Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    VLAN Issue

    2.1 Snapshot Feedback and Problems - RETIRED
    7
    38
    12.7k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • T
      timthetortoise
      last edited by

      My rules for my guest VLAN currently look like this:

      Make sure that you flush your states (I prefer to do it in command line just to be safe with pfctl -F state) and verify that your pfctl -sr output is what you expect it to be.

      1 Reply Last reply Reply Quote 0
      • S
        supermega
        last edited by

        Thank you timthetortoise :)

        Its working  :)

        I will setup a lot of vlans and I have to do so much rules per interface.

        Why something changed in the new snapshots of pfsense 2.1 ? Before everything between the interfaces was automatically blocked without any rule.

        1 Reply Last reply Reply Quote 0
        • M
          markuhde
          last edited by

          I'm having the opposite issue, LOL! I have my setup set to allow OPT1 to any and I can't connect to IP addresses on the LAN interface. em0_vlan69 is LAN em0_vlan15 is OPT1

          1 Reply Last reply Reply Quote 0
          • C
            cmb
            last edited by

            @supermega:

            Why something changed in the new snapshots of pfsense 2.1 ? Before everything between the interfaces was automatically blocked without any rule.

            Hasn't changed ever, a new interface has no rules which means no traffic allowed initiated from that interface, same as always. Initiated into that network is controlled by the source interface's rules.

            1 Reply Last reply Reply Quote 0
            • M
              markuhde
              last edited by

              @cmb:

              @supermega:

              Why something changed in the new snapshots of pfsense 2.1 ? Before everything between the interfaces was automatically blocked without any rule.

              Hasn't changed ever, a new interface has no rules which means no traffic allowed initiated from that interface, same as always. Initiated into that network is controlled by the source interface's rules.

              No CMB, there's something seriously wrong in the latest builds. The same rules that USED to work fine don't work anymore on VLAN's to allow traffic between interfaces. I can't communicate with the LAN (which is a VLAN) from other interfaces (including the OpenVPN interface). Something's definitely seriously broken - this always used to work.

              1 Reply Last reply Reply Quote 0
              • E
                eri--
                last edited by

                Can you post your /tmp/rules.debug and screenshots of the gui(or config.xml) to see what is happening htere?

                1 Reply Last reply Reply Quote 0
                • M
                  markuhde
                  last edited by

                  I got it to work by adding a new rule I don't think I needed before. I added a rule on the LAN interface to allow ANY to LAN SUBNET. I don't think I had a rule like that before but I do now realize I may have had allow any to any. I don't recall, but should a rule like that be needed on the LAN side? Thank you for your help Ermal. It definitely seems something's changed slightly.

                  1 Reply Last reply Reply Quote 0
                  • T
                    timthetortoise
                    last edited by

                    It technically shouldn't be necessary. Established connections should be allowed through. I noticed the same thing with my OpenVPN tunnel and chalked it up to a misconfiguration on my part. I'll have to try setting a rule for it today.

                    1 Reply Last reply Reply Quote 0
                    • M
                      markuhde
                      last edited by

                      @timthetortoise:

                      It technically shouldn't be necessary. Established connections should be allowed through. I noticed the same thing with my OpenVPN tunnel and chalked it up to a misconfiguration on my part. I'll have to try setting a rule for it today.

                      I wasn't just noticing it on the OpenVPN but also on another VLAN. Something seems to have changed in the default rules and it now needs explicitly stated. What would be most helpful Ermal and I will get it posted right away.

                      1 Reply Last reply Reply Quote 0
                      • T
                        timthetortoise
                        last edited by

                        I'm not noticing that, to be honest - my rules allow LAN1 to LAN2 on the LAN1 side, but not the LAN2 side, and it works correctly (can pass traffic from LAN1 to LAN2, not vice-versa). I have no rules regarding LAN1 in LAN2, except to disallow ingress traffic on LAN2 to LAN1 (again, already established connections should not be affected). These could be completely different issues, but it's very odd nonetheless.

                        1 Reply Last reply Reply Quote 0
                        • M
                          markuhde
                          last edited by

                          @timthetortoise:

                          I'm not noticing that, to be honest - my rules allow LAN1 to LAN2 on the LAN1 side, but not the LAN2 side, and it works correctly (can pass traffic from LAN1 to LAN2, not vice-versa). I have no rules regarding LAN1 in LAN2, except to disallow ingress traffic on LAN2 to LAN1 (again, already established connections should not be affected). These could be completely different issues, but it's very odd nonetheless.

                          Yes, also limiters are broken I forgot to note that I found that - with in/out limiters set up on my VLAN's (yes, in is masked by source IP and out by destination IP) no traffic passes whatsoever. Something is definitely seriously broken in recent builds, could it be something that is just one thing that relates to the parsing of firewall rules? Sadly, I have no way to tell when it broke since I hadn't upgraded in 60 days and when I did, I wiped the box and started over.

                          1 Reply Last reply Reply Quote 0
                          • E
                            eri--
                            last edited by

                            If you refuse to provide feedback i will just mark you as a troll an lock this subject.

                            Decide on your own if you want to continue and give feedback or just troll around.

                            1 Reply Last reply Reply Quote 0
                            • M
                              markuhde
                              last edited by

                              @ermal:

                              If you refuse to provide feedback i will just mark you as a troll an lock this subject.

                              Decide on your own if you want to continue and give feedback or just troll around.

                              What on earth are you talking about? I said above - given what's going on, what would be most useful? I'm happy to send you anything you need to help troubleshoot!

                              1 Reply Last reply Reply Quote 0
                              • M
                                markuhde
                                last edited by

                                I seem to have got my limiters working again, it seems that was an unrelated thing (I forgot limiters have NEEDED defined schedules for quite a long time now, forgot why they do).

                                What files would be useful to help determine why I'm needed extra rules to communicate between VLAN's? I'd be happy to send anything you need or provide access to the system if I'm not able to get it.

                                1 Reply Last reply Reply Quote 0
                                • W
                                  wallabybob
                                  last edited by

                                  @markuhde:

                                  What files would be useful to help determine why I'm needed extra rules to communicate between VLAN's? I'd be happy to send anything you need or provide access to the system if I'm not able to get it.

                                  Have you already provided the requested information:
                                  @ermal:

                                  Can you post your /tmp/rules.debug and screenshots of the gui(or config.xml) to see what is happening htere?

                                  If so, where?

                                  1 Reply Last reply Reply Quote 0
                                  • M
                                    markuhde
                                    last edited by

                                    No I haven't because the forum doesn't let you post files with those extensions. I'd be happy to email those files to Ermal (or other devs) though!

                                    Edit, I just tried posting screenshots of my rules but the forum just timed out and didn't let me post those either. Today, I'm having issues connecting to one of my WAN interfaces but that may simply be my Internet connection at work blocking it - I have a HORRIBLE Internet connection here.

                                    1 Reply Last reply Reply Quote 0
                                    • W
                                      wallabybob
                                      last edited by

                                      @markuhde:

                                      No I haven't because the forum doesn't let you post files with those extensions.

                                      It won't stop you posting the contents of the requested file(s) within a reply (within a quote block or code block to distinguish the contents from commentary).

                                      1 Reply Last reply Reply Quote 0
                                      • M
                                        markuhde
                                        last edited by

                                        @wallabybob:

                                        @markuhde:

                                        No I haven't because the forum doesn't let you post files with those extensions.

                                        It won't stop you posting the contents of the requested file(s) within a reply (within a quote block or code block to distinguish the contents from commentary).

                                        Good point I didn't want to flood the forum but if that's the best way to get those to you guys here they are. Also, not being able to access one of my WAN interfaces was just, as I suspected, my work blocking the IP address. So the only issue on-topic to this thread seems to be the communication between VLAN's, except, instead of being unable to block traffic I had to specifically allow it on the other interface. Here are the files Ermal requested:

                                        rules.debug:

                                        set limit tables 3000
                                        set optimization aggressive
                                        set timeout { adaptive.start 0, adaptive.end 0 }
                                        set limit states 612000
                                        set limit src-nodes 612000
                                        
                                        #System aliases
                                        
                                        loopback = "{ lo0 }"
                                        MONTANADIGITAL = "{ em1 }"
                                        STAFFNETWORK = "{ em0_vlan69 }"
                                        GUESTNETWORK = "{ em0_vlan15 }"
                                        SOUNDTECH = "{ em0_vlan763 }"
                                        CENTURYLINK = "{ pppoe0 }"
                                        OpenVPN = "{ openvpn }"
                                        
                                        #SSH Lockout Table
                                        table <sshlockout>persist
                                        table <webconfiguratorlockout>persist
                                        #Snort tables
                                        table <snort2c>table <virusprot>table <bogons>persist file "/etc/bogons"
                                        table <vpn_networks>{ 172.21.16.0/24 }
                                        table <negate_networks>{ 172.21.16.0/24 }
                                        
                                        # User Aliases 
                                        table <badstuff>persist
                                        badstuff = "<badstuff>"
                                        blockedports = "{   31337  27374  6969  6881:6889 }"
                                        fastbucket = "{   443  53 }"
                                        midbucket = "{   5222:5223  5228:5230 }"
                                        slowbucket = "{   5050  5190  1863  6665:6669  6679:6697  5631:5632  5800  6891:6901  1725  2302  3074  88  3724  6112  20:22  110  143  465  587  993  995 }"
                                        
                                        # Gateways
                                        GWWANGW = " route-to ( em1 72.250.187.1 ) "
                                        GWCENTURYLINK_PPPOE = " route-to ( pppoe0 72.160.61.1 ) "
                                        GWbothDSL = "  route-to { ( em1 72.250.187.1 ) ( pppoe0 72.160.61.1 )  }  round-robin  "
                                        GWCenturyLinkPreferred = "  route-to { ( pppoe0 72.160.61.1 )  }  "
                                        
                                        set loginterface em0_vlan69
                                        
                                        set skip on pfsync0
                                        
                                        scrub on $MONTANADIGITAL all    fragment reassemble
                                        scrub on $STAFFNETWORK all    fragment reassemble
                                        scrub on $GUESTNETWORK all    fragment reassemble
                                        scrub on $SOUNDTECH all    fragment reassemble
                                        scrub on $CENTURYLINK all    fragment reassemble
                                        
                                        no nat proto carp
                                        no rdr proto carp
                                        nat-anchor "natearly/*"
                                        nat-anchor "natrules/*"
                                        
                                        # Outbound NAT rules
                                        
                                        # Subnets to NAT 
                                        tonatsubnets	= "{ 172.21.12.0/22 172.16.16.0/22 192.168.41.0/24 172.21.16.0/24 127.0.0.0/8 0.0.0.0  }"
                                        nat on $MONTANADIGITAL  from $tonatsubnets port 500 to any port 500 -> 72.250.187.21/32 port 500  
                                        nat on $MONTANADIGITAL  from $tonatsubnets to any -> 72.250.187.21/32 port 1024:65535  
                                        
                                        nat on $CENTURYLINK  from $tonatsubnets port 500 to any port 500 -> 72.160.61.87/32 port 500  
                                        nat on $CENTURYLINK  from $tonatsubnets to any -> 72.160.61.87/32 port 1024:65535  
                                        
                                        # Load balancing anchor
                                        rdr-anchor "relayd/*"
                                        # TFTP proxy
                                        rdr-anchor "tftp-proxy/*"
                                        # NAT Inbound Redirects
                                        rdr on em1 proto tcp from any to 72.250.187.21 port 8034 -> 172.21.12.34 port 80
                                        
                                        # Setup Squid proxy redirect
                                        no rdr on em0_vlan15 proto tcp from any to { 192.168.0.0/16, 172.16.0.0/12, 10.0.0.0/8 } port 80
                                        no rdr on em0_vlan15 proto tcp from any to { 172.21.12.0/22, 172.16.16.0/22, 192.168.41.0/24 } port 80
                                        rdr on em0_vlan15 proto tcp from any to !(em0_vlan15) port 80 -> 127.0.0.1 port 3128
                                        
                                        # UPnPd rdr anchor
                                        rdr-anchor "miniupnpd"
                                        
                                        anchor "relayd/*"
                                        anchor "openvpn/*"
                                        anchor "ipsec/*"
                                        # Block all IPv6
                                        block in log quick inet6 all label "Block all IPv6"
                                        block out log quick inet6 all label "Block all IPv6"
                                        #---------------------------------------------------------------------------
                                        # default deny rules
                                        #---------------------------------------------------------------------------
                                        block in log inet all label "Default deny rule IPv4"
                                        block out log inet all label "Default deny rule IPv4"
                                        block in log inet6 all label "Default deny rule IPv6"
                                        block out log inet6 all label "Default deny rule IPv6"
                                        
                                        # IPv6 ICMP is not auxilary, it is required for operation
                                        # See man icmp6(4)
                                        # 1    unreach         Destination unreachable
                                        # 2    toobig          Packet too big
                                        # 128  echoreq         Echo service request
                                        # 129  echorep         Echo service reply
                                        # 133  routersol       Router solicitation
                                        # 134  routeradv       Router advertisement
                                        # 135  neighbrsol      Neighbor solicitation
                                        # 136  neighbradv      Neighbor advertisement
                                        pass quick inet6 proto ipv6-icmp from any to any icmp6-type {1,2,135,136} keep state
                                        
                                        # Allow only bare essential icmpv6 packets (NS, NA, and RA, echoreq, echorep)
                                        pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type {129,133,134,135,136} keep state
                                        pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type {129,133,134,135,136} keep state
                                        pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type {128,133,134,135,136} keep state
                                        pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type {128,133,134,135,136} keep state
                                        pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type {128,133,134,135,136} keep state
                                        
                                        # We use the mighty pf, we cannot be fooled.
                                        block quick inet proto { tcp, udp } from any port = 0 to any
                                        block quick inet proto { tcp, udp } from any to any port = 0
                                        block quick inet6 proto { tcp, udp } from any port = 0 to any
                                        block quick inet6 proto { tcp, udp } from any to any port = 0
                                        
                                        # Snort package
                                        block quick from <snort2c>to any label "Block snort2c hosts"
                                        block quick from any to <snort2c>label "Block snort2c hosts"
                                        
                                        # SSH lockout
                                        block in log quick proto tcp from <sshlockout>to any port 22 label "sshlockout"
                                        
                                        # webConfigurator lockout
                                        block in log quick proto tcp from <webconfiguratorlockout>to any port 443 label "webConfiguratorlockout"
                                        block in quick from <virusprot>to any label "virusprot overload table"
                                        antispoof for em1
                                        antispoof for em0_vlan69
                                        # allow access to DHCP server on STAFFNETWORK
                                        pass in quick on $STAFFNETWORK proto udp from any port = 68 to 255.255.255.255 port = 67 label "allow access to DHCP server"
                                        pass in quick on $STAFFNETWORK proto udp from any port = 68 to 172.21.12.1 port = 67 label "allow access to DHCP server"
                                        pass out quick on $STAFFNETWORK proto udp from 172.21.12.1 port = 67 to any port = 68 label "allow access to DHCP server"
                                        antispoof for em0_vlan15
                                        # allow access to DHCP server on GUESTNETWORK
                                        pass in quick on $GUESTNETWORK proto udp from any port = 68 to 255.255.255.255 port = 67 label "allow access to DHCP server"
                                        pass in quick on $GUESTNETWORK proto udp from any port = 68 to 172.16.16.1 port = 67 label "allow access to DHCP server"
                                        pass out quick on $GUESTNETWORK proto udp from 172.16.16.1 port = 67 to any port = 68 label "allow access to DHCP server"
                                        antispoof for em0_vlan763
                                        # allow access to DHCP server on SOUNDTECH
                                        pass in quick on $SOUNDTECH proto udp from any port = 68 to 255.255.255.255 port = 67 label "allow access to DHCP server"
                                        pass in quick on $SOUNDTECH proto udp from any port = 68 to 192.168.41.1 port = 67 label "allow access to DHCP server"
                                        pass out quick on $SOUNDTECH proto udp from 192.168.41.1 port = 67 to any port = 68 label "allow access to DHCP server"
                                        antispoof for pppoe0
                                        
                                        # loopback
                                        pass in on $loopback inet all label "pass IPv4 loopback"
                                        pass out on $loopback inet all label "pass IPv4 loopback"
                                        pass in on $loopback inet6 all label "pass IPv6 loopback"
                                        pass out on $loopback inet6 all label "pass IPv6 loopback"
                                        # let out anything from the firewall host itself and decrypted IPsec traffic
                                        pass out inet all keep state allow-opts label "let out anything IPv4 from firewall host itself"
                                        pass out inet6 all keep state allow-opts label "let out anything IPv6 from firewall host itself"
                                        pass out route-to ( em1 72.250.187.1 ) from 72.250.187.21 to !72.250.187.0/24 keep state allow-opts label "let out anything from firewall host itself"
                                        pass out route-to ( pppoe0 72.160.61.1 ) from 72.160.61.87 to !72.160.61.87/32 keep state allow-opts label "let out anything from firewall host itself"
                                        # make sure the user cannot lock himself out of the webConfigurator or SSH
                                        pass in quick on em0_vlan69 proto tcp from any to (em0_vlan69) port { 443 80 22 } keep state label "anti-lockout rule"
                                        
                                        # User-defined rules follow
                                        
                                        anchor "userrules/*"
                                        pass  in  quick  on $OpenVPN  from any to any keep state  label "USER_RULE: OpenVPN Tech Remotes wizard"
                                        pass  in  quick  on $MONTANADIGITAL reply-to ( em1 72.250.187.1 ) inet proto tcp  from any to any port 443 flags S/SA keep state  label "USER_RULE"
                                        pass  in  quick  on $MONTANADIGITAL reply-to ( em1 72.250.187.1 ) inet proto tcp  from any to any port 22 flags S/SA keep state  label "USER_RULE"
                                        pass  in  quick  on $MONTANADIGITAL reply-to ( em1 72.250.187.1 ) inet proto { tcp udp }  from any to any port 1723 keep state  label "USER_RULE"
                                        pass  in  quick  on $MONTANADIGITAL reply-to ( em1 72.250.187.1 )  proto udp  from any to 72.250.187.21 port 1194 keep state  label "USER_RULE: OpenVPN Tech Remotes wizard"
                                        block  in  quick  on $STAFFNETWORK inet proto { tcp udp }  from any to any port $blockedports  label "USER_RULE"
                                        pass  in  quick  on $STAFFNETWORK inet proto { tcp udp }  from any  to <negate_networks>keep state  dnpipe ( 1,2)  label "NEGATE_ROUTE: Negate policy routing for destination"
                                        pass  in  quick  on $STAFFNETWORK  $GWbothDSL inet proto { tcp udp }  from any to any port $fastbucket keep state  dnpipe ( 1,2)  label "USER_RULE"
                                        pass  in  quick  on $STAFFNETWORK inet proto { tcp udp }  from any  to <negate_networks>keep state  dnpipe ( 3,4)  label "NEGATE_ROUTE: Negate policy routing for destination"
                                        pass  in  quick  on $STAFFNETWORK  $GWbothDSL inet proto { tcp udp }  from any to any port $midbucket keep state  dnpipe ( 3,4)  label "USER_RULE"
                                        pass  in  quick  on $STAFFNETWORK inet proto { tcp udp }  from any  to <negate_networks>keep state  dnpipe ( 5,6)  label "NEGATE_ROUTE: Negate policy routing for destination"
                                        pass  in  quick  on $STAFFNETWORK  $GWCenturyLinkPreferred inet proto { tcp udp }  from any to any port $slowbucket keep state  dnpipe ( 5,6)  label "USER_RULE"
                                        pass  in  quick  on $STAFFNETWORK inet from 172.21.12.0/22  to <negate_networks>keep state  dnpipe ( 1,2)  label "NEGATE_ROUTE: Negate policy routing for destination"
                                        pass  in  quick  on $STAFFNETWORK  $GWbothDSL inet from 172.21.12.0/22 to any keep state  dnpipe ( 1,2)  label "USER_RULE: Default allow LAN to any rule"
                                        pass  in  quick  on $STAFFNETWORK  $GWbothDSL inet from any to 172.21.12.0/22 keep state  label "USER_RULE: allow any to staff network"
                                        pass  in  quick  on $GUESTNETWORK inet proto { tcp udp }  from any to 172.21.12.0/22 keep state  label "USER_RULE"
                                        pass  in  quick  on $GUESTNETWORK inet proto { tcp udp }  from any to 172.16.16.1/22 keep state  label "USER_RULE"
                                        pass  in  quick  on $GUESTNETWORK inet proto { tcp udp }  from any  to <negate_networks>keep state  dnpipe ( 3,4)  label "NEGATE_ROUTE: Negate policy routing for destination"
                                        pass  in  quick  on $GUESTNETWORK  $GWbothDSL inet proto { tcp udp }  from any to any port $fastbucket keep state  dnpipe ( 3,4)  label "USER_RULE"
                                        pass  in  quick  on $GUESTNETWORK inet proto { tcp udp }  from any  to <negate_networks>keep state  dnpipe ( 5,6)  label "NEGATE_ROUTE: Negate policy routing for destination"
                                        pass  in  quick  on $GUESTNETWORK  $GWbothDSL inet proto { tcp udp }  from any to any port $midbucket keep state  dnpipe ( 5,6)  label "USER_RULE"
                                        pass  in  quick  on $GUESTNETWORK inet proto { tcp udp }  from any  to <negate_networks>keep state  dnpipe ( 7,8)  label "NEGATE_ROUTE: Negate policy routing for destination"
                                        pass  in  quick  on $GUESTNETWORK  $GWCenturyLinkPreferred inet proto { tcp udp }  from any to any port $slowbucket keep state  dnpipe ( 7,8)  label "USER_RULE"
                                        pass  in  quick  on $SOUNDTECH inet proto tcp  from any to 172.21.12.0/22 flags S/SA keep state  label "USER_RULE"
                                        pass  in  quick  on $SOUNDTECH inet proto { tcp udp }  from any to 192.168.41.1/24 keep state  label "USER_RULE"
                                        pass  in  quick  on $SOUNDTECH inet proto { tcp udp }  from any to any keep state  dnpipe ( 1,2)  label "USER_RULE"
                                        pass  in  quick  on $CENTURYLINK reply-to ( pppoe0 72.160.61.1 ) inet proto tcp  from any to any port 22 flags S/SA keep state  label "USER_RULE"
                                        pass  in  quick  on $CENTURYLINK reply-to ( pppoe0 72.160.61.1 ) inet proto tcp  from any to any port 443 flags S/SA keep state  label "USER_RULE"
                                        pass  in  quick  on $CENTURYLINK reply-to ( pppoe0 72.160.61.1 ) inet proto { tcp udp }  from any to any port 1723 keep state  label "USER_RULE"
                                        
                                        # Automatic Pass rules for any delegated IPv6 prefixes through dynamic IPv6 clients
                                        
                                        # VPN Rules
                                        anchor "tftp-proxy/*"
                                        
                                        # Setup squid pass rules for proxy
                                        pass in quick on em0_vlan15 proto tcp from any to !(em0_vlan15) port 80 flags S/SA keep state
                                        pass in quick on em0_vlan15 proto tcp from any to !(em0_vlan15) port 3128 flags S/SA keep state</negate_networks></negate_networks></negate_networks></negate_networks></negate_networks></negate_networks></negate_networks></virusprot></webconfiguratorlockout></sshlockout></snort2c></snort2c></badstuff></badstuff></negate_networks></vpn_networks></bogons></virusprot></snort2c></webconfiguratorlockout></sshlockout> 
                                        

                                        (I'm at the size limit I guess my post got cut short so I'll post config.xml in the next post)

                                        1 Reply Last reply Reply Quote 0
                                        • E
                                          eri--
                                          last edited by

                                          Use sites like pastie.org etc for posting text data

                                          1 Reply Last reply Reply Quote 0
                                          • M
                                            markuhde
                                            last edited by

                                            @ermal:

                                            Use sites like pastie.org etc for posting text data

                                            I tried that and config.xml was over their 64 K limit but here's a link to it as a document on Google Drive. Hopefully this is helpful:

                                            https://docs.google.com/document/d/13gilNZkUWH0sBi39visLSX4QUC5PlzmdF7-vraIwa6k/edit?usp=sharing

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.