nop,wscale="">
                                      23:36:44.135940 IP 217.197.240.43.80 > 192.168.200.105.39984: S 3930108889:3930108889(0) ack 852136378 win 65228 <mss 9408273="" 139409234="" 1452,nop,wscale="" 4,sackok,timestamp="">
                                      23:36:44.137824 IP 192.168.200.105.39984 > 217.197.240.43.80: . ack 1 win 92 <nop,nop,timestamp 9408274="" 139409234="">
                                      23:36:44.138886 IP 192.168.200.105.39984 > 217.197.240.43.80: P 1:414(413) ack 1 win 92 <nop,nop,timestamp 9408274="" 139409234="">
                                      23:36:44.138938 IP 217.197.240.43.80 > 192.168.200.105.39984: . ack 414 win 4114 <nop,nop,timestamp 9408274="" 139409237="">
                                      23:36:44.141949 IP 217.197.240.43.80 > 192.168.200.105.39984: F 1:1(0) ack 414 win 4140 <nop,nop,timestamp 9408274="" 139409240="">
                                      23:36:44.143892 IP 192.168.200.105.39984 > 217.197.240.43.80: F 414:414(0) ack 2 win 92 <nop,nop,timestamp 9408275="" 139409240="">
                                      23:36:44.143953 IP 217.197.240.43.80 > 192.168.200.105.39984: . ack 415 win 4139 <nop,nop,timestamp 9408275="" 139409242="">
                                      23:36:46.186879 IP 192.168.200.105.51007 > 205.188.4.92.5190: P 559486253:559486259(6) ack 3190269065 win 61200
                                      23:36:46.341886 IP 205.188.4.92.5190 > 192.168.200.105.51007: . ack 6 win 16384
                                      23:36:48.171803 IP 192.168.200.105.39985 > 217.197.240.43.80: S 922418745:922418745(0) win 5840 <mss 6="" 9409282="" 1460,sackok,timestamp="" 0,nop,wscale="">
                                      23:36:48.171887 IP 217.197.240.43.80 > 192.168.200.105.39985: S 616435419:616435419(0) ack 922418746 win 65228 <mss 9409282="" 2652457006="" 1452,nop,wscale="" 4,sackok,timestamp="">
                                      23:36:48.172885 IP 192.168.200.105.39985 > 217.197.240.43.80: . ack 1 win 92 <nop,nop,timestamp 9409282="" 2652457006="">
                                      23:36:48.512831 IP 192.168.200.105.39985 > 217.197.240.43.80: P 1:414(413) ack 1 win 92 <nop,nop,timestamp 9409367="" 2652457006="">
                                      23:36:48.512882 IP 217.197.240.43.80 > 192.168.200.105.39985: . ack 414 win 4114 <nop,nop,timestamp 9409367="" 2652457347="">
                                      23:36:48.513989 IP 217.197.240.43.80 > 192.168.200.105.39985: F 1:1(0) ack 414 win 4140 <nop,nop,timestamp 9409367="" 2652457348="">
                                      23:36:48.517804 IP 192.168.200.105.39985 > 217.197.240.43.80: . ack 2 win 92 <nop,nop,timestamp 9409369="" 2652457348="">
                                      23:36:48.539828 IP 192.168.200.105.39985 > 217.197.240.43.80: F 414:414(0) ack 2 win 92 <nop,nop,timestamp 9409374="" 2652457348="">
                                      23:36:48.539871 IP 217.197.240.43.80 > 192.168.200.105.39985: . ack 415 win 4139 <nop,nop,timestamp 9409374="" 2652457374="">
                                      23:36:48.539937 IP 192.168.200.105.39986 > 217.197.240.43.80: S 920026473:920026473(0) win 5840 <mss 6="" 9409374="" 1460,sackok,timestamp="" 0,nop,wscale="">
                                      23:36:48.539993 IP 217.197.240.43.80 > 192.168.200.105.39986: S 2055890399:2055890399(0) ack 920026474 win 65228 <mss 9409374="" 765433155="" 1452,nop,wscale="" 4,sackok,timestamp="">
                                      23:36:48.541835 IP 192.168.200.105.39986 > 217.197.240.43.80: . ack 1 win 92 <nop,nop,timestamp 9409375="" 765433155="">
                                      23:36:48.542880 IP 192.168.200.105.39986 > 217.197.240.43.80: P 1:414(413) ack 1 win 92 <nop,nop,timestamp 9409375="" 765433155="">
                                      23:36:48.542932 IP 217.197.240.43.80 > 192.168.200.105.39986: . ack 414 win 4114 <nop,nop,timestamp 9409375="" 765433158="">
                                      23:36:48.546912 IP 217.197.240.43.80 > 192.168.200.105.39986: F 1:1(0) ack 414 win 4140 <nop,nop,timestamp 9409375="" 765433162="">
                                      23:36:48.548804 IP 192.168.200.105.39986 > 217.197.240.43.80: F 414:414(0) ack 2 win 92 <nop,nop,timestamp 9409376="" 765433162="">
                                      23:36:48.548850 IP 217.197.240.43.80 > 192.168.200.105.39986: . ack 415 win 4139 <nop,nop,timestamp 9409376="" 765433164="">
                                      23:36:48.548877 IP 192.168.200.105.39987 > 217.197.240.43.80: S 927087082:927087082(0) win 5840 <mss 6="" 9409376="" 1460,sackok,timestamp="" 0,nop,wscale="">
                                      23:36:48.548944 IP 217.197.240.43.80 > 192.168.200.105.39987: S 4179554901:4179554901(0) ack 927087083 win 65228 <mss 9409376="" 58473634="" 1452,nop,wscale="" 4,sackok,timestamp="">
                                      23:36:48.550820 IP 192.168.200.105.39987 > 217.197.240.43.80: . ack 1 win 92 <nop,nop,timestamp 9409377="" 58473634="">
                                      23:36:48.556803 IP 192.168.200.105.39987 > 217.197.240.43.80: P 1:414(413) ack 1 win 92 <nop,nop,timestamp 9409378="" 58473634="">
                                      23:36:48.556851 IP 217.197.240.43.80 > 192.168.200.105.39987: . ack 414 win 4114 <nop,nop,timestamp 9409378="" 58473642="">
                                      23:36:48.558071 IP 217.197.240.43.80 > 192.168.200.105.39987: F 1:1(0) ack 414 win 4140 <nop,nop,timestamp 9409378="" 58473643="">
                                      23:36:48.559825 IP 192.168.200.105.39987 > 217.197.240.43.80: F 414:414(0) ack 2 win 92 <nop,nop,timestamp 9409379="" 58473643="">
                                      23:36:48.559866 IP 217.197.240.43.80 > 192.168.200.105.39987: . ack 415 win 4139 <nop,nop,timestamp 9409379="" 58473645="">
                                      23:36:48.559875 IP 192.168.200.105.39988 > 217.197.240.43.80: S 916759763:916759763(0) win 5840 <mss 6="" 9409379="" 1460,sackok,timestamp="" 0,nop,wscale="">
                                      23:36:48.559943 IP 217.197.240.43.80 > 192.168.200.105.39988: S 534016733:534016733(0) ack 916759764 win 65228 <mss 9409379="" 3414770401="" 1452,nop,wscale="" 4,sackok,timestamp="">
                                      23:36:48.562861 IP 192.168.200.105.39988 > 217.197.240.43.80: . ack 1 win 92 <nop,nop,timestamp 9409380="" 3414770401="">
                                      23:36:48.570803 IP 192.168.200.105.39988 > 217.197.240.43.80: P 1:414(413) ack 1 win 92 <nop,nop,timestamp 9409381="" 3414770401="">
                                      23:36:48.570847 IP 217.197.240.43.80 > 192.168.200.105.39988: . ack 414 win 4114 <nop,nop,timestamp 9409381="" 3414770412="">
                                      23:36:48.571984 IP 217.197.240.43.80 > 192.168.200.105.39988: F 1:1(0) ack 414 win 4140 <nop,nop,timestamp 9409381="" 3414770413="">
                                      23:36:48.573804 IP 192.168.200.105.39988 > 217.197.240.43.80: F 414:414(0) ack 2 win 92 <nop,nop,timestamp 9409383="" 3414770413="">
                                      23:36:48.573843 IP 217.197.240.43.80 > 192.168.200.105.39988: . ack 415 win 4139 <nop,nop,timestamp 9409383="" 3414770415="">
                                      23:36:48.573852 IP 192.168.200.105.39989 > 217.197.240.43.80: S 918956863:918956863(0) win 5840 <mss 6="" 9409383="" 1460,sackok,timestamp="" 0,nop,wscale="">
                                      23:36:48.573914 IP 217.197.240.43.80 > 192.168.200.105.39989: S 4126326999:4126326999(0) ack 918956864 win 65228 <mss 9409383="" 1889281090="" 1452,nop,wscale="" 4,sackok,timestamp="">
                                      23:36:48.575804 IP 192.168.200.105.39989 > 217.197.240.43.80: . ack 1 win 92 <nop,nop,timestamp 9409383="" 1889281090="">
                                      23:36:48.576914 IP 192.168.200.105.39989 > 217.197.240.43.80: P 1:414(413) ack 1 win 92 <nop,nop,timestamp 9409383="" 1889281090="">
                                      23:36:48.576968 IP 217.197.240.43.80 > 192.168.200.105.39989: . ack 414 win 4114 <nop,nop,timestamp 9409383="" 1889281093="">
                                      23:36:52.206803 IP 192.168.200.105.39991 > 217.197.240.43.80: S 984174247:984174247(0) win 5840 <mss 6="" 9410291="" 1460,sackok,timestamp="" 0,nop,wscale="">
                                      23:36:52.206879 IP 217.197.240.43.80 > 192.168.200.105.39991: S 1046618457:1046618457(0) ack 984174248 win 65228 <mss 9410291="" 2384337690="" 1452,nop,wscale="" 4,sackok,timestamp="">
                                      23:36:52.208804 IP 192.168.200.105.39991 > 217.197.240.43.80: . ack 1 win 92 <nop,nop,timestamp 9410291="" 2384337690="">
                                      23:36:52.464802 IP 192.168.200.105.39991 > 217.197.240.43.80: P 1:421(420) ack 1 win 92 <nop,nop,timestamp 9410355="" 2384337690="">
                                      23:36:52.464854 IP 217.197.240.43.80 > 192.168.200.105.39991: . ack 421 win 4113 <nop,nop,timestamp 9410355="" 2384337948="">
                                      23:36:52.466079 IP 217.197.240.43.80 > 192.168.200.105.39991: F 1:1(0) ack 421 win 4140 <nop,nop,timestamp 9410355="" 2384337949="">
                                      23:36:52.467803 IP 192.168.200.105.39991 > 217.197.240.43.80: . ack 2 win 92 <nop,nop,timestamp 9410356="" 2384337949="">
                                      23:36:52.492816 IP 192.168.200.105.39991 > 217.197.240.43.80: F 421:421(0) ack 2 win 92 <nop,nop,timestamp 9410362="" 2384337949="">
                                      23:36:52.492860 IP 217.197.240.43.80 > 192.168.200.105.39991: . ack 422 win 4139 <nop,nop,timestamp 9410362="" 2384337976="">
                                      23:36:52.492893 IP 192.168.200.105.39992 > 217.197.240.43.80: S 975881899:975881899(0) win 5840 <mss 6="" 9410362="" 1460,sackok,timestamp="" 0,nop,wscale="">
                                      23:36:52.492964 IP 217.197.240.43.80 > 192.168.200.105.39992: S 2800755419:2800755419(0) ack 975881900 win 65228 <mss 9410362="" 2491314302="" 1452,nop,wscale="" 4,sackok,timestamp="">
                                      23:36:52.494825 IP 192.168.200.105.39992 > 217.197.240.43.80: . ack 1 win 92 <nop,nop,timestamp 9410363="" 2491314302="">
                                      23:36:52.495819 IP 192.168.200.105.39992 > 217.197.240.43.80: P 1:421(420) ack 1 win 92 <nop,nop,timestamp 9410363="" 2491314302="">
                                      23:36:52.495897 IP 217.197.240.43.80 > 192.168.200.105.39992: . ack 421 win 4113 <nop,nop,timestamp 9410363="" 2491314305="">
                                      23:36:52.499063 IP 217.197.240.43.80 > 192.168.200.105.39992: F 1:1(0) ack 421 win 4140 <nop,nop,timestamp 9410363="" 2491314308="">
                                      23:36:52.500854 IP 192.168.200.105.39992 > 217.197.240.43.80: F 421:421(0) ack 2 win 92 <nop,nop,timestamp 9410364="" 2491314308="">
                                      23:36:52.500900 IP 217.197.240.43.80 > 192.168.200.105.39992: . ack 422 win 4139 <nop,nop,timestamp 9410364="" 2491314310="">
                                      23:36:52.500909 IP 192.168.200.105.39993 > 217.197.240.43.80: S 982901830:982901830(0) win 5840 <mss 6="" 9410364="" 1460,sackok,timestamp="" 0,nop,wscale="">
                                      23:36:52.500978 IP 217.197.240.43.80 > 192.168.200.105.39993: S 2017506781:2017506781(0) ack 982901831 win 65228 <mss 9410364="" 797414876="" 1452,nop,wscale="" 4,sackok,timestamp="">
                                      23:36:52.503817 IP 192.168.200.105.39993 > 217.197.240.43.80: . ack 1 win 92 <nop,nop,timestamp 9410365="" 797414876="">
                                      23:36:52.506906 IP 192.168.200.105.39993 > 217.197.240.43.80: P 1:421(420) ack 1 win 92 <nop,nop,timestamp 9410366="" 797414876="">
                                      23:36:52.506969 IP 217.197.240.43.80 > 192.168.200.105.39993: . ack 421 win 4113 <nop,nop,timestamp 9410366="" 797414882="">
                                      23:36:52.507951 IP 217.197.240.43.80 > 192.168.200.105.39993: F 1:1(0) ack 421 win 4140 <nop,nop,timestamp 9410366="" 797414883="">
                                      23:36:52.509803 IP 192.168.200.105.39993 > 217.197.240.43.80: F 421:421(0) ack 2 win 92 <nop,nop,timestamp 9410366="" 797414883="">
                                      23:36:52.509842 IP 217.197.240.43.80 > 192.168.200.105.39993: . ack 422 win 4139 <nop,nop,timestamp 9410366="" 797414885="">
                                      23:36:52.509852 IP 192.168.200.105.39994 > 217.197.240.43.80: S 987252684:987252684(0) win 5840 <mss 6="" 9410366="" 1460,sackok,timestamp="" 0,nop,wscale="">
                                      23:36:52.509919 IP 217.197.240.43.80 > 192.168.200.105.39994: S 4220072531:4220072531(0) ack 987252685 win 65228 <mss 9410366="" 1147532963="" 1452,nop,wscale="" 4,sackok,timestamp="">
                                      23:36:52.511803 IP 192.168.200.105.39994 > 217.197.240.43.80: . ack 1 win 92 <nop,nop,timestamp 9410367="" 1147532963="">
                                      23:36:52.511973 IP 192.168.200.105.39994 > 217.197.240.43.80: P 1:421(420) ack 1 win 92 <nop,nop,timestamp 9410367="" 1147532963="">
                                      23:36:52.511999 IP 217.197.240.43.80 > 192.168.200.105.39994: . ack 421 win 4113 <nop,nop,timestamp 9410367="" 1147532965="">
                                      23:36:52.516974 IP 217.197.240.43.80 > 192.168.200.105.39994: F 1:1(0) ack 421 win 4140 <nop,nop,timestamp 9410367="" 1147532970="">
                                      23:36:52.518804 IP 192.168.200.105.39994 > 217.197.240.43.80: F 421:421(0) ack 2 win 92 <nop,nop,timestamp 9410369="" 1147532970="">
                                      23:36:52.518849 IP 217.197.240.43.80 > 192.168.200.105.39994: . ack 422 win 4139 <nop,nop,timestamp 9410369="" 1147532972="">
                                      23:36:52.518859 IP 192.168.200.105.39995 > 217.197.240.43.80: S 981995427:981995427(0) win 5840 <mss 6="" 9410369="" 1460,sackok,timestamp="" 0,nop,wscale="">
                                      23:36:52.518925 IP 217.197.240.43.80 > 192.168.200.105.39995: S 1834141019:1834141019(0) ack 981995428 win 65228 <mss 9410369="" 2315223854="" 1452,nop,wscale="" 4,sackok,timestamp="">
                                      23:36:52.520803 IP 192.168.200.105.39995 > 217.197.240.43.80: . ack 1 win 92 <nop,nop,timestamp 9410369="" 2315223854="">
                                      23:36:52.522867 IP 192.168.200.105.39995 > 217.197.240.43.80: P 1:421(420) ack 1 win 92 <nop,nop,timestamp 9410370="" 2315223854="">
                                      23:36:52.522921 IP 217.197.240.43.80 > 192.168.200.105.39995: . ack 421 win 4113 <nop,nop,timestamp 9410370="" 2315223858="">
                                      23:36:57.987819 IP 192.168.200.105.42415 > 91.203.96.252.443: S 1062788144:1062788144(0) win 5840 <mss 6="" 9411736="" 1460,sackok,timestamp="" 0,nop,wscale="">
                                      23:36:58.023829 IP 91.203.96.252.443 > 192.168.200.105.42415: S 709560:709560(0) ack 1062788145 win 5792 <mss 7="" 1559924950="" 1452,sackok,timestamp="" 9411736,nop,wscale="">
                                      23:36:58.025802 IP 192.168.200.105.42415 > 91.203.96.252.443: . ack 1 win 92 <nop,nop,timestamp 9411745="" 1559924950="">
                                      23:36:58.025856 IP 192.168.200.105.42415 > 91.203.96.252.443: P 1:181(180) ack 1 win 92 <nop,nop,timestamp 9411746="" 1559924950="">
                                      23:36:58.061880 IP 91.203.96.252.443 > 192.168.200.105.42415: . ack 181 win 54 <nop,nop,timestamp 9411746="" 1559924959="">
                                      23:36:58.089856 IP 91.203.96.252.443 > 192.168.200.105.42415: . 1:1441(1440) ack 181 win 54 <nop,nop,timestamp 9411746="" 1559924966="">
                                      23:36:58.089873 IP 91.203.96.252.443 > 192.168.200.105.42415: . 1441:2881(1440) ack 181 win 54 <nop,nop,timestamp 9411746="" 1559924966="">
                                      23:36:58.089889 IP 91.203.96.252.443 > 192.168.200.105.42415: P 2881:4097(1216) ack 181 win 54 <nop,nop,timestamp 9411746="" 1559924966="">
                                      23:36:58.104945 IP 192.168.200.105.42415 > 91.203.96.252.443: . ack 1441 win 137 <nop,nop,timestamp 9411765="" 1559924966="">
                                      23:36:58.105822 IP 192.168.200.105.42415 > 91.203.96.252.443: . ack 2881 win 182 <nop,nop,timestamp 9411765="" 1559924966="">
                                      23:36:58.105898 IP 192.168.200.105.42415 > 91.203.96.252.443: . ack 4097 win 227 <nop,nop,timestamp 9411765="" 1559924966="">
                                      23:36:58.141831 IP 91.203.96.252.443 > 192.168.200.105.42415: P 4097:4590(493) ack 181 win 54 <nop,nop,timestamp 9411765="" 1559924979="">
                                      23:36:58.143820 IP 192.168.200.105.42415 > 91.203.96.252.443: . ack 4590 win 272 <nop,nop,timestamp 9411775="" 1559924979="">
                                      23:36:58.444832 IP 192.168.200.105.42415 > 91.203.96.252.443: P 181:448(267) ack 4590 win 272 <nop,nop,timestamp 9411850="" 1559924979="">
                                      23:36:58.521854 IP 91.203.96.252.443 > 192.168.200.105.42415: . ack 448 win 62 <nop,nop,timestamp 9411850="" 1559925075="">
                                      23:36:59.005803 IP 192.168.200.105.42415 > 91.203.96.252.443: P 448:454(6) ack 4590 win 272 <nop,nop,timestamp 9411990="" 1559925075="">
                                      23:36:59.041906 IP 91.203.96.252.443 > 192.168.200.105.42415: . ack 454 win 62 <nop,nop,timestamp 9411990="" 1559925204="">
                                      23:36:59.141803 IP 192.168.200.105.42415 > 91.203.96.252.443: P 454:507(53) ack 4590 win 272 <nop,nop,timestamp 9412025="" 1559925204="">
                                      23:36:59.181859 IP 91.203.96.252.443 > 192.168.200.105.42415: . ack 507 win 62 <nop,nop,timestamp 9412025="" 1559925239="">
                                      23:36:59.181916 IP 91.203.96.252.443 > 192.168.200.105.42415: P 4590:4649(59) ack 507 win 62 <nop,nop,timestamp 9412025="" 1559925239="">
                                      23:36:59.183848 IP 192.168.200.105.42415 > 91.203.96.252.443: . ack 4649 win 272 <nop,nop,timestamp 9412035="" 1559925239="">
                                      23:36:59.262802 IP 192.168.200.105.42415 > 91.203.96.252.443: P 507:1264(757) ack 4649 win 272 <nop,nop,timestamp 9412055="" 1559925239="">
                                      23:36:59.339879 IP 91.203.96.252.443 > 192.168.200.105.42415: . ack 1264 win 74 <nop,nop,timestamp 9412055="" 1559925279="">
                                      23:36:59.341802 IP 192.168.200.105.42415 > 91.203.96.252.443: P 1264:1701(437) ack 4649 win 272 <nop,nop,timestamp 9412074="" 1559925279="">
                                      23:36:59.380961 IP 91.203.96.252.443 > 192.168.200.105.42415: . ack 1701 win 86 <nop,nop,timestamp 9412074="" 1559925289="">
                                      23:36:59.391856 IP 91.203.96.252.443 > 192.168.200.105.42415: P 4649:4878(229) ack 1701 win 86 <nop,nop,timestamp 9412074="" 1559925292="">
                                      23:36:59.391872 IP 91.203.96.252.443 > 192.168.200.105.42415: P 4878:5139(261) ack 1701 win 86 <nop,nop,timestamp 9412074="" 1559925292="">
                                      23:36:59.391888 IP 91.203.96.252.443 > 192.168.200.105.42415: F 5139:5139(0) ack 1701 win 86 <nop,nop,timestamp 9412074="" 1559925292="">
                                      23:36:59.393802 IP 192.168.200.105.42415 > 91.203.96.252.443: . ack 4878 win 317 <nop,nop,timestamp 9412087="" 1559925292="">
                                      23:36:59.393835 IP 192.168.200.105.42415 > 91.203.96.252.443: . ack 5139 win 362 <nop,nop,timestamp 9412087="" 1559925292="">
                                      23:36:59.429802 IP 192.168.200.105.42415 > 91.203.96.252.443: . ack 5140 win 362 <nop,nop,timestamp 9412097="" 1559925292="">
                                      23:36:59.432803 IP 192.168.200.105.42415 > 91.203.96.252.443: F 1701:1701(0) ack 5140 win 362 <nop,nop,timestamp 9412097="" 1559925292="">
                                      23:36:59.470823 IP 91.203.96.252.443 > 192.168.200.105.42415: . ack 1702 win 86 <nop,nop,timestamp 9412097="" 1559925312="">
                                      23:37:06.178802 IP 192.168.200.105.46667 > 64.12.28.222.443: P 6:12(6) ack 1 win 60328
                                      23:37:06.325871 IP 64.12.28.222.443 > 192.168.200.105.46667: . ack 12 win 16384</nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp>
                                      
                                      1 Reply Last reply Reply Quote 0
                                      • E
                                        Eugene
                                        last edited by

                                        Сайт как-то очень тебя не любит… а так дава попробуем

                                        tcpdump -ni ste0 '(host 192.168.200.x or host 217.197.240.43) and host not 192.168.200.254 '
                                        

                                        x возьми из ip компьютера, с которого тестируешь.

                                        http://ru.doc.pfsense.org

                                        1 Reply Last reply Reply Quote 0
                                        • I
                                          iliaxxx
                                          last edited by

                                          $ tcpdump -ni ste0 '(host 192.168.200.105 or host 217.197.240.43) and host not 192.168.200.254 '
                                          23:56:16.949538 IP 192.168.200.1.55465 > 217.197.240.43.27030: UDP, length 26
                                          23:56:18.955552 IP 192.168.200.1.40233 > 217.197.240.43.27039: UDP, length 26
                                          23:56:19.608595 IP 192.168.200.105.50806 > 217.197.255.30.53: 19182+ AAAA? ms-cs.ru. (26)
                                          23:56:19.609617 IP 217.197.255.30.53 > 192.168.200.105.50806: 19182 0/1/0 (86)
                                          23:56:19.614552 IP 192.168.200.105.43375 > 217.197.255.30.53: 36664+ A? ms-cs.ru. (26)
                                          23:56:19.615569 IP 217.197.255.30.53 > 192.168.200.105.43375: 36664 1/3/3 A 217.197.240.43 (148)
                                          23:56:19.671537 IP 192.168.200.105.58773 > 217.197.240.43.80: S 2113189526:2113189526(0) win 5840 <mss 6="" 9702210="" 1460,sackok,timestamp="" 0,nop,wscale="">23:56:19.671621 IP 217.197.240.43.80 > 192.168.200.105.58773: S 1346553693:1346553693(0) ack 2113189527 win 65228 <mss 9702210="" 451980525="" 1452,nop,wscale="" 4,sackok,timestamp="">23:56:19.673541 IP 192.168.200.105.58773 > 217.197.240.43.80: . ack 1 win 92 <nop,nop,timestamp 9702211="" 451980525="">23:56:19.681538 IP 192.168.200.105.58773 > 217.197.240.43.80: P 1:414(413) ack 1 win 92 <nop,nop,timestamp 9702213="" 451980525="">23:56:19.681586 IP 217.197.240.43.80 > 192.168.200.105.58773: . ack 414 win 4114 <nop,nop,timestamp 9702213="" 451980535="">23:56:19.682749 IP 217.197.240.43.80 > 192.168.200.105.58773: F 1:1(0) ack 414 win 4140 <nop,nop,timestamp 9702213="" 451980536="">23:56:19.684538 IP 192.168.200.105.58773 > 217.197.240.43.80: F 414:414(0) ack 2 win 92 <nop,nop,timestamp 9702214="" 451980536="">23:56:19.684581 IP 217.197.240.43.80 > 192.168.200.105.58773: . ack 415 win 4139 <nop,nop,timestamp 9702214="" 451980538="">23:56:19.684591 IP 192.168.200.105.58774 > 217.197.240.43.80: S 2108227152:2108227152(0) win 5840 <mss 6="" 9702214="" 1460,sackok,timestamp="" 0,nop,wscale="">23:56:19.684658 IP 217.197.240.43.80 > 192.168.200.105.58774: S 1602132447:1602132447(0) ack 2108227153 win 65228 <mss 9702214="" 326087194="" 1452,nop,wscale="" 4,sackok,timestamp="">23:56:19.686539 IP 192.168.200.105.58774 > 217.197.240.43.80: . ack 1 win 92 <nop,nop,timestamp 9702214="" 326087194="">23:56:19.688589 IP 192.168.200.105.58774 > 217.197.240.43.80: P 1:414(413) ack 1 win 92 <nop,nop,timestamp 9702215="" 326087194="">23:56:19.688637 IP 217.197.240.43.80 > 192.168.200.105.58774: . ack 414 win 4114 <nop,nop,timestamp 9702215="" 326087198="">23:56:19.690796 IP 217.197.240.43.80 > 192.168.200.105.58774: F 1:1(0) ack 414 win 4140 <nop,nop,timestamp 9702215="" 326087200="">23:56:19.692538 IP 192.168.200.105.58774 > 217.197.240.43.80: F 414:414(0) ack 2 win 92 <nop,nop,timestamp 9702216="" 326087200="">23:56:19.692577 IP 217.197.240.43.80 > 192.168.200.105.58774: . ack 415 win 4139 <nop,nop,timestamp 9702216="" 326087202="">23:56:19.693538 IP 192.168.200.105.58775 > 217.197.240.43.80: S 2117011968:2117011968(0) win 5840 <mss 6="" 9702216="" 1460,sackok,timestamp="" 0,nop,wscale="">23:56:19.693606 IP 217.197.240.43.80 > 192.168.200.105.58775: S 2168819805:2168819805(0) ack 2117011969 win 65228 <mss 9702216="" 660744362="" 1452,nop,wscale="" 4,sackok,timestamp="">23:56:19.695560 IP 192.168.200.105.58775 > 217.197.240.43.80: . ack 1 win 92 <nop,nop,timestamp 9702217="" 660744362="">23:56:19.695625 IP 192.168.200.105.58775 > 217.197.240.43.80: P 1:414(413) ack 1 win 92 <nop,nop,timestamp 9702217="" 660744362="">23:56:19.695646 IP 217.197.240.43.80 > 192.168.200.105.58775: . ack 414 win 4114 <nop,nop,timestamp 9702217="" 660744364="">23:56:19.700735 IP 217.197.240.43.80 > 192.168.200.105.58775: F 1:1(0) ack 414 win 4140 <nop,nop,timestamp 9702217="" 660744369="">23:56:19.702554 IP 192.168.200.105.58775 > 217.197.240.43.80: F 414:414(0) ack 2 win 92 <nop,nop,timestamp 9702218="" 660744369="">23:56:19.702602 IP 217.197.240.43.80 > 192.168.200.105.58775: . ack 415 win 4139 <nop,nop,timestamp 9702218="" 660744371="">23:56:19.702613 IP 192.168.200.105.58776 > 217.197.240.43.80: S 2108254136:2108254136(0) win 5840 <mss 6="" 9702218="" 1460,sackok,timestamp="" 0,nop,wscale="">23:56:19.702676 IP 217.197.240.43.80 > 192.168.200.105.58776: S 1852090195:1852090195(0) ack 2108254137 win 65228 <mss 9702218="" 3202765724="" 1452,nop,wscale="" 4,sackok,timestamp="">23:56:19.704576 IP 192.168.200.105.58776 > 217.197.240.43.80: . ack 1 win 92 <nop,nop,timestamp 9702219="" 3202765724="">23:56:19.705693 IP 192.168.200.105.58776 > 217.197.240.43.80: P 1:414(413) ack 1 win 92 <nop,nop,timestamp 9702219="" 3202765724="">23:56:19.705752 IP 217.197.240.43.80 > 192.168.200.105.58776: . ack 414 win 4114 <nop,nop,timestamp 9702219="" 3202765727="">23:56:19.709694 IP 217.197.240.43.80 > 192.168.200.105.58776: F 1:1(0) ack 414 win 4140 <nop,nop,timestamp 9702219="" 3202765731="">23:56:19.711539 IP 192.168.200.105.58776 > 217.197.240.43.80: F 414:414(0) ack 2 win 92 <nop,nop,timestamp 9702221="" 3202765731="">23:56:19.711591 IP 217.197.240.43.80 > 192.168.200.105.58776: . ack 415 win 4139 <nop,nop,timestamp 9702221="" 3202765733="">23:56:19.711602 IP 192.168.200.105.58777 > 217.197.240.43.80: S 2102334455:2102334455(0) win 5840 <mss 6="" 9702221="" 1460,sackok,timestamp="" 0,nop,wscale="">23:56:19.711656 IP 217.197.240.43.80 > 192.168.200.105.58777: S 423258587:423258587(0) ack 2102334456 win 65228 <mss 9702221="" 2189672958="" 1452,nop,wscale="" 4,sackok,timestamp="">23:56:19.713544 IP 192.168.200.105.58777 > 217.197.240.43.80: . ack 1 win 92 <nop,nop,timestamp 9702221="" 2189672958="">23:56:19.715777 IP 192.168.200.105.58777 > 217.197.240.43.80: P 1:414(413) ack 1 win 92 <nop,nop,timestamp 9702222="" 2189672958="">23:56:19.715819 IP 217.197.240.43.80 > 192.168.200.105.58777: . ack 414 win 4114 <nop,nop,timestamp 9702222="" 2189672962="">23:56:19.718699 IP 217.197.240.43.80 > 192.168.200.105.58777: F 1:1(0) ack 414 win 4140 <nop,nop,timestamp 9702222="" 2189672965="">23:56:19.720537 IP 192.168.200.105.58777 > 217.197.240.43.80: F 414:414(0) ack 2 win 92 <nop,nop,timestamp 9702223="" 2189672965="">23:56:19.720579 IP 217.197.240.43.80 > 192.168.200.105.58777: . ack 415 win 4139 <nop,nop,timestamp 9702223="" 2189672967="">23:56:20.962556 IP 192.168.200.1.49833 > 217.197.240.43.27035: UDP, length 26
                                          23:56:22.204555 IP 192.168.200.105.58779 > 217.197.240.43.80: S 2142524715:2142524715(0) win 5840 <mss 6="" 9702844="" 1460,sackok,timestamp="" 0,nop,wscale="">23:56:22.204630 IP 217.197.240.43.80 > 192.168.200.105.58779: S 356341979:356341979(0) ack 2142524716 win 65228 <mss 9702844="" 124568884="" 1452,nop,wscale="" 4,sackok,timestamp="">23:56:22.206589 IP 192.168.200.105.58779 > 217.197.240.43.80: . ack 1 win 92 <nop,nop,timestamp 9702844="" 124568884="">23:56:22.207633 IP 192.168.200.105.58779 > 217.197.240.43.80: P 1:421(420) ack 1 win 92 <nop,nop,timestamp 9702844="" 124568884="">23:56:22.207686 IP 217.197.240.43.80 > 192.168.200.105.58779: . ack 421 win 4113 <nop,nop,timestamp 9702844="" 124568887="">23:56:22.211792 IP 217.197.240.43.80 > 192.168.200.105.58779: F 1:1(0) ack 421 win 4140 <nop,nop,timestamp 9702844="" 124568891="">23:56:22.213632 IP 192.168.200.105.58779 > 217.197.240.43.80: F 421:421(0) ack 2 win 92 <nop,nop,timestamp 9702846="" 124568891="">23:56:22.213693 IP 217.197.240.43.80 > 192.168.200.105.58779: . ack 422 win 4139 <nop,nop,timestamp 9702846="" 124568893="">23:56:22.222547 IP 192.168.200.105.58780 > 217.197.240.43.80: S 2142034928:2142034928(0) win 5840 <mss 6="" 9702846="" 1460,sackok,timestamp="" 0,nop,wscale="">23:56:22.222661 IP 217.197.240.43.80 > 192.168.200.105.58780: S 3315716695:3315716695(0) ack 2142034929 win 65228 <mss 9702846="" 1503859073="" 1452,nop,wscale="" 4,sackok,timestamp="">23:56:22.224547 IP 192.168.200.105.58780 > 217.197.240.43.80: . ack 1 win 92 <nop,nop,timestamp 9702849="" 1503859073="">23:56:22.228555 IP 192.168.200.105.58780 > 217.197.240.43.80: P 1:421(420) ack 1 win 92 <nop,nop,timestamp 9702849="" 1503859073="">23:56:22.228644 IP 217.197.240.43.80 > 192.168.200.105.58780: . ack 421 win 4113 <nop,nop,timestamp 9702849="" 1503859079="">23:56:22.229700 IP 217.197.240.43.80 > 192.168.200.105.58780: F 1:1(0) ack 421 win 4140 <nop,nop,timestamp 9702849="" 1503859080="">23:56:22.231548 IP 192.168.200.105.58780 > 217.197.240.43.80: . ack 2 win 92 <nop,nop,timestamp 9702851="" 1503859080="">23:56:22.232626 IP 192.168.200.105.58780 > 217.197.240.43.80: F 421:421(0) ack 2 win 92 <nop,nop,timestamp 9702851="" 1503859080="">23:56:22.232676 IP 217.197.240.43.80 > 192.168.200.105.58780: . ack 422 win 4139 <nop,nop,timestamp 9702851="" 1503859083="">23:56:22.232689 IP 192.168.200.105.58781 > 217.197.240.43.80: S 2155746269:2155746269(0) win 5840 <mss 6="" 9702851="" 1460,sackok,timestamp="" 0,nop,wscale="">23:56:22.232760 IP 217.197.240.43.80 > 192.168.200.105.58781: S 2570914527:2570914527(0) ack 2155746270 win 65228 <mss 9702851="" 3792366199="" 1452,nop,wscale="" 4,sackok,timestamp="">23:56:22.234635 IP 192.168.200.105.58781 > 217.197.240.43.80: . ack 1 win 92 <nop,nop,timestamp 9702851="" 3792366199="">23:56:22.242537 IP 192.168.200.105.58781 > 217.197.240.43.80: P 1:421(420) ack 1 win 92 <nop,nop,timestamp 9702852="" 3792366199="">23:56:22.242582 IP 217.197.240.43.80 > 192.168.200.105.58781: . ack 421 win 4113 <nop,nop,timestamp 9702852="" 3792366209="">23:56:22.243785 IP 217.197.240.43.80 > 192.168.200.105.58781: F 1:1(0) ack 421 win 4140 <nop,nop,timestamp 9702852="" 3792366210="">23:56:22.246540 IP 192.168.200.105.58781 > 217.197.240.43.80: F 421:421(0) ack 2 win 92 <nop,nop,timestamp 9702854="" 3792366210="">23:56:22.246576 IP 217.197.240.43.80 > 192.168.200.105.58781: . ack 422 win 4139 <nop,nop,timestamp 9702854="" 3792366213="">23:56:22.246586 IP 192.168.200.105.58782 > 217.197.240.43.80: S 2153539667:2153539667(0) win 5840 <mss 6="" 9702854="" 1460,sackok,timestamp="" 0,nop,wscale="">23:56:22.246656 IP 217.197.240.43.80 > 192.168.200.105.58782: S 2584404831:2584404831(0) ack 2153539668 win 65228 <mss 9702854="" 166702993="" 1452,nop,wscale="" 4,sackok,timestamp="">23:56:22.248537 IP 192.168.200.105.58782 > 217.197.240.43.80: . ack 1 win 92 <nop,nop,timestamp 9702855="" 166702993="">23:56:22.252542 IP 192.168.200.105.58782 > 217.197.240.43.80: P 1:421(420) ack 1 win 92 <nop,nop,timestamp 9702855="" 166702993="">23:56:22.252595 IP 217.197.240.43.80 > 192.168.200.105.58782: . ack 421 win 4113 <nop,nop,timestamp 9702855="" 166702999="">23:56:22.964537 IP 192.168.200.1.56149 > 217.197.240.43.27033: UDP, length 26
                                          23:56:23.409628 IP 64.12.165.74.5190 > 192.168.200.105.56779: . ack 608898784 win 16384
                                          23:56:23.410686 IP 192.168.200.105.56779 > 64.12.165.74.5190: . ack 1 win 7504
                                          23:56:24.734608 IP 64.12.202.51.5190 > 192.168.200.105.58386: . ack 601905863 win 16384
                                          23:56:24.736537 IP 192.168.200.105.58386 > 64.12.202.51.5190: . ack 1 win 9544
                                          23:56:24.969538 IP 192.168.200.1.39849 > 217.197.240.43.27031: UDP, length 26
                                          23:56:25.069555 IP 192.168.200.105.58783 > 217.197.240.43.80: S 2192584988:2192584988(0) win 5840 <mss 6="" 9703560="" 1460,sackok,timestamp="" 0,nop,wscale="">23:56:25.069625 IP 217.197.240.43.80 > 192.168.200.105.58783: S 2011842771:2011842771(0) ack 2192584989 win 65228 <mss 9703560="" 2145323367="" 1452,nop,wscale="" 4,sackok,timestamp="">23:56:25.071537 IP 192.168.200.105.58783 > 217.197.240.43.80: . ack 1 win 92 <nop,nop,timestamp 9703560="" 2145323367="">23:56:25.194554 IP 192.168.200.105.58783 > 217.197.240.43.80: P 1:414(413) ack 1 win 92 <nop,nop,timestamp 9703591="" 2145323367="">23:56:25.194604 IP 217.197.240.43.80 > 192.168.200.105.58783: . ack 414 win 4114 <nop,nop,timestamp 9703591="" 2145323492="">23:56:25.195759 IP 217.197.240.43.80 > 192.168.200.105.58783: F 1:1(0) ack 414 win 4140 <nop,nop,timestamp 9703591="" 2145323493="">23:56:25.199538 IP 192.168.200.105.58783 > 217.197.240.43.80: . ack 2 win 92 <nop,nop,timestamp 9703592="" 2145323493="">23:56:25.298538 IP 192.168.200.105.58783 > 217.197.240.43.80: F 414:414(0) ack 2 win 92 <nop,nop,timestamp 9703617="" 2145323493="">23:56:25.298583 IP 217.197.240.43.80 > 192.168.200.105.58783: . ack 415 win 4139 <nop,nop,timestamp 9703617="" 2145323596="">23:56:25.302537 IP 192.168.200.105.58784 > 217.197.240.43.80: S 2195724735:2195724735(0) win 5840 <mss 6="" 9703618="" 1460,sackok,timestamp="" 0,nop,wscale="">23:56:25.302598 IP 217.197.240.43.80 > 192.168.200.105.58784: S 836103633:836103633(0) ack 2195724736 win 65228 <mss 9703618="" 3603676731="" 1452,nop,wscale="" 4,sackok,timestamp="">23:56:25.304537 IP 192.168.200.105.58784 > 217.197.240.43.80: . ack 1 win 92 <nop,nop,timestamp 9703618="" 3603676731="">23:56:25.312592 IP 192.168.200.105.58784 > 217.197.240.43.80: P 1:414(413) ack 1 win 92 <nop,nop,timestamp 9703620="" 3603676731="">23:56:25.312628 IP 217.197.240.43.80 > 192.168.200.105.58784: . ack 414 win 4114 <nop,nop,timestamp 9703620="" 3603676741="">23:56:25.313931 IP 217.197.240.43.80 > 192.168.200.105.58784: F 1:1(0) ack 414 win 4140 <nop,nop,timestamp 9703620="" 3603676742="">23:56:25.315605 IP 192.168.200.105.58784 > 217.197.240.43.80: F 414:414(0) ack 2 win 92 <nop,nop,timestamp 9703621="" 3603676742="">23:56:25.315669 IP 217.197.240.43.80 > 192.168.200.105.58784: . ack 415 win 4139 <nop,nop,timestamp 9703621="" 3603676744="">23:56:25.315679 IP 192.168.200.105.58785 > 217.197.240.43.80: S 2196250712:2196250712(0) win 5840 <mss 6="" 9703621="" 1460,sackok,timestamp="" 0,nop,wscale="">23:56:25.315751 IP 217.197.240.43.80 > 192.168.200.105.58785: S 1776931675:1776931675(0) ack 2196250713 win 65228 <mss 9703621="" 1081624554="" 1452,nop,wscale="" 4,sackok,timestamp="">23:56:25.317555 IP 192.168.200.105.58785 > 217.197.240.43.80: . ack 1 win 92 <nop,nop,timestamp 9703622="" 1081624554="">23:56:25.332557 IP 192.168.200.105.58785 > 217.197.240.43.80: P 1:414(413) ack 1 win 92 <nop,nop,timestamp 9703622="" 1081624554="">23:56:25.332603 IP 217.197.240.43.80 > 192.168.200.105.58785: . ack 414 win 4114 <nop,nop,timestamp 9703622="" 1081624571="">23:56:25.333803 IP 217.197.240.43.80 > 192.168.200.105.58785: F 1:1(0) ack 414 win 4140 <nop,nop,timestamp 9703622="" 1081624572="">23:56:25.335538 IP 192.168.200.105.58785 > 217.197.240.43.80: F 414:414(0) ack 2 win 92 <nop,nop,timestamp 9703626="" 1081624572="">23:56:25.335576 IP 217.197.240.43.80 > 192.168.200.105.58785: . ack 415 win 4139 <nop,nop,timestamp 9703626="" 1081624574="">23:56:25.335586 IP 192.168.200.105.58786 > 217.197.240.43.80: S 2201292526:2201292526(0) win 5840 <mss 6="" 9703627="" 1460,sackok,timestamp="" 0,nop,wscale="">23:56:25.335653 IP 217.197.240.43.80 > 192.168.200.105.58786: S 1736754773:1736754773(0) ack 2201292527 win 65228 <mss 9703627="" 1094176390="" 1452,nop,wscale="" 4,sackok,timestamp="">23:56:25.337537 IP 192.168.200.105.58786 > 217.197.240.43.80: . ack 1 win 92 <nop,nop,timestamp 9703627="" 1094176390="">23:56:25.342553 IP 192.168.200.105.58786 > 217.197.240.43.80: P 1:414(413) ack 1 win 92 <nop,nop,timestamp 9703627="" 1094176390="">23:56:25.342597 IP 217.197.240.43.80 > 192.168.200.105.58786: . ack 414 win 4114 <nop,nop,timestamp 9703627="" 1094176397="">23:56:25.343763 IP 217.197.240.43.80 > 192.168.200.105.58786: F 1:1(0) ack 414 win 4140 <nop,nop,timestamp 9703627="" 1094176398="">23:56:25.345554 IP 192.168.200.105.58786 > 217.197.240.43.80: . ack 2 win 92 <nop,nop,timestamp 9703629="" 1094176398="">23:56:25.345609 IP 192.168.200.105.58786 > 217.197.240.43.80: F 414:414(0) ack 2 win 92 <nop,nop,timestamp 9703629="" 1094176398="">23:56:25.345635 IP 217.197.240.43.80 > 192.168.200.105.58786: . ack 415 win 4139 <nop,nop,timestamp 9703629="" 1094176400="">23:56:25.345644 IP 192.168.200.105.58787 > 217.197.240.43.80: S 2190897716:2190897716(0) win 5840 <mss 6="" 9703629="" 1460,sackok,timestamp="" 0,nop,wscale="">23:56:25.345708 IP 217.197.240.43.80 > 192.168.200.105.58787: S 1928645841:1928645841(0) ack 2190897717 win 65228 <mss 9703629="" 1436458450="" 1452,nop,wscale="" 4,sackok,timestamp="">23:56:25.347561 IP 192.168.200.105.58787 > 217.197.240.43.80: . ack 1 win 92 <nop,nop,timestamp 9703629="" 1436458450="">23:56:25.352599 IP 192.168.200.105.58787 > 217.197.240.43.80: P 1:414(413) ack 1 win 92 <nop,nop,timestamp 9703629="" 1436458450="">23:56:25.352642 IP 217.197.240.43.80 > 192.168.200.105.58787: . ack 414 win 4114 <nop,nop,timestamp 9703629="" 1436458457="">23:56:25.353743 IP 217.197.240.43.80 > 192.168.200.105.58787: F 1:1(0) ack 414 win 4140 <nop,nop,timestamp 9703629="" 1436458458="">23:56:25.355562 IP 192.168.200.105.58787 > 217.197.240.43.80: F 414:414(0) ack 2 win 92 <nop,nop,timestamp 9703631="" 1436458458="">23:56:25.355591 IP 217.197.240.43.80 > 192.168.200.105.58787: . ack 415 win 4139 <nop,nop,timestamp 9703631="" 1436458460="">23:56:26.972579 IP 192.168.200.1.37697 > 217.197.240.43.27045: UDP, length 26
                                          23:56:28.977537 IP 192.168.200.1.36654 > 217.197.240.43.27037: UDP, length 26
                                          23:56:29.319570 IP 192.168.200.105.58789 > 217.197.240.43.80: S 2261352381:2261352381(0) win 5840 <mss 6="" 9704623="" 1460,sackok,timestamp="" 0,nop,wscale="">23:56:29.319653 IP 217.197.240.43.80 > 192.168.200.105.58789: S 2668585169:2668585169(0) ack 2261352382 win 65228 <mss 9704623="" 2534138469="" 1452,nop,wscale="" 4,sackok,timestamp="">23:56:29.320751 IP 192.168.200.105.58789 > 217.197.240.43.80: . ack 1 win 92 <nop,nop,timestamp 9704623="" 2534138469="">23:56:29.393537 IP 192.168.200.105.58789 > 217.197.240.43.80: P 1:414(413) ack 1 win 92 <nop,nop,timestamp 9704641="" 2534138469="">23:56:29.393590 IP 217.197.240.43.80 > 192.168.200.105.58789: . ack 414 win 4114 <nop,nop,timestamp 9704641="" 2534138543="">23:56:29.394813 IP 217.197.240.43.80 > 192.168.200.105.58789: F 1:1(0) ack 414 win 4140 <nop,nop,timestamp 9704641="" 2534138544="">23:56:29.397554 IP 192.168.200.105.58789 > 217.197.240.43.80: F 414:414(0) ack 2 win 92 <nop,nop,timestamp 9704642="" 2534138544="">23:56:29.397597 IP 217.197.240.43.80 > 192.168.200.105.58789: . ack 415 win 4139 <nop,nop,timestamp 9704642="" 2534138547="">23:56:29.397608 IP 192.168.200.105.58790 > 217.197.240.43.80: S 2269048530:2269048530(0) win 5840 <mss 6="" 9704642="" 1460,sackok,timestamp="" 0,nop,wscale="">23:56:29.397669 IP 217.197.240.43.80 > 192.168.200.105.58790: S 775623389:775623389(0) ack 2269048531 win 65228 <mss 9704642="" 3924902585="" 1452,nop,wscale="" 4,sackok,timestamp="">23:56:29.399538 IP 192.168.200.105.58790 > 217.197.240.43.80: . ack 1 win 92 <nop,nop,timestamp 9704642="" 3924902585="">23:56:29.400554 IP 192.168.200.105.58790 > 217.197.240.43.80: P 1:414(413) ack 1 win 92 <nop,nop,timestamp 9704643="" 3924902585="">23:56:29.400637 IP 217.197.240.43.80 > 192.168.200.105.58790: . ack 414 win 4114 <nop,nop,timestamp 9704643="" 3924902588="">23:56:29.403685 IP 217.197.240.43.80 > 192.168.200.105.58790: F 1:1(0) ack 414 win 4140 <nop,nop,timestamp 9704643="" 3924902591="">23:56:29.405554 IP 192.168.200.105.58790 > 217.197.240.43.80: F 414:414(0) ack 2 win 92 <nop,nop,timestamp 9704644="" 3924902591="">23:56:29.405593 IP 217.197.240.43.80 > 192.168.200.105.58790: . ack 415 win 4139 <nop,nop,timestamp 9704644="" 3924902593="">23:56:29.405629 IP 192.168.200.105.58791 > 217.197.240.43.80: S 2253164883:2253164883(0) win 5840 <mss 6="" 9704644="" 1460,sackok,timestamp="" 0,nop,wscale="">23:56:29.405694 IP 217.197.240.43.80 > 192.168.200.105.58791: S 4046176725:4046176725(0) ack 2253164884 win 65228 <mss 9704644="" 670520677="" 1452,nop,wscale="" 4,sackok,timestamp="">23:56:29.407538 IP 192.168.200.105.58791 > 217.197.240.43.80: . ack 1 win 92 <nop,nop,timestamp 9704644="" 670520677="">23:56:29.408556 IP 192.168.200.105.58791 > 217.197.240.43.80: P 1:414(413) ack 1 win 92 <nop,nop,timestamp 9704645="" 670520677="">23:56:29.408642 IP 217.197.240.43.80 > 192.168.200.105.58791: . ack 414 win 4114 <nop,nop,timestamp 9704645="" 670520680="">23:56:29.411699 IP 217.197.240.43.80 > 192.168.200.105.58791: F 1:1(0) ack 414 win 4140 <nop,nop,timestamp 9704645="" 670520683="">23:56:29.413576 IP 192.168.200.105.58791 > 217.197.240.43.80: F 414:414(0) ack 2 win 92 <nop,nop,timestamp 9704646="" 670520683="">23:56:29.413620 IP 217.197.240.43.80 > 192.168.200.105.58791: . ack 415 win 4139 <nop,nop,timestamp 9704646="" 670520685="">23:56:29.414537 IP 192.168.200.105.58792 > 217.197.240.43.80: S 2257878207:2257878207(0) win 5840 <mss 6="" 9704646="" 1460,sackok,timestamp="" 0,nop,wscale="">23:56:29.414601 IP 217.197.240.43.80 > 192.168.200.105.58792: S 511136093:511136093(0) ack 2257878208 win 65228 <mss 9704646="" 1644959485="" 1452,nop,wscale="" 4,sackok,timestamp="">23:56:29.416570 IP 192.168.200.105.58792 > 217.197.240.43.80: . ack 1 win 92 <nop,nop,timestamp 9704647="" 1644959485="">23:56:29.418596 IP 192.168.200.105.58792 > 217.197.240.43.80: P 1:414(413) ack 1 win 92 <nop,nop,timestamp 9704647="" 1644959485="">23:56:29.418648 IP 217.197.240.43.80 > 192.168.200.105.58792: . ack 414 win 4114 <nop,nop,timestamp 9704647="" 1644959489="">23:56:29.420794 IP 217.197.240.43.80 > 192.168.200.105.58792: F 1:1(0) ack 414 win 4140 <nop,nop,timestamp 9704647="" 1644959491="">23:56:29.422537 IP 192.168.200.105.58792 > 217.197.240.43.80: F 414:414(0) ack 2 win 92 <nop,nop,timestamp 9704648="" 1644959491="">23:56:29.422582 IP 217.197.240.43.80 > 192.168.200.105.58792: . ack 415 win 4139 <nop,nop,timestamp 9704648="" 1644959493="">23:56:29.422592 IP 192.168.200.105.58793 > 217.197.240.43.80: S 2255636411:2255636411(0) win 5840</nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></nop,nop,timestamp></mss></mss> 
                                          
                                          1 Reply Last reply Reply Quote 0
                                          • E
                                            Eugene
                                            last edited by

                                            твой сервер не хочет работать с клиентом, если запрос приходит из локальной сети. Настраивай сервер.

                                            http://ru.doc.pfsense.org

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.