opnsense vfs.read_max Increase UFS read-ahead speeds to match the state of hard drives and NCQ. net.inet.ip.portrange.first Set the ephemeral port range to be lower. net.inet.tcp.blackhole Drop packets to closed TCP ports without returning a RST net.inet.udp.blackhole Do not send ICMP port unreachable messages for closed UDP ports net.inet.ip.random_id Randomize the ID field in IP packets net.inet.ip.sourceroute Source routing is another way for an attacker to try to reach non-routable addresses behind your box. It can also be used to probe for information about your internal networks. These functions come enabled as part of the standard FreeBSD core system. net.inet.ip.accept_sourceroute Source routing is another way for an attacker to try to reach non-routable addresses behind your box. It can also be used to probe for information about your internal networks. These functions come enabled as part of the standard FreeBSD core system. net.inet.icmp.log_redirect This option turns off the logging of redirect packets because there is no limit and this could fill up your logs consuming your whole hard drive. net.inet.tcp.drop_synfin Drop SYN-FIN packets (breaks RFC1379, but nobody uses it anyway) net.inet6.ip6.redirect Enable sending IPv6 redirects net.inet6.ip6.use_tempaddr Enable privacy settings for IPv6 (RFC 4941) net.inet6.ip6.prefer_tempaddr Prefer privacy addresses and use them over the normal addresses net.inet.tcp.syncookies Generate SYN cookies for outbound SYN-ACK packets net.inet.tcp.recvspace Maximum incoming/outgoing TCP datagram size (receive) net.inet.tcp.sendspace Maximum incoming/outgoing TCP datagram size (send) net.inet.tcp.delayed_ack Do not delay ACK to try and piggyback it onto a data packet net.inet.udp.maxdgram Maximum outgoing UDP datagram size net.link.bridge.pfil_onlyip Handling of non-IP packets which are not passed to pfil (see if_bridge(4)) net.link.bridge.pfil_local_phys Set to 1 to additionally filter on the physical interface for locally destined packets net.link.bridge.pfil_member Set to 0 to disable filtering on the incoming and outgoing member interfaces. net.link.bridge.pfil_bridge Set to 1 to enable filtering on the bridge interface net.link.tap.user_open Allow unprivileged access to tap(4) device nodes kern.randompid Randomize PID's (see src/sys/kern/kern_fork.c: sysctl_kern_randompid()) hw.syscons.kbd_reboot Disable CTRL+ALT+Delete reboot from keyboard. net.inet.tcp.log_debug Enable TCP extended debugging net.inet.icmp.icmplim Set ICMP Limits net.inet.tcp.tso TCP Offload Engine net.inet.udp.checksum UDP Checksums kern.ipc.maxsockbuf Maximum socket buffer size vm.pmap.pti Page Table Isolation (Meltdown mitigation, requires reboot.) hw.ibrs_disable Disable Indirect Branch Restricted Speculation (Spectre V2 mitigation) security.bsd.see_other_gids Hide processes running as other groups security.bsd.see_other_uids Hide processes running as other users net.inet.ip.redirect Enable/disable sending of ICMP redirects in response to IP packets for which a better, and for the sender directly reachable, route and next hop is known. net.inet.icmp.drop_redirect 1 Redirect attacks are the purposeful mass-issuing of ICMP type 5 packets. In a normal network, redirects to the end stations should not be required. This option enables the NIC to drop all inbound ICMP redirect packets without returning a response. net.local.dgram.maxdgram Maximum outgoing UDP datagram size normal opnsense home 0 1999 admins system System Administrators page-all 0,2000 0 root 0 system $2y$11$c4SUQpuTdpAKxLtXChnanuO06m7Ro2rkjuHIsVQMD26oEV22MWGRW System Administrator 2000 gilles 0 user $2y$11$e9BIlxwYQUZ8b6P8qgZIAuMgg6Kb/7l8ZVVyex.VjNTmRWuZe05M6 gilles 2001 2000 Europe/Paris 0.opnsense.pool.ntp.org 1.opnsense.pool.ntp.org 2.opnsense.pool.ntp.org 3.opnsense.pool.ntp.org http 6607da87d5f1f Local Database yes 1 1 1 1 1 1 hadp hadp hadp monthly 1 1 admins 1 lan enabled 1 1 -1 -1 os-caddy,os-cpu-microcode-intel,os-ddclient,os-dmidecode,os-git-backup,os-hw-probe,os-mdns-repeater,os-qemu-guest-agent,os-upnp,os-wol,os-zabbix-agent 0 fr_FR 10.0.0.15 none none none none none none none none 115200 video 1 admins 10 1 https://gitea.maison43.duckdns.org/gilles/opnsense_backup.git main 1 gilles Misstibet5* 1 vtnet0 1 1 1 dhcp 32 SavedCfg 1 vtnet1 10.0.0.1 22 track6 64 wan 0 1 Boucle 1 lo0 127.0.0.1 ::1 8 128 none 1 1 WireGuard (Groupe) wireguard 1 1 group wg0 Wireguard 1 1 1 home hmac-md5 1 1 10.0.3.250 pxelinux.0 10.0.1.0 10.0.1.245 10.0.0.15 10.0.0.1 dc:a6:32:72:ef:ec 10.0.1.12 solar-assistant 10.0.0.1 60:57:18:99:ed:05 10.0.1.67 yoga ec:71:db:d9:4d:bf 10.0.1.192 RLC-410-5MP bc:24:11:1f:a5:bd 10.0.1.233 cosmos dc:54:75:a8:47:78 ecoflow 10.0.1.236 ecoflow 10:08:c1:39:e7:e7 10.0.1.241 lg-tv 80:97:1b:04:12:1e 10.0.1.243 apsystem_ECU_R 60:c5:a8:7f:5a:83 10.0.1.244 apsystem_ecur_wifi public automatic udp wan inet nat_6607f82b9ce888.05887649 1 10.0.0.222 51820 1 wan 51820 purenat root@10.0.1.0 /firewall_nat_edit.php made changes root@10.0.0.128 /firewall_nat_edit.php made changes udp wan inet nat_6607fafb218422.21849064 1 1 10.0.0.222 51821 1 wan 51821 purenat root@10.0.1.0 /firewall_nat_edit.php made changes root@10.0.0.128 /firewall_nat_edit.php made changes tcp wan inet nat_661bb8d6ef88f5.62438693 10.0.0.202 80 1 wanip 80 root@10.0.1.0 /firewall_nat_edit.php made changes root@10.0.1.0 /firewall_nat_edit.php made changes tcp wan inet Ssh nat_665da9805af827.84975328 10.0.0.141 22 1 wanip 2222 gilles@10.0.0.222 /firewall_nat_edit.php made changes root@10.0.0.11 /firewall_nat_edit.php made changes tcp wan inet nat_661bb8fa0a1542.18207141 10.0.0.202 443 1 wanip 443 root@10.0.1.0 /firewall_nat_edit.php made changes root@10.0.1.0 /firewall_nat_edit.php made changes udp wan inet nat_66249754bbbc23.12958361 10.0.1.231 4242 1 wanip 4242 root@10.0.1.97 /firewall_nat_edit.php made changes root@10.0.1.97 /firewall_nat_edit.php made changes nat_6607f82b9ce888.05887649 1 wan keep state udp inet
10.0.0.222
51820
root@10.0.0.128 /firewall_nat_edit.php made changes 1
nat_6607fafb218422.21849064 1 wan keep state udp inet
10.0.0.222
51821
1 root@10.0.0.128 /firewall_nat_edit.php made changes 1
pass wan inet keep state Allow client to connect to the Wireguard Service in 1 udp 1 wanip 51720 root@10.0.1.109 /firewall_rules_edit.php made changes root@10.0.1.0 /firewall_rules_edit.php made changes nat_661bb8d6ef88f5.62438693 1 wan keep state tcp inet
10.0.0.202
80
root@10.0.1.0 /firewall_nat_edit.php made changes
nat_661bb8fa0a1542.18207141 1 wan keep state tcp inet
10.0.0.202
443
root@10.0.1.0 /firewall_nat_edit.php made changes
nat_66249754bbbc23.12958361 1 wan keep state udp inet
10.0.1.231
4242
root@10.0.1.97 /firewall_nat_edit.php made changes
nat_665da9805af827.84975328 1 wan keep state tcp inet
10.0.0.141
22
Ssh root@10.0.0.11 /firewall_nat_edit.php made changes
pass lan inet keep state Default allow LAN to any rule in 1 1 1 root@10.0.1.0 /firewall_rules_edit.php made changes pass lan inet6 keep state Default allow LAN IPv6 to any rule in 1 1 lan 1 root@10.0.1.109 /firewall_rules_edit.php made changes pass lan inet keep state in 1 tcp/udp lan
10.0.0.15/32
53
root@10.0.1.109 /firewall_rules_edit.php made changes root@10.0.1.109 /firewall_rules_edit.php made changes
pass lan inet keep state in 1 lanip 1 root@10.0.1.0 /firewall_rules_edit.php made changes root@10.0.1.0 /firewall_rules_edit.php made changes 1 pass opt1 inet keep state in 1 1 1 root@10.0.1.0 /firewall_rules_edit.php made changes root@10.0.1.0 /firewall_rules_edit.php made changes wireguard any any 24 any 24 1360 in root@10.0.1.0 /firewall_scrub_edit.php made changes root@10.0.1.0 /firewall_scrub_edit.php made changes
ICMP icmp ICMP TCP tcp Generic TCP HTTP http Generic HTTP / 200 HTTPS https Generic HTTPS / 200 SMTP send Generic SMTP 220 * 0.opnsense.pool.ntp.org system_information-container:00000000-col1:show,cpu_usage-container:00000001-col1:show,services_status-container:00000002-col4:show,wireguard-container:00000003-col4:show,traffic_graphs-container:00000004-col4:show,dmidecode-container:00000005-col4:show,gateways-container:00000006-col6:show,interface_list-container:00000007-col6:show,interface_statistics-container:00000008-col6:show,log-container:00000009-col6:show 3 wan root@10.0.1.109 /system_general.php made changes 1 test SwIxZQLGVYIWKo6y0KXR5XsBEenaT/fBKC0yfjQ/rmw= 10.0.10.2/32 maison43.duckdns.org 51720 1 1 wireguard 0 voHbW40dMXGE5MPnMYEGjQr6zp2JvtnarHRJC4+PaUM= 6CwodBia347/qUqDazOyCCBuJjWysw37ZBuQR9CUWVA= 51720 10.0.10.0/24 0 2e6c1feb-c260-4084-845a-042e4174aa8d 0 0 0 16 32 4 1000 1 0 0 0 1 0 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 ipsec 0 1 IDS 0 0 0 * * * root ids update ids rule updates https://1106509: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@download.maxmind.com/geoip/databases/GeoLite2-Country-CSV/download?suffix=zip 1 Geoblocking geoip 1 CN BY RU lan,wan wan v9 0 1800 15 2000016 1 alert 2000013 1 alert 2000012 1 alert 2000011 1 alert 2000010 1 alert 2000009 1 alert 2000007 1 alert 2000006 1 alert 2000005 1 alert 2008054 1 alert 2008064 1 alert 2008065 1 alert 2009076 1 alert 2011307 1 alert 2011355 1 alert 2011765 1 alert 2012195 1 alert 2016918 1 alert abuse.ch.feodotracker.rules 1 opnsense.uncategorized.rules 1 opnsense.test.rules 1 opnsense.social_media.rules 1 opnsense.messaging.rules 1 opnsense.media_streaming.rules 1 opnsense.mail.rules 1 opnsense.file_transfer.rules 1 tor.rules 1 threatview_CS_c2.rules 1 emerging-worm.rules 1 emerging-web_specific_apps.rules 1 emerging-web_server.rules 1 emerging-web_client.rules 1 emerging-voip.rules 1 emerging-user_agents.rules 1 emerging-tftp.rules 1 emerging-telnet.rules 1 emerging-sql.rules 1 emerging-snmp.rules 1 emerging-smtp.rules 1 emerging-shellcode.rules 1 emerging-scan.rules 1 emerging-scada.rules 1 emerging-rpc.rules 1 emerging-pop3.rules 1 emerging-policy.rules 1 emerging-phishing.rules 1 emerging-p2p.rules 1 emerging-netbios.rules 1 emerging-mobile_malware.rules 1 emerging-misc.rules 1 emerging-malware.rules 1 emerging-ja3.rules 1 emerging-info.rules 1 emerging-inappropriate.rules 1 emerging-imap.rules 1 emerging-icmp_info.rules 1 emerging-icmp.rules 1 emerging-hunting.rules 1 emerging-games.rules 1 emerging-ftp.rules 1 emerging-exploit_kit.rules 1 emerging-exploit.rules 1 emerging-dos.rules 1 emerging-dns.rules 1 emerging-deleted.rules 1 emerging-current_events.rules 1 emerging-coinminer.rules 1 emerging-chat.rules 1 emerging-attack_response.rules 1 emerging-adware_pup.rules 1 emerging-activex.rules 1 dshield.rules 1 drop.rules 1 compromised.rules 1 ciarmy.rules 1 botcc.portgrouped.rules 1 botcc.rules 1 3coresec.rules 1 abuse.ch.urlhaus.rules 1 abuse.ch.threatfox.rules 1 abuse.ch.sslipblacklist.rules 1 abuse.ch.sslblacklist.rules 1 1 0 0 wan 192.168.0.0/16,10.0.0.0/8,172.16.0.0/12 363946bc-c1f3-445e-a761-245e3b81f579 W0D23 4 1 0 0 0 0 0 0 0 0 127.0.0.1 8000 0 0 4000 1 raw 0 2 0 0 4000 1 0 2 0 120 120 127.0.0.1 25 0 auto 1 0 root 2eWJ1KCbKrYL09TU9OrXqkomJyk 2812 5 1 0 root@localhost.local 0 1 $HOST system 300 30
19a7dae6-e858-415f-90b3-316fcee88d4f,6cfb26d0-a9eb-4db5-a4d8-2aab45f6fafd,17f136cd-5730-427e-82c7-5607afb399f5,28aade0b-0568-40aa-babd-24521bd2166a 1 RootFs filesystem / 300 30
a0773493-306b-43f6-b13b-d733bcd6d8ed 0 carp_status_change custom /usr/local/opnsense/scripts/monit/carp_status.php 300 30
c578b7db-4bb0-47aa-94ad-d9310feb90e7 0 gateway_alert custom /usr/local/opnsense/scripts/monit/gateway_alert.php 300 30
b11890a8-3088-4ce0-952e-5f2ada40d073 Ping NetworkPing failed ping alert NetworkLink NetworkInterface failed link alert NetworkSaturation NetworkInterface saturation is greater than 75% alert MemoryUsage SystemResource memory usage is greater than 75% alert CPUUsage SystemResource cpu usage is greater than 75% alert LoadAvg1 SystemResource loadavg (1min) is greater than 6 alert LoadAvg5 SystemResource loadavg (5min) is greater than 4.5 alert LoadAvg15 SystemResource loadavg (15min) is greater than 3 alert SpaceUsage SpaceUsage space usage is greater than 75% alert ChangedStatus ProgramStatus changed status alert NonZeroStatus ProgramStatus status != 0 alert 0 WAN_GW WAN Gateway wan inet 1 1 0 0 255 1 1 WAN_DHCP6 Interface WAN_DHCP6 Gateway wan inet6 0 0 1 0 0 0 0 254 1 1 1 31 0 53 0 0 0 1 0 0 0 0 0 transparent 0 1 1 0 0.0.0.0/8,10.0.0.0/8,100.64.0.0/10,169.254.0.0/16,172.16.0.0/12,192.0.2.0/24,192.168.0.0/16,198.18.0.0/15,198.51.100.0/24,203.0.113.0/24,233.252.0.0/24,::1/128,2001:db8::/32,fc00::/8,fd00::/8,fe80::/10 allow 0
1 1 0 300 opnsense 1 duckdns 0fd20557-743c-41da-858e-724143602751 maison43.duckdns.org 0 web_dyndns 10 1 300 wan Duckdns 0 0 1 lan 1 0 0 0 0 1 0 Zabbix agent
1 10.0.1.236 10050 0.0.0.0 0 100 val_3 0
3 5 100 100 3 1 10.0.1.236 120 0 0 0
-1 disabled 6607d788bf4eb Web GUI TLS certificate LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUhIakNDQlFhZ0F3SUJBZ0lVVndjK1BlYUltalhKK0FBYUdHRG9OM3BCVi9Zd0RRWUpLb1pJaHZjTkFRRUwKQlFBd2dZa3hIVEFiQmdOVkJBTU1GRTlRVG5ObGJuTmxMbXh2WTJGc1pHOXRZV2x1TVFzd0NRWURWUVFHRXdKTwpUREVWTUJNR0ExVUVDQXdNV25WcFpDMUliMnhzWVc1a01SVXdFd1lEVlFRSERBeE5hV1JrWld4b1lYSnVhWE14CkxUQXJCZ05WQkFvTUpFOVFUbk5sYm5ObElITmxiR1l0YzJsbmJtVmtJSGRsWWlCalpYSjBhV1pwWTJGMFpUQWUKRncweU5EQXpNekF3T1RFeU5ESmFGdzB5TlRBMU1ERXdPVEV5TkRKYU1JR0pNUjB3R3dZRFZRUUREQlJQVUU1egpaVzV6WlM1c2IyTmhiR1J2YldGcGJqRUxNQWtHQTFVRUJoTUNUa3d4RlRBVEJnTlZCQWdNREZwMWFXUXRTRzlzCmJHRnVaREVWTUJNR0ExVUVCd3dNVFdsa1pHVnNhR0Z5Ym1sek1TMHdLd1lEVlFRS0RDUlBVRTV6Wlc1elpTQnoKWld4bUxYTnBaMjVsWkNCM1pXSWdZMlZ5ZEdsbWFXTmhkR1V3Z2dJaU1BMEdDU3FHU0liM0RRRUJBUVVBQTRJQwpEd0F3Z2dJS0FvSUNBUUNMS3FLelg4QUVFcSs5MzNlUm1qTC9hdW5DMXZOaVlkVkZ4Y214OGJEd09YNG90cWJNCnk2dmIwSlZxVDQvSTFlZ2h0L05iL2ZEVGtoT3RtRmFjd0ZtRWthNGwrUlptbUN3a1p1Ukl0NldQcXpnZkhSc3MKY01LbmltSHR4OXJvd3FVa1VKNHpWZHdwcitGS08wRmYrOFdoT0xVWWdwN2c1TEhRNnpTNE9kSzlqSWNYdHJxNwpvOXVEOXBVN3d6cmZWNm9oT0FzYTdtVXdVQUlJeXVNT3Q4RXFiUzlOcTVLVEJZVDAyekV6MzRaYkZGM0ZOMGRxCnpVYXd6ZWd5ODFYSWVNeldhaG1OdTBNWWtMSlRrRjE4ZHhaN25zdXFqOW85TlpNckZTYnU1eVVJSnQxWG9Bc3AKaGN0VERQR1RzRjZFS2hFL3FyS2F1ZFVKeVN3eWNuS2VLNzhxRkEvNWVscjk4VzFWUXZhRlVOcHRGUFVObjJVWQpkUkZMNnVVUDJtNjhicG1rRktVN2ZTM2MvTEVvZHRNS3B1K2s4MGVLVEpDVWFNZnluMnpzSTV4M01Xd1dYYTRaCnZ0RFdxZEFiemF3aUNrVVVtRVZ6cVFtYVJFM3QyR1ZqR0Z0eTl4MXo5cFF1YSttSUs4VWxBdVdka20zc1pveHcKOXk0Z3dveU9oL2VCdjNjeHE3VC9kRUp1TUx4cFc1OEZ1cGMzajVhNEVqcnJJWXR3NGIrdVk5eDZuU3FLUklCZQpGZWU3L2ovbWtBUUV1Y1lsZkYrK3hiL3NGbVhQUEdkMmhwWFVYdmpDaTRQSUlxUWt3WlMzUlRlMVVtVE93OS84ClQ4VHluSHNnZ0h1WjRUK2dMSXFTZFhNd0JaNWtvaXJUSzVWUXFsNU5oZmdFcTAvenRTR1dLL2Zla3dJREFRQUIKbzRJQmVqQ0NBWFl3Q1FZRFZSMFRCQUl3QURBUkJnbGdoa2dCaHZoQ0FRRUVCQU1DQmtBd05BWUpZSVpJQVliNApRZ0VOQkNjV0pVOVFUbk5sYm5ObElFZGxibVZ5WVhSbFpDQlRaWEoyWlhJZ1EyVnlkR2xtYVdOaGRHVXdIUVlEClZSME9CQllFRkZZZE9vcWVmcWJLZmRocCs5ZjlRRy9IVGtSdk1JR3pCZ05WSFNNRWdhc3dnYWloZ1kra2dZd3cKZ1lreEhUQWJCZ05WQkFNTUZFOVFUbk5sYm5ObExteHZZMkZzWkc5dFlXbHVNUXN3Q1FZRFZRUUdFd0pPVERFVgpNQk1HQTFVRUNBd01XblZwWkMxSWIyeHNZVzVrTVJVd0V3WURWUVFIREF4TmFXUmtaV3hvWVhKdWFYTXhMVEFyCkJnTlZCQW9NSkU5UVRuTmxibk5sSUhObGJHWXRjMmxuYm1Wa0lIZGxZaUJqWlhKMGFXWnBZMkYwWllJVVZ3YysKUGVhSW1qWEorQUFhR0dEb04zcEJWL1l3SFFZRFZSMGxCQll3RkFZSUt3WUJCUVVIQXdFR0NDc0dBUVVGQ0FJQwpNQXNHQTFVZER3UUVBd0lGb0RBZkJnTlZIUkVFR0RBV2doUlBVRTV6Wlc1elpTNXNiMk5oYkdSdmJXRnBiakFOCkJna3Foa2lHOXcwQkFRc0ZBQU9DQWdFQUk0ZVROdDBhdGJ2ZE94alliVXR4YnlKWWt1VTh3cnphaGI3ZGJSdm8Kcnd1alBrT2t2c2gyUjlYMW1IOFFhamhVMlRSMCticER0eTNWRk9oQnpMbjhhWUI3RHZUcmFGSG9hVHFiVitTYQpLRmsxRDdNRk1SaGVHZG9IZnRNTG5GR2syazE2RkVkYUF0ZXhFMnJqclVINzJrNERuZDlsOTBYaG02LzV4d0JSCkJnellJS1VJN0V5KzhIb29JQjFDYWh2Tng5Q052ZXhyQkZLZU01VGtKYm1lY2ZqaDgwZGdlOU1MdnNTQVAxdWkKcDBoM21QN00zMElHanVzQWdna3lmVGE5THZ5UWhOWnNsdDU3QWtuWTFQaFFBRVozRkdTVFp1NllFTDZYNVh5VgpibVU1ckxQbDl1aEQzVkk5MnNRd0hOMFRTVHc3WGhsai9sa2h2L3JUeXdNRGZjNnROTWlHRmFyczJ1cnk2MnhyCkhNNHlYZEJLU1BnbUg1MEJVYitLZnUwa1N2VTNYNlI2Uzdxa25mNWtJN0IyNy9EY29Sc2VnN1FTeGl4RUQvbzAKYkRDMTlncTArWUw3WE85cit2dGNFOGk2SVB4MFZPWnVXbldyZCt5NEMxMVpPVHdjbi83S3I4ZWhxNm16WkFhdQpxTHFSeGhHTG5ER0dYazBZNS9EZUM0T01XUWk5U01DQXU3TkROekFGN2l0Z2pKczVwUVE5UzdBeExpYzlvajR1ClhZVjBZUlBQMk9nV09oVFYwblRpNVZaRUZLUlJsU0RvbmhmSlhicXVvaHNveUZsbURmbGdYU2RlR2tZOGdnWEUKRGhKTS9IekoreUhXcmpPaWg1TDZMaTBpM2g5M2tmRStaY1NtWVo2THJmQTZLeXpZTWhyclhuMDZ1bnRyc3MrbQpDWlU9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K 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 6607da87d5f1f Web GUI TLS certificate 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 0 0 10 h1,h2 10 ipv4 0 1 1 1 1 0 0 0 0 0 0 0 0 home 0 0 0 1 0 1 0 0 1 homeassistant home 0 10.0.0.2 0 lxc-mariadb home 0 10.0.0.14 0 vm-ansible home 0 10.0.1.11 0 vm-docker home 0 10.0.0.8 0 vm-docker0 home 0 10.0.0.212 0 vm-docker10 home 0 10.0.0.20 0 vm-docker13 home 0 10.0.1.98 0 vm-docker2 home 0 10.0.0.26 0 vm-docker3 home 0 10.0.1.98 0 vm-frigate home 0 10.0.0.206 0 vm-gitlab home 0 10.0.0.200 0 vm-jellyfin home 0 10.0.0.33 0 vm-mediaserver home 0 10.0.0.29 0 vm-mesdata home 0 10.0.0.34 0 vm-mqtt home 0 10.0.0.3 0 vm-nodered home 0 10.0.0.9 0 vm-vaultwarden home 0 10.0.0.16 0 vm-weewx home 0 10.0.0.13 0 vm-wireguard home 0 10.0.0.11 0 vm-ytubedl home 0 10.0.0.210 0 1 1 1 wan lan 0 0 1400 0