1115 lines
56 KiB
XML
1115 lines
56 KiB
XML
|
<?xml version="1.0"?>
|
||
|
<opnsense>
|
||
|
<theme>opnsense</theme>
|
||
|
<sysctl>
|
||
|
<item>
|
||
|
<descr>Disable the pf ftp proxy handler.</descr>
|
||
|
<tunable>debug.pfftpproxy</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>Increase UFS read-ahead speeds to match the state of hard drives and NCQ.</descr>
|
||
|
<tunable>vfs.read_max</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>Set the ephemeral port range to be lower.</descr>
|
||
|
<tunable>net.inet.ip.portrange.first</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>Drop packets to closed TCP ports without returning a RST</descr>
|
||
|
<tunable>net.inet.tcp.blackhole</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>Do not send ICMP port unreachable messages for closed UDP ports</descr>
|
||
|
<tunable>net.inet.udp.blackhole</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>Randomize the ID field in IP packets (default is 0: sequential IP IDs)</descr>
|
||
|
<tunable>net.inet.ip.random_id</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>
|
||
|
Source routing is another way for an attacker to try to reach non-routable addresses behind your box.
|
||
|
It can also be used to probe for information about your internal networks. These functions come enabled
|
||
|
as part of the standard FreeBSD core system.
|
||
|
</descr>
|
||
|
<tunable>net.inet.ip.sourceroute</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>
|
||
|
Source routing is another way for an attacker to try to reach non-routable addresses behind your box.
|
||
|
It can also be used to probe for information about your internal networks. These functions come enabled
|
||
|
as part of the standard FreeBSD core system.
|
||
|
</descr>
|
||
|
<tunable>net.inet.ip.accept_sourceroute</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>
|
||
|
Redirect attacks are the purposeful mass-issuing of ICMP type 5 packets. In a normal network, redirects
|
||
|
to the end stations should not be required. This option enables the NIC to drop all inbound ICMP redirect
|
||
|
packets without returning a response.
|
||
|
</descr>
|
||
|
<tunable>net.inet.icmp.drop_redirect</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>
|
||
|
This option turns off the logging of redirect packets because there is no limit and this could fill
|
||
|
up your logs consuming your whole hard drive.
|
||
|
</descr>
|
||
|
<tunable>net.inet.icmp.log_redirect</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>Drop SYN-FIN packets (breaks RFC1379, but nobody uses it anyway)</descr>
|
||
|
<tunable>net.inet.tcp.drop_synfin</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>Enable sending IPv4 redirects</descr>
|
||
|
<tunable>net.inet.ip.redirect</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>Enable sending IPv6 redirects</descr>
|
||
|
<tunable>net.inet6.ip6.redirect</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>Enable privacy settings for IPv6 (RFC 4941)</descr>
|
||
|
<tunable>net.inet6.ip6.use_tempaddr</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>Prefer privacy addresses and use them over the normal addresses</descr>
|
||
|
<tunable>net.inet6.ip6.prefer_tempaddr</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>Generate SYN cookies for outbound SYN-ACK packets</descr>
|
||
|
<tunable>net.inet.tcp.syncookies</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>Maximum incoming/outgoing TCP datagram size (receive)</descr>
|
||
|
<tunable>net.inet.tcp.recvspace</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>Maximum incoming/outgoing TCP datagram size (send)</descr>
|
||
|
<tunable>net.inet.tcp.sendspace</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>Do not delay ACK to try and piggyback it onto a data packet</descr>
|
||
|
<tunable>net.inet.tcp.delayed_ack</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>Maximum outgoing UDP datagram size</descr>
|
||
|
<tunable>net.inet.udp.maxdgram</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>Handling of non-IP packets which are not passed to pfil (see if_bridge(4))</descr>
|
||
|
<tunable>net.link.bridge.pfil_onlyip</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>Set to 1 to additionally filter on the physical interface for locally destined packets</descr>
|
||
|
<tunable>net.link.bridge.pfil_local_phys</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>Set to 0 to disable filtering on the incoming and outgoing member interfaces.</descr>
|
||
|
<tunable>net.link.bridge.pfil_member</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>Set to 1 to enable filtering on the bridge interface</descr>
|
||
|
<tunable>net.link.bridge.pfil_bridge</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>Allow unprivileged access to tap(4) device nodes</descr>
|
||
|
<tunable>net.link.tap.user_open</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>Randomize PID's (see src/sys/kern/kern_fork.c: sysctl_kern_randompid())</descr>
|
||
|
<tunable>kern.randompid</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>Maximum size of the IP input queue</descr>
|
||
|
<tunable>net.inet.ip.intr_queue_maxlen</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>Disable CTRL+ALT+Delete reboot from keyboard.</descr>
|
||
|
<tunable>hw.syscons.kbd_reboot</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>Enable TCP extended debugging</descr>
|
||
|
<tunable>net.inet.tcp.log_debug</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>Set ICMP Limits</descr>
|
||
|
<tunable>net.inet.icmp.icmplim</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>TCP Offload Engine</descr>
|
||
|
<tunable>net.inet.tcp.tso</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>UDP Checksums</descr>
|
||
|
<tunable>net.inet.udp.checksum</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>Maximum socket buffer size</descr>
|
||
|
<tunable>kern.ipc.maxsockbuf</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>Page Table Isolation (Meltdown mitigation, requires reboot.)</descr>
|
||
|
<tunable>vm.pmap.pti</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>Disable Indirect Branch Restricted Speculation (Spectre V2 mitigation)</descr>
|
||
|
<tunable>hw.ibrs_disable</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>Hide processes running as other groups</descr>
|
||
|
<tunable>security.bsd.see_other_gids</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
<item>
|
||
|
<descr>Hide processes running as other users</descr>
|
||
|
<tunable>security.bsd.see_other_uids</tunable>
|
||
|
<value>default</value>
|
||
|
</item>
|
||
|
</sysctl>
|
||
|
<system>
|
||
|
<optimization>normal</optimization>
|
||
|
<hostname>fw</hostname>
|
||
|
<domain>nuestrared.org</domain>
|
||
|
<dnsallowoverride>on</dnsallowoverride>
|
||
|
<group>
|
||
|
<name>admins</name>
|
||
|
<description>System Administrators</description>
|
||
|
<scope>system</scope>
|
||
|
<gid>1999</gid>
|
||
|
<member>0</member>
|
||
|
<priv>page-all</priv>
|
||
|
</group>
|
||
|
<user>
|
||
|
<name>root</name>
|
||
|
<descr>System Administrator</descr>
|
||
|
<scope>system</scope>
|
||
|
<groupname>admins</groupname>
|
||
|
<password>$2y$10$eE36wle/4Ma00KlIY62XzO8dvMPlJCsY5H2H8J/Ej2crzlPEjtvWq</password>
|
||
|
<uid>0</uid>
|
||
|
</user>
|
||
|
<nextuid>2000</nextuid>
|
||
|
<nextgid>2000</nextgid>
|
||
|
<timezone>America/Bogota</timezone>
|
||
|
<timeservers>0.opnsense.pool.ntp.org 1.opnsense.pool.ntp.org 2.opnsense.pool.ntp.org 3.opnsense.pool.ntp.org</timeservers>
|
||
|
<webgui>
|
||
|
<protocol>https</protocol>
|
||
|
<ssl-certref>5c7caf43d381f</ssl-certref>
|
||
|
<port>8443</port>
|
||
|
<ssl-ciphers/>
|
||
|
<interfaces/>
|
||
|
<compression>5</compression>
|
||
|
<nohttpreferercheck>1</nohttpreferercheck>
|
||
|
</webgui>
|
||
|
<disablenatreflection>yes</disablenatreflection>
|
||
|
<usevirtualterminal>1</usevirtualterminal>
|
||
|
<disableconsolemenu>1</disableconsolemenu>
|
||
|
<disablevlanhwfilter>2</disablevlanhwfilter>
|
||
|
<disablechecksumoffloading>1</disablechecksumoffloading>
|
||
|
<disablesegmentationoffloading>1</disablesegmentationoffloading>
|
||
|
<disablelargereceiveoffloading>1</disablelargereceiveoffloading>
|
||
|
<ipv6allow/>
|
||
|
<powerd_ac_mode>hadp</powerd_ac_mode>
|
||
|
<powerd_battery_mode>hadp</powerd_battery_mode>
|
||
|
<powerd_normal_mode>hadp</powerd_normal_mode>
|
||
|
<bogons>
|
||
|
<interval>monthly</interval>
|
||
|
</bogons>
|
||
|
<kill_states/>
|
||
|
<backupcount>60</backupcount>
|
||
|
<crypto_hardware>aesni</crypto_hardware>
|
||
|
<pf_share_forward>1</pf_share_forward>
|
||
|
<lb_use_sticky>1</lb_use_sticky>
|
||
|
<ssh>
|
||
|
<group>admins</group>
|
||
|
<noauto>1</noauto>
|
||
|
<interfaces/>
|
||
|
<enabled>enabled</enabled>
|
||
|
<port>2222</port>
|
||
|
</ssh>
|
||
|
<backup>
|
||
|
<nextcloud version="1.0.0">
|
||
|
<enabled>0</enabled>
|
||
|
<url/>
|
||
|
<user/>
|
||
|
<password/>
|
||
|
<password_encryption/>
|
||
|
<backupdir>OPNsense-Backup</backupdir>
|
||
|
</nextcloud>
|
||
|
</backup>
|
||
|
<dnsserver>192.168.100.1</dnsserver>
|
||
|
<dnsserver>8.8.8.8</dnsserver>
|
||
|
<language>en_US</language>
|
||
|
<firmware>
|
||
|
<plugins>os-arp-scan,os-pppoe,os-acme-client,os-freeradius,os-iperf</plugins>
|
||
|
</firmware>
|
||
|
<authserver>
|
||
|
<refid>5c7ca8d772787</refid>
|
||
|
<type>radius</type>
|
||
|
<name>RadiusAuthNosRed</name>
|
||
|
<host>10.132.1.1</host>
|
||
|
<radius_secret>nw2gqat60</radius_secret>
|
||
|
<radius_timeout>5</radius_timeout>
|
||
|
<radius_auth_port>1812</radius_auth_port>
|
||
|
<radius_acct_port>1813</radius_acct_port>
|
||
|
</authserver>
|
||
|
<authserver>
|
||
|
<refid>5c7ca90c59ead</refid>
|
||
|
<type>voucher</type>
|
||
|
<name>VaucherAuthNosred</name>
|
||
|
<simplePasswords>1</simplePasswords>
|
||
|
<usernameLength/>
|
||
|
<passwordLength/>
|
||
|
</authserver>
|
||
|
<serialspeed>115200</serialspeed>
|
||
|
<primaryconsole>video</primaryconsole>
|
||
|
</system>
|
||
|
<interfaces>
|
||
|
<wan>
|
||
|
<if>vtnet0</if>
|
||
|
<descr/>
|
||
|
<enable>1</enable>
|
||
|
<lock>1</lock>
|
||
|
<spoofmac/>
|
||
|
<blockbogons>1</blockbogons>
|
||
|
<ipaddr>192.168.100.254</ipaddr>
|
||
|
<subnet>24</subnet>
|
||
|
<gateway>GW_WAN</gateway>
|
||
|
</wan>
|
||
|
<lan>
|
||
|
<if>vtnet1</if>
|
||
|
<descr/>
|
||
|
<enable>1</enable>
|
||
|
<lock>1</lock>
|
||
|
<spoofmac/>
|
||
|
<ipaddr>10.132.1.1</ipaddr>
|
||
|
<subnet>16</subnet>
|
||
|
</lan>
|
||
|
</interfaces>
|
||
|
<dhcpd>
|
||
|
<lan>
|
||
|
<enable>1</enable>
|
||
|
<domain>nuestrared.org</domain>
|
||
|
<ddnsdomainalgorithm>hmac-md5</ddnsdomainalgorithm>
|
||
|
<numberoptions>
|
||
|
<item/>
|
||
|
</numberoptions>
|
||
|
<range>
|
||
|
<from>10.132.60.10</from>
|
||
|
<to>10.132.80.245</to>
|
||
|
</range>
|
||
|
<winsserver/>
|
||
|
<dnsserver/>
|
||
|
<ntpserver/>
|
||
|
</lan>
|
||
|
</dhcpd>
|
||
|
<unbound>
|
||
|
<enable>on</enable>
|
||
|
<domainoverrides>
|
||
|
<domain>nuestrared.org</domain>
|
||
|
<ip>10.132.1.2</ip>
|
||
|
<descr>Domain nuestrared</descr>
|
||
|
</domainoverrides>
|
||
|
<hosts>
|
||
|
<host>fw</host>
|
||
|
<domain>nuestrared.org</domain>
|
||
|
<rr>A</rr>
|
||
|
<ip>10.132.1.1</ip>
|
||
|
<mxprio/>
|
||
|
<mx/>
|
||
|
<descr>Firewall NuestraRED.org</descr>
|
||
|
</hosts>
|
||
|
</unbound>
|
||
|
<snmpd>
|
||
|
<syslocation/>
|
||
|
<syscontact/>
|
||
|
<rocommunity>public</rocommunity>
|
||
|
</snmpd>
|
||
|
<syslog>
|
||
|
<reverse/>
|
||
|
</syslog>
|
||
|
<nat>
|
||
|
<outbound>
|
||
|
<mode>automatic</mode>
|
||
|
</outbound>
|
||
|
<rule/>
|
||
|
</nat>
|
||
|
<filter>
|
||
|
<rule>
|
||
|
<type>pass</type>
|
||
|
<ipprotocol>inet</ipprotocol>
|
||
|
<descr>Default allow LAN to any rule</descr>
|
||
|
<interface>lan</interface>
|
||
|
<source>
|
||
|
<network>lan</network>
|
||
|
</source>
|
||
|
<destination>
|
||
|
<any/>
|
||
|
</destination>
|
||
|
</rule>
|
||
|
<rule>
|
||
|
<type>pass</type>
|
||
|
<ipprotocol>inet6</ipprotocol>
|
||
|
<descr>Default allow LAN IPv6 to any rule</descr>
|
||
|
<interface>lan</interface>
|
||
|
<source>
|
||
|
<network>lan</network>
|
||
|
</source>
|
||
|
<destination>
|
||
|
<any/>
|
||
|
</destination>
|
||
|
</rule>
|
||
|
</filter>
|
||
|
<rrd>
|
||
|
<enable/>
|
||
|
</rrd>
|
||
|
<load_balancer>
|
||
|
<monitor_type>
|
||
|
<name>ICMP</name>
|
||
|
<type>icmp</type>
|
||
|
<descr>ICMP</descr>
|
||
|
<options/>
|
||
|
</monitor_type>
|
||
|
<monitor_type>
|
||
|
<name>TCP</name>
|
||
|
<type>tcp</type>
|
||
|
<descr>Generic TCP</descr>
|
||
|
<options/>
|
||
|
</monitor_type>
|
||
|
<monitor_type>
|
||
|
<name>HTTP</name>
|
||
|
<type>http</type>
|
||
|
<descr>Generic HTTP</descr>
|
||
|
<options>
|
||
|
<path>/</path>
|
||
|
<host/>
|
||
|
<code>200</code>
|
||
|
</options>
|
||
|
</monitor_type>
|
||
|
<monitor_type>
|
||
|
<name>HTTPS</name>
|
||
|
<type>https</type>
|
||
|
<descr>Generic HTTPS</descr>
|
||
|
<options>
|
||
|
<path>/</path>
|
||
|
<host/>
|
||
|
<code>200</code>
|
||
|
</options>
|
||
|
</monitor_type>
|
||
|
<monitor_type>
|
||
|
<name>SMTP</name>
|
||
|
<type>send</type>
|
||
|
<descr>Generic SMTP</descr>
|
||
|
<options>
|
||
|
<send/>
|
||
|
<expect>220 *</expect>
|
||
|
</options>
|
||
|
</monitor_type>
|
||
|
</load_balancer>
|
||
|
<ntpd>
|
||
|
<prefer>0.opnsense.pool.ntp.org</prefer>
|
||
|
<statsgraph>on</statsgraph>
|
||
|
<interface>lan</interface>
|
||
|
</ntpd>
|
||
|
<widgets>
|
||
|
<sequence>system_information-container:00000000-col3:show,services_status-container:00000001-col4:show,gateways-container:00000002-col4:show,interface_list-container:00000003-col4:show</sequence>
|
||
|
<column_count>2</column_count>
|
||
|
</widgets>
|
||
|
<revision>
|
||
|
<username>root@10.132.1.10</username>
|
||
|
<time>1554439445.3676</time>
|
||
|
<description>/api/captiveportal/settings/addZone/ made changes</description>
|
||
|
</revision>
|
||
|
<OPNsense>
|
||
|
<Firewall>
|
||
|
<Alias version="1.0.0">
|
||
|
<aliases/>
|
||
|
</Alias>
|
||
|
</Firewall>
|
||
|
<IDS version="1.0.2">
|
||
|
<rules/>
|
||
|
<userDefinedRules/>
|
||
|
<files/>
|
||
|
<fileTags/>
|
||
|
<general>
|
||
|
<enabled>0</enabled>
|
||
|
<ips>0</ips>
|
||
|
<promisc>0</promisc>
|
||
|
<interfaces>wan</interfaces>
|
||
|
<homenet>192.168.0.0/16,10.0.0.0/8,172.16.0.0/12</homenet>
|
||
|
<defaultPacketSize/>
|
||
|
<UpdateCron/>
|
||
|
<AlertLogrotate>W0D23</AlertLogrotate>
|
||
|
<AlertSaveLogs>4</AlertSaveLogs>
|
||
|
<MPMAlgo>ac</MPMAlgo>
|
||
|
<syslog>0</syslog>
|
||
|
<LogPayload>0</LogPayload>
|
||
|
</general>
|
||
|
</IDS>
|
||
|
<OpenVPNExport version="0.0.1">
|
||
|
<servers/>
|
||
|
</OpenVPNExport>
|
||
|
<TrafficShaper version="1.0.2">
|
||
|
<pipes/>
|
||
|
<queues/>
|
||
|
<rules/>
|
||
|
</TrafficShaper>
|
||
|
<ARPscanner version="1.0.0">
|
||
|
<general>
|
||
|
<interface>lan</interface>
|
||
|
<networks/>
|
||
|
</general>
|
||
|
</ARPscanner>
|
||
|
<freeradius>
|
||
|
<eap version="1.0.0">
|
||
|
<default_eap_type>md5</default_eap_type>
|
||
|
<enable_client_cert>0</enable_client_cert>
|
||
|
<ca/>
|
||
|
<certificate/>
|
||
|
<crl/>
|
||
|
</eap>
|
||
|
<ldap version="1.0.0">
|
||
|
<protocol>LDAPS</protocol>
|
||
|
<server/>
|
||
|
<identity/>
|
||
|
<password/>
|
||
|
<base_dn>dc=example,dc=domain,dc=com</base_dn>
|
||
|
<user_filter>(uid=%{%{Stripped-User-Name}:-%{User-Name}})</user_filter>
|
||
|
<group_filter>(objectClass=posixGroup)</group_filter>
|
||
|
</ldap>
|
||
|
<client version="1.0.0">
|
||
|
<clients>
|
||
|
<client uuid="5931ccc1-8b3a-4cd5-831b-d9bd5906e984">
|
||
|
<enabled>1</enabled>
|
||
|
<name>authnosred</name>
|
||
|
<secret>nw2gqat60</secret>
|
||
|
<ip>10.132.0.0/16</ip>
|
||
|
</client>
|
||
|
</clients>
|
||
|
</client>
|
||
|
<general version="1.0.0">
|
||
|
<enabled>1</enabled>
|
||
|
<vlanassign>0</vlanassign>
|
||
|
<ldap_enabled>0</ldap_enabled>
|
||
|
<wispr>1</wispr>
|
||
|
<chillispot>1</chillispot>
|
||
|
<mikrotik>1</mikrotik>
|
||
|
<sqlite>1</sqlite>
|
||
|
<sessionlimit>1</sessionlimit>
|
||
|
<log_destination>files</log_destination>
|
||
|
<log_authentication_request>1</log_authentication_request>
|
||
|
<log_authbadpass>1</log_authbadpass>
|
||
|
<log_authgoodpass>1</log_authgoodpass>
|
||
|
</general>
|
||
|
<user version="1.0.2">
|
||
|
<users>
|
||
|
<user uuid="f735861a-7bfd-4c2c-a6a1-2450b346f29e">
|
||
|
<enabled>1</enabled>
|
||
|
<username>kleper</username>
|
||
|
<password>ferkaton76</password>
|
||
|
<description>Usuario Kleper</description>
|
||
|
<ip/>
|
||
|
<subnet/>
|
||
|
<route/>
|
||
|
<ip6/>
|
||
|
<vlan/>
|
||
|
<logintime/>
|
||
|
<simuse/>
|
||
|
<wispr_bw_min_up/>
|
||
|
<wispr_bw_max_up/>
|
||
|
<wispr_bw_min_down/>
|
||
|
<wispr_bw_max_down/>
|
||
|
<chillispot_bw_max_up/>
|
||
|
<chillispot_bw_max_down/>
|
||
|
<mikrotik_vlan_id_number/>
|
||
|
<mikrotik_vlan_id_type/>
|
||
|
<sessionlimit_max_session_limit/>
|
||
|
</user>
|
||
|
</users>
|
||
|
</user>
|
||
|
</freeradius>
|
||
|
<Netflow version="1.0.0">
|
||
|
<capture>
|
||
|
<interfaces>lan</interfaces>
|
||
|
<egress_only>wan</egress_only>
|
||
|
<version>v9</version>
|
||
|
<targets/>
|
||
|
</capture>
|
||
|
<collect>
|
||
|
<enable>0</enable>
|
||
|
</collect>
|
||
|
</Netflow>
|
||
|
<cron version="1.0.1">
|
||
|
<jobs>
|
||
|
<job uuid="99c58055-2319-49fe-b941-ad1030604bcf">
|
||
|
<origin>AcmeClient</origin>
|
||
|
<enabled>1</enabled>
|
||
|
<minutes>0</minutes>
|
||
|
<hours>0</hours>
|
||
|
<days>*</days>
|
||
|
<months>*</months>
|
||
|
<weekdays>*</weekdays>
|
||
|
<who>root</who>
|
||
|
<command>acmeclient cron-auto-renew</command>
|
||
|
<parameters/>
|
||
|
<description>AcmeClient Cronjob for Certificate AutoRenewal</description>
|
||
|
</job>
|
||
|
</jobs>
|
||
|
</cron>
|
||
|
<AcmeClient version="1.5.0">
|
||
|
<settings>
|
||
|
<enabled>1</enabled>
|
||
|
<autoRenewal>1</autoRenewal>
|
||
|
<UpdateCron>99c58055-2319-49fe-b941-ad1030604bcf</UpdateCron>
|
||
|
<environment>prod</environment>
|
||
|
<challengePort>43580</challengePort>
|
||
|
<restartTimeout>600</restartTimeout>
|
||
|
<haproxyIntegration>0</haproxyIntegration>
|
||
|
<haproxyAclRef/>
|
||
|
<haproxyActionRef/>
|
||
|
<haproxyServerRef/>
|
||
|
<haproxyBackendRef/>
|
||
|
<logLevel>normal</logLevel>
|
||
|
</settings>
|
||
|
<accounts>
|
||
|
<account uuid="e49750e6-4d42-4047-94e7-abed03a2075a">
|
||
|
<id>5c7cab505cb087.20055669</id>
|
||
|
<enabled>1</enabled>
|
||
|
<name>NuestraRED.org</name>
|
||
|
<description>Acme NuestraRED Firewall</description>
|
||
|
<email>correo@nuestrared.org</email>
|
||
|
<certificateAuthority>letsencrypt</certificateAuthority>
|
||
|
<key>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
|
||
|
<lastUpdate>1551674297</lastUpdate>
|
||
|
</account>
|
||
|
</accounts>
|
||
|
<certificates>
|
||
|
<certificate uuid="d2a09dcd-152b-4d48-9473-ad56edbcc8c4">
|
||
|
<id>5c7cab9aa643d0.89304687</id>
|
||
|
<enabled>1</enabled>
|
||
|
<name>fw.nuestrared.org</name>
|
||
|
<description>Certificado Firewall</description>
|
||
|
<altNames/>
|
||
|
<account>e49750e6-4d42-4047-94e7-abed03a2075a</account>
|
||
|
<validationMethod>b6df93fa-c08c-4829-90f9-8c9f9f870f8a</validationMethod>
|
||
|
<keyLength>key_4096</keyLength>
|
||
|
<ocsp>0</ocsp>
|
||
|
<restartActions/>
|
||
|
<autoRenewal>1</autoRenewal>
|
||
|
<renewInterval>60</renewInterval>
|
||
|
<certRefId>5c7caf43d381f</certRefId>
|
||
|
<lastUpdate>1551675203</lastUpdate>
|
||
|
<statusCode/>
|
||
|
<statusLastUpdate/>
|
||
|
</certificate>
|
||
|
</certificates>
|
||
|
<validations>
|
||
|
<validation uuid="b6df93fa-c08c-4829-90f9-8c9f9f870f8a">
|
||
|
<id>5c7cab7c72b502.94225746</id>
|
||
|
<enabled>1</enabled>
|
||
|
<name>DreamhostAPI</name>
|
||
|
<description>Dominios en Dreamhost</description>
|
||
|
<method>dns01</method>
|
||
|
<http_service>opnsense</http_service>
|
||
|
<http_opn_autodiscovery>1</http_opn_autodiscovery>
|
||
|
<http_opn_interface>wan</http_opn_interface>
|
||
|
<http_opn_ipaddresses/>
|
||
|
<http_haproxyInject>1</http_haproxyInject>
|
||
|
<http_haproxyFrontends/>
|
||
|
<dns_service>dns_dreamhost</dns_service>
|
||
|
<dns_sleep>120</dns_sleep>
|
||
|
<dns_ad_key/>
|
||
|
<dns_ali_key/>
|
||
|
<dns_ali_secret/>
|
||
|
<dns_autodns_user/>
|
||
|
<dns_autodns_password/>
|
||
|
<dns_autodns_context/>
|
||
|
<dns_aws_id/>
|
||
|
<dns_aws_secret/>
|
||
|
<dns_azuredns_subscriptionid/>
|
||
|
<dns_azuredns_tenantid/>
|
||
|
<dns_azuredns_appid/>
|
||
|
<dns_azuredns_clientsecret/>
|
||
|
<dns_cf_email/>
|
||
|
<dns_cf_key/>
|
||
|
<dns_cloudns_auth_id/>
|
||
|
<dns_cloudns_sub_auth_id/>
|
||
|
<dns_cloudns_auth_password/>
|
||
|
<dns_cx_key/>
|
||
|
<dns_cx_secret/>
|
||
|
<dns_cyon_user/>
|
||
|
<dns_cyon_password/>
|
||
|
<dns_da_key/>
|
||
|
<dns_da_insecure>1</dns_da_insecure>
|
||
|
<dns_dgon_key/>
|
||
|
<dns_dnsimple_token/>
|
||
|
<dns_do_pid/>
|
||
|
<dns_do_password/>
|
||
|
<dns_dp_id/>
|
||
|
<dns_dp_key/>
|
||
|
<dns_dh_key>9ZZB2XMH5X43TYMM</dns_dh_key>
|
||
|
<dns_duckdns_token/>
|
||
|
<dns_dyn_customer/>
|
||
|
<dns_dyn_user/>
|
||
|
<dns_dyn_password/>
|
||
|
<dns_dynu_clientid/>
|
||
|
<dns_dynu_secret/>
|
||
|
<dns_freedns_user/>
|
||
|
<dns_freedns_password/>
|
||
|
<dns_gandi_livedns_key/>
|
||
|
<dns_gd_key/>
|
||
|
<dns_gd_secret/>
|
||
|
<dns_he_user/>
|
||
|
<dns_he_password/>
|
||
|
<dns_infoblox_credentials/>
|
||
|
<dns_infoblox_server/>
|
||
|
<dns_inwx_user/>
|
||
|
<dns_inws_password/>
|
||
|
<dns_ispconfig_user/>
|
||
|
<dns_ispconfig_password/>
|
||
|
<dns_ispconfig_api/>
|
||
|
<dns_ispconfig_insecure>1</dns_ispconfig_insecure>
|
||
|
<dns_kinghost_username/>
|
||
|
<dns_kinghost_password/>
|
||
|
<dns_knot_server/>
|
||
|
<dns_knot_key/>
|
||
|
<dns_lexicon_provider>cloudflare</dns_lexicon_provider>
|
||
|
<dns_lexicon_user/>
|
||
|
<dns_lexicon_token/>
|
||
|
<dns_linode_key/>
|
||
|
<dns_lua_email/>
|
||
|
<dns_lua_key/>
|
||
|
<dns_me_key/>
|
||
|
<dns_me_secret/>
|
||
|
<dns_namecom_user/>
|
||
|
<dns_namecom_token/>
|
||
|
<dns_namesilo_key/>
|
||
|
<dns_nsone_key/>
|
||
|
<dns_nsupdate_server/>
|
||
|
<dns_nsupdate_key/>
|
||
|
<dns_ovh_app_key/>
|
||
|
<dns_ovh_app_secret/>
|
||
|
<dns_ovh_consumer_key/>
|
||
|
<dns_ovh_endpoint/>
|
||
|
<dns_pdns_url/>
|
||
|
<dns_pdns_serverid/>
|
||
|
<dns_pdns_token/>
|
||
|
<dns_sl_key/>
|
||
|
<dns_servercow_username/>
|
||
|
<dns_servercow_password/>
|
||
|
<dns_uno_key/>
|
||
|
<dns_uno_user/>
|
||
|
<dns_vscale_key/>
|
||
|
<dns_yandex_token/>
|
||
|
<dns_zilore_key/>
|
||
|
<dns_zm_key/>
|
||
|
<dns_gdnsdk_user/>
|
||
|
<dns_gdnsdk_password/>
|
||
|
<dns_acmedns_user/>
|
||
|
<dns_acmedns_password/>
|
||
|
<dns_acmedns_subdomain/>
|
||
|
<dns_acmedns_updateurl/>
|
||
|
</validation>
|
||
|
</validations>
|
||
|
<actions>
|
||
|
<action uuid="e81caf81-1230-447c-9522-016e03d77f86">
|
||
|
<id>5c7caeb7f09452.55378870</id>
|
||
|
<enabled>1</enabled>
|
||
|
<name>RenewFirewall</name>
|
||
|
<description/>
|
||
|
<type>restart_gui</type>
|
||
|
<highwinds_account_hash/>
|
||
|
<highwinds_access_token/>
|
||
|
<configd/>
|
||
|
</action>
|
||
|
</actions>
|
||
|
</AcmeClient>
|
||
|
<monit version="1.0.8">
|
||
|
<general>
|
||
|
<enabled>1</enabled>
|
||
|
<interval>120</interval>
|
||
|
<startdelay>120</startdelay>
|
||
|
<mailserver>127.0.0.1</mailserver>
|
||
|
<port>25</port>
|
||
|
<username>root</username>
|
||
|
<password>nosred2018</password>
|
||
|
<ssl>0</ssl>
|
||
|
<sslversion>auto</sslversion>
|
||
|
<sslverify>1</sslverify>
|
||
|
<logfile>syslog facility log_daemon</logfile>
|
||
|
<statefile/>
|
||
|
<eventqueuePath/>
|
||
|
<eventqueueSlots/>
|
||
|
<httpdEnabled>0</httpdEnabled>
|
||
|
<httpdUsername>root</httpdUsername>
|
||
|
<httpdPassword>TWbu5i5T0lm4LBLjnkSp</httpdPassword>
|
||
|
<httpdPort>2812</httpdPort>
|
||
|
<httpdAllow/>
|
||
|
<mmonitUrl/>
|
||
|
<mmonitTimeout>5</mmonitTimeout>
|
||
|
<mmonitRegisterCredentials>1</mmonitRegisterCredentials>
|
||
|
</general>
|
||
|
<alert uuid="293b06bb-ef1a-4fd9-b6ab-ca57bb054f6f">
|
||
|
<enabled>0</enabled>
|
||
|
<recipient>root@localhost.local</recipient>
|
||
|
<noton>0</noton>
|
||
|
<events/>
|
||
|
<format/>
|
||
|
<reminder>10</reminder>
|
||
|
<description/>
|
||
|
</alert>
|
||
|
<service uuid="b7e6c670-87f7-4564-b124-4f840e3827d3">
|
||
|
<enabled>1</enabled>
|
||
|
<name>$HOST</name>
|
||
|
<type>system</type>
|
||
|
<pidfile/>
|
||
|
<match/>
|
||
|
<path/>
|
||
|
<timeout>300</timeout>
|
||
|
<address/>
|
||
|
<interface/>
|
||
|
<start/>
|
||
|
<stop/>
|
||
|
<tests>0079eb63-53b6-4ec9-9fe8-4148ccd9f856,cf5e41d6-6721-49d0-aa32-1dbd614a92eb,dbb00b9b-ffcb-4833-94ef-15e4aaf43059,543e1993-5cf2-4db3-b625-3452d6c54c8e</tests>
|
||
|
<depends/>
|
||
|
</service>
|
||
|
<service uuid="21e7589f-b5fa-4498-97df-5d40547d870f">
|
||
|
<enabled>1</enabled>
|
||
|
<name>RootFs</name>
|
||
|
<type>filesystem</type>
|
||
|
<pidfile/>
|
||
|
<match/>
|
||
|
<path>/</path>
|
||
|
<timeout>300</timeout>
|
||
|
<address/>
|
||
|
<interface/>
|
||
|
<start/>
|
||
|
<stop/>
|
||
|
<tests>d45c8e90-5796-4e47-b159-67d4bf5b17dc</tests>
|
||
|
<depends/>
|
||
|
</service>
|
||
|
<service uuid="08e57331-0611-4ece-aca6-6cc978eaab4b">
|
||
|
<enabled>0</enabled>
|
||
|
<name>carp_status_change</name>
|
||
|
<type>custom</type>
|
||
|
<pidfile/>
|
||
|
<match/>
|
||
|
<path>/usr/local/opnsense/scripts/OPNsense/Monit/carp_status</path>
|
||
|
<timeout>300</timeout>
|
||
|
<address/>
|
||
|
<interface/>
|
||
|
<start/>
|
||
|
<stop/>
|
||
|
<tests>a0a620e0-6474-4906-809f-3c612f193d91</tests>
|
||
|
<depends/>
|
||
|
</service>
|
||
|
<service uuid="2328e0e1-6a5d-4c92-8755-c36154ca0c92">
|
||
|
<enabled>0</enabled>
|
||
|
<name>gateway_alert</name>
|
||
|
<type>custom</type>
|
||
|
<pidfile/>
|
||
|
<match/>
|
||
|
<path>/usr/local/opnsense/scripts/OPNsense/Monit/gateway_alert</path>
|
||
|
<timeout>300</timeout>
|
||
|
<address/>
|
||
|
<interface/>
|
||
|
<start/>
|
||
|
<stop/>
|
||
|
<tests>2b0582ff-d02c-482a-97b8-603902f5906f</tests>
|
||
|
<depends/>
|
||
|
</service>
|
||
|
<test uuid="8df0601b-db16-40ae-8732-85bea5a9300e">
|
||
|
<name>Ping</name>
|
||
|
<type>Custom</type>
|
||
|
<condition>failed ping</condition>
|
||
|
<action>alert</action>
|
||
|
<path/>
|
||
|
</test>
|
||
|
<test uuid="2217f0bb-b741-4ae7-94d8-bf734c7b9601">
|
||
|
<name>NetworkLink</name>
|
||
|
<type>Custom</type>
|
||
|
<condition>failed link</condition>
|
||
|
<action>alert</action>
|
||
|
<path/>
|
||
|
</test>
|
||
|
<test uuid="4344a2a0-51c2-44f3-a6f9-3c4887a200e6">
|
||
|
<name>NetworkSaturation</name>
|
||
|
<type>Custom</type>
|
||
|
<condition>saturation is greater than 75%</condition>
|
||
|
<action>alert</action>
|
||
|
<path/>
|
||
|
</test>
|
||
|
<test uuid="0079eb63-53b6-4ec9-9fe8-4148ccd9f856">
|
||
|
<name>MemoryUsage</name>
|
||
|
<type>Custom</type>
|
||
|
<condition>memory usage is greater than 75%</condition>
|
||
|
<action>alert</action>
|
||
|
<path/>
|
||
|
</test>
|
||
|
<test uuid="cf5e41d6-6721-49d0-aa32-1dbd614a92eb">
|
||
|
<name>CPUUsage</name>
|
||
|
<type>Custom</type>
|
||
|
<condition>cpu usage is greater than 75%</condition>
|
||
|
<action>alert</action>
|
||
|
<path/>
|
||
|
</test>
|
||
|
<test uuid="dbb00b9b-ffcb-4833-94ef-15e4aaf43059">
|
||
|
<name>LoadAvg1</name>
|
||
|
<type>Custom</type>
|
||
|
<condition>loadavg (1min) is greater than 8</condition>
|
||
|
<action>alert</action>
|
||
|
<path/>
|
||
|
</test>
|
||
|
<test uuid="543e1993-5cf2-4db3-b625-3452d6c54c8e">
|
||
|
<name>LoadAvg5</name>
|
||
|
<type>Custom</type>
|
||
|
<condition>loadavg (5min) is greater than 6</condition>
|
||
|
<action>alert</action>
|
||
|
<path/>
|
||
|
</test>
|
||
|
<test uuid="77abdb89-9b51-4eaf-8546-a4dea9caa863">
|
||
|
<name>LoadAvg15</name>
|
||
|
<type>Custom</type>
|
||
|
<condition>loadavg (15min) is greater than 4</condition>
|
||
|
<action>alert</action>
|
||
|
<path/>
|
||
|
</test>
|
||
|
<test uuid="d45c8e90-5796-4e47-b159-67d4bf5b17dc">
|
||
|
<name>SpaceUsage</name>
|
||
|
<type>Custom</type>
|
||
|
<condition>space usage is greater than 75%</condition>
|
||
|
<action>alert</action>
|
||
|
<path/>
|
||
|
</test>
|
||
|
<test uuid="a0a620e0-6474-4906-809f-3c612f193d91">
|
||
|
<name>ChangedStatus</name>
|
||
|
<type>Custom</type>
|
||
|
<condition>changed status</condition>
|
||
|
<action>alert</action>
|
||
|
<path/>
|
||
|
</test>
|
||
|
<test uuid="2b0582ff-d02c-482a-97b8-603902f5906f">
|
||
|
<name>NonZeroStatus</name>
|
||
|
<type>Custom</type>
|
||
|
<condition>status != 0</condition>
|
||
|
<action>alert</action>
|
||
|
<path/>
|
||
|
</test>
|
||
|
</monit>
|
||
|
<proxy version="1.0.3">
|
||
|
<general>
|
||
|
<enabled>0</enabled>
|
||
|
<icpPort/>
|
||
|
<logging>
|
||
|
<enable>
|
||
|
<accessLog>1</accessLog>
|
||
|
<storeLog>1</storeLog>
|
||
|
</enable>
|
||
|
<ignoreLogACL/>
|
||
|
<target/>
|
||
|
</logging>
|
||
|
<alternateDNSservers/>
|
||
|
<dnsV4First>1</dnsV4First>
|
||
|
<forwardedForHandling>on</forwardedForHandling>
|
||
|
<uriWhitespaceHandling>strip</uriWhitespaceHandling>
|
||
|
<useViaHeader>1</useViaHeader>
|
||
|
<suppressVersion>1</suppressVersion>
|
||
|
<VisibleEmail>correo@nuestrared.org</VisibleEmail>
|
||
|
<VisibleHostname>nuestrared.org</VisibleHostname>
|
||
|
<cache>
|
||
|
<local>
|
||
|
<enabled>0</enabled>
|
||
|
<directory>/var/squid/cache</directory>
|
||
|
<cache_mem>256</cache_mem>
|
||
|
<maximum_object_size>2</maximum_object_size>
|
||
|
<size>256</size>
|
||
|
<l1>16</l1>
|
||
|
<l2>256</l2>
|
||
|
<cache_linux_packages>1</cache_linux_packages>
|
||
|
<cache_windows_updates>1</cache_windows_updates>
|
||
|
</local>
|
||
|
</cache>
|
||
|
<traffic>
|
||
|
<enabled>0</enabled>
|
||
|
<maxDownloadSize>2048</maxDownloadSize>
|
||
|
<maxUploadSize>1024</maxUploadSize>
|
||
|
<OverallBandwidthTrotteling>1024</OverallBandwidthTrotteling>
|
||
|
<perHostTrotteling>256</perHostTrotteling>
|
||
|
</traffic>
|
||
|
<parentproxy>
|
||
|
<enabled>0</enabled>
|
||
|
<host/>
|
||
|
<enableauth>0</enableauth>
|
||
|
<user>username</user>
|
||
|
<password>password</password>
|
||
|
<port/>
|
||
|
<localdomains/>
|
||
|
<localips/>
|
||
|
</parentproxy>
|
||
|
</general>
|
||
|
<forward>
|
||
|
<interfaces>lan</interfaces>
|
||
|
<port>3128</port>
|
||
|
<sslbumpport>3129</sslbumpport>
|
||
|
<sslbump>0</sslbump>
|
||
|
<sslurlonly>0</sslurlonly>
|
||
|
<sslcertificate>5c7caf43d2e5f</sslcertificate>
|
||
|
<sslnobumpsites>.nuestrared.org</sslnobumpsites>
|
||
|
<ssl_crtd_storage_max_size>16</ssl_crtd_storage_max_size>
|
||
|
<sslcrtd_children>8</sslcrtd_children>
|
||
|
<snmp_enable>0</snmp_enable>
|
||
|
<snmp_port>3401</snmp_port>
|
||
|
<snmp_password>public</snmp_password>
|
||
|
<ftpInterfaces/>
|
||
|
<ftpPort>2121</ftpPort>
|
||
|
<ftpTransparentMode>0</ftpTransparentMode>
|
||
|
<addACLforInterfaceSubnets>1</addACLforInterfaceSubnets>
|
||
|
<transparentMode>0</transparentMode>
|
||
|
<acl>
|
||
|
<allowedSubnets>10.132.0.0/16</allowedSubnets>
|
||
|
<unrestricted/>
|
||
|
<bannedHosts/>
|
||
|
<whiteList/>
|
||
|
<blackList/>
|
||
|
<browser/>
|
||
|
<mimeType/>
|
||
|
<safePorts>80:http,21:ftp,443:https,70:gopher,210:wais,1025-65535:unregistered ports,280:http-mgmt,488:gss-http,591:filemaker,777:multiling http</safePorts>
|
||
|
<sslPorts>443:https</sslPorts>
|
||
|
<remoteACLs>
|
||
|
<blacklists>
|
||
|
<blacklist uuid="c69cdd7a-6cc7-4b89-87b5-37af452c23e9">
|
||
|
<enabled>1</enabled>
|
||
|
<filename>shallalist</filename>
|
||
|
<url>http://www.shallalist.de/Downloads/shallalist.tar.gz</url>
|
||
|
<username/>
|
||
|
<password/>
|
||
|
<filter>finance/moneylending,automobile/boats,porn,ringtones,drugs,socialnet,dynamic,anonvpn,library,science/astronomy,costtraps,finance/insurance,chat,politics,searchengines,shopping,aggressive,hospitals,urlshortener,adv,weapons,updatesites,recreation/restaurants,radiotv,alcohol,isp,finance/trading,webmail,sex/lingerie,religion,tracker,music,automobile/planes,hobby/gardening,recreation/humor,hobby/games-misc,redirector,gamble,fortunetelling,jobsearch,finance/banking,hobby/cooking,webtv,government,models,automobile/bikes,downloads,hobby/pets,warez,homestyle,recreation/martialarts,spyware,recreation/wellness,news,hobby/games-online,recreation/travel,webphone,sex/education,finance/other,automobile/cars,dating,remotecontrol,forum,violence,imagehosting,podcasts,movies,webradio,military,hacking,finance/realestate,science/chemistry,education/schools,recreation/sports</filter>
|
||
|
<sslNoVerify>1</sslNoVerify>
|
||
|
<description>Shallalist Blacklist</description>
|
||
|
</blacklist>
|
||
|
</blacklists>
|
||
|
<UpdateCron/>
|
||
|
</remoteACLs>
|
||
|
</acl>
|
||
|
<icap>
|
||
|
<enable>0</enable>
|
||
|
<RequestURL>icap://[::1]:1344/avscan</RequestURL>
|
||
|
<ResponseURL>icap://[::1]:1344/avscan</ResponseURL>
|
||
|
<SendClientIP>1</SendClientIP>
|
||
|
<SendUsername>0</SendUsername>
|
||
|
<EncodeUsername>0</EncodeUsername>
|
||
|
<UsernameHeader>X-Username</UsernameHeader>
|
||
|
<EnablePreview>1</EnablePreview>
|
||
|
<PreviewSize>1024</PreviewSize>
|
||
|
<OptionsTTL>60</OptionsTTL>
|
||
|
<exclude/>
|
||
|
</icap>
|
||
|
<authentication>
|
||
|
<method/>
|
||
|
<realm>OPNsense proxy authentication</realm>
|
||
|
<credentialsttl>2</credentialsttl>
|
||
|
<children>5</children>
|
||
|
</authentication>
|
||
|
</forward>
|
||
|
<pac/>
|
||
|
</proxy>
|
||
|
<captiveportal version="1.0.0">
|
||
|
<zones>
|
||
|
<zone uuid="daac5008-816c-4d4e-8dde-b03942bb4a77">
|
||
|
<enabled>1</enabled>
|
||
|
<zoneid>0</zoneid>
|
||
|
<interfaces>lan</interfaces>
|
||
|
<authservers>RadiusAuthNosRed,VaucherAuthNosred</authservers>
|
||
|
<alwaysSendAccountingReqs>1</alwaysSendAccountingReqs>
|
||
|
<authEnforceGroup/>
|
||
|
<idletimeout>15</idletimeout>
|
||
|
<hardtimeout>30</hardtimeout>
|
||
|
<concurrentlogins>1</concurrentlogins>
|
||
|
<certificate>5c7caf43d381f</certificate>
|
||
|
<servername>fw.nuestrared.org</servername>
|
||
|
<allowedAddresses/>
|
||
|
<allowedMACAddresses/>
|
||
|
<transparentHTTPProxy>0</transparentHTTPProxy>
|
||
|
<transparentHTTPSProxy>0</transparentHTTPSProxy>
|
||
|
<template/>
|
||
|
<description>NuestraRED.org CaptivePortal</description>
|
||
|
</zone>
|
||
|
</zones>
|
||
|
<templates/>
|
||
|
</captiveportal>
|
||
|
</OPNsense>
|
||
|
<gateways>
|
||
|
<gateway_item>
|
||
|
<descr>Interface WAN Gateway</descr>
|
||
|
<defaultgw>1</defaultgw>
|
||
|
<ipprotocol>inet</ipprotocol>
|
||
|
<interface>wan</interface>
|
||
|
<gateway>192.168.100.1</gateway>
|
||
|
<monitor_disable>1</monitor_disable>
|
||
|
<name>GW_WAN</name>
|
||
|
<interval>1</interval>
|
||
|
<weight>1</weight>
|
||
|
</gateway_item>
|
||
|
</gateways>
|
||
|
<ca>
|
||
|
<crt>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</crt>
|
||
|
<refid>5c7caf43d2e5f</refid>
|
||
|
<descr>Let's Encrypt Authority X3 (Let's Encrypt)</descr>
|
||
|
</ca>
|
||
|
<cert>
|
||
|
<refid>5c7c9b01656eb</refid>
|
||
|
<descr>Web GUI SSL certificate</descr>
|
||
|
<crt>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</crt>
|
||
|
<prv>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
|
||
|
</cert>
|
||
|
<cert>
|
||
|
<refid>5c7caf43d381f</refid>
|
||
|
<caref>5c7caf43d2e5f</caref>
|
||
|
<descr>fw.nuestrared.org (Let's Encrypt)</descr>
|
||
|
<crt>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</crt>
|
||
|
<prv>LS0tLS1CRUdJTiBSU0EgUFJJVkFURSBLRVktLS0tLQpNSUlKS1FJQkFBS0NBZ0VBcW1ObncyMU1XWlNHSjkzRFU5aEUwWXhndlVoaExXNW4ycmVHNXB2amRWa0FlWUZYCkJkakd1YVBiUCs1dHQ5aUpKRFlSYjhTdTNqVVhvcjlheTZFWkFCU0dUTElPVWk5aGtMV05iK09adlBZNC8ycjEKM3U3eDFKU213MkZyUFhRLzhnZnNreWVPTXRGb1lxT3czQ2NjbCtCaUtZb3Vjb05LV2dySHcySlF6WEJqazluOQpNaFY4NEJHdHNBb3NqNURoLzRGYjI4Q1FDSERJN1ErZ2VocEVQR0U0LzBsUGt3NVlzeDZoU0Q3ekVnR0JubU1iClNrOVVNT1FFQ0FHZ0ludUxZYzBiUUg1Zkk3bE9BTGwzSjc3MVBxcTFoZkdJamc0dnJDR20wQ2dLOHJYZExxV0EKZytzWGxKdVBpWG93V0RYMUhFWW1FUTRnMENpVVI1eVRkbzgyK2NMWEZvUU9nTUVBRERDY1RiYWNUU1pqSnhuOQphN0Y3VndFWlJjMEdjOEF0SkVDSkFKMzJUK291RU1KeHhiTW5aVmE1blJqNDhPWTVHelhqQ3dmeExKVFRMNHg4CkRKRGw1ZlBSMFk4QjF1UkduYk5OaVg0aUdzSU4rbVdFaWpGMitZMlFwazRZNjNnTFJ0eE14UEhsUTY1czlnRFMKQVNIUDNES1k4di85dVJma2Zld0hmdk9wRzgxbFJSS2FCZnRwbkw0UW9lUE5HbmQ0bHFPckRFV3MzVWlmWFZabQp5NDJSeEIyelh4dWQ1bjVoeVhwSFVaaVBBMUdSZndqeVNJMTNzZWRHT1cxdFZYQXlMd1R2aUdpelo0TEFpUlB5CmVoeWdCS2p2dmRFenoyMlhLcVV3MFVhODRRSXI2TFExU3pPeFVsYmtIT2pvK2IzNmUyR3JwWksxY1k4Q0F3RUEKQVFLQ0FnQlBjOHNPOWdpRVBSM1J1VGM4QWIwVmVjQWlnMzNORVk2Y0RyaDVFSGdnWUVBNGFIZUw0bW5JWnYvMQo3OWg1d2g4eEk0VTkrUmtSeFBBZ2s5cGkyZHd1aldPU24vVE5uZ3FBMENnRDVMM3J2MlVVdFd1eGFQcWJoalc5CkpkQTc5OWxab3hoT0JrUG9ybjFlZ2JZVzhxWUNyRDhaMzdXSThHL2JUT3VaMEY2ZGJhc0Jac1VLZGJxbFFaa2MKWGFJcDBBV1NmMSsyT1RUd3VxYjI1REtRdlc3VU9RRzdDUlJ5SGw1K0orcE5KZzF5ZUFGWk9oMmZxUjQ1TGhvegpJWTdxaFhHWlNXdEx4NkhWcHJNWTQyTU14WjdXZWdQclVaVzdxQ0hTd2w1bThrVW9xR1ZiT3hHU2NpMnN2bDFRClhnbnRHRHdUMHlJdEVjbDdSM0RkYzhYUG96aWV1ODFRTVd3alpKbWI2b1AvTzhJcjBTM2dZUk9UL2M3TXFiWWEKeWk0RjkxeTlOZTdBeTdTY1JsVzVLT29namltMkRBM1NNbnhPelJPcTRJQ1J1VWVSQ1pOdUkvOUJUZE9LckU1MwpROHJpQk9xMkN0ZjRkZGRQV0J5ejlmWlA3cVVCS25kN1NkazU2dmRRNWtlMnN0S3pGUWNkckhpS0xLNFpBbFNvCjYrWm90TTVrSitiK0pDYWp4U3M4bmJrcUhoRFJYcHNsdURUKy9yL1h0MHZZdVhWU1lkK0dQT0ZISVNmVnVpanQKVXgvUEVIRzl3Vk5qaG5OV1JvOTdsaW4xUllzNXk5eHlOd0p1TWV1WHRXOTZUMmFvcXo2UHhUQkJsVmZnRnhCNwpyZklrZEtDSmFISFNpeTlRQ2NQSFdrT0FURW82U1FiNlNXU3RldTZtdzlyRjdHd29BUUtDQVFFQTFINGxVY0hhCit2R2pENDVhNTVoRHVrS2lxYmtmS2xEcGcvTTBMTy92Z2hPSlp4cnVnM1cvTTBKWk41Vm9PRyt2ZGEvbHY0UisKdmd6M3VuK1Z1aCtyQTZ3bFFDSEpQOVJZN2JESERhSTNVbTFYKzJpZms2OWR0RE5lejVSUWF6TkhUcXQySEt2TApjcGVPNXhtR2J0QzhldktTVXlGeEgwcm1oUFRSSTh1RXcrRVloRlJDcjBqdlFFSWN6T3VsSXlDSEE5REpMZHlsClBSME5KcEFBZHM4UTRLWHhycWJRcTlER3ptTU9DQ2xWcGlYZC9jS1EwQTBDMXJZU0F6VDNZdkNMS0xoQzc3MS8KcDNGRTBLdEp3T0UwdkN0d0ZQRE1rbmtXZjlYa3ErN3BKMW0zVjF5SDFmTG5CZFhFaThZK2I0WnlPK1BFdUo3UwpQSm1MZ0JNRGNEbmFyd0tDQVFFQXpVWllhVWh6eGhUWEFCVmZZRXRITHNzZ1UycTVOMEozTTYwaWdzdVhmM3dVClpMandHeUNJTGNvMm5aa0FockhISHUyVmtpbWxSejg5REF2cXhGdTllQzlyYUtld1R3UjZoMlNRSGFMYndHS1EKRHlwUWQ5cHZkR3ZMOHQ3QWtZeDZGMGlYWXRpV002NjZIMWtRL0xPMVBqL0xoZFNQc3JPT0VZT2FOeldFUUVCTwpLamhwZWZLODhESGl4TlFjQnJQcG90SzFicTNJc3JvK1BMMmdSVHVGY1hsOGtzY3ZJanROY2FNVjNnQTFUSkVMCmZvVDdBU1ZIa1ZPQUFmQ3dkM1V5V0lFY3FUVkphcmN2Rm5PUFdoTWl6MTR2d0FMMkkwVlBWNXJsd2ZoWTh0U24KZ0VQWHpwaHN4a296L1hQcnFZcUV6WVZHb0ozZHlwZWJqZktlMjVBUElRS0NBUUJ6OXh2NjBHYm5pTFBLcTQvawowRzQxMm1QWGFGWWZ5K1NFeEZkM0pzSjVKSnhhRHBLWVg4d205MUNsU3Y2RHZqL3RaRDlvRTdEdm16Z2ZLYjNXCnc2MmE1WG0yMURsMmdqYStFVG13c1JTc0FVeUF3Z3BFbVBIMGhBeDhFSjhLd2dOcVpaeWg3UWVzMUJXQy9hVW0KR1BpanlIb2VzQ09DUm1nanEwL3Z6d1AzdW9LY3hUZFhYZUJrR3pDSWpSbWtYLzRQRVFTWjZNNnMyWXZ4dmFqagpMZ0l4OTU0OENJSGRJcVU4d1VaSklmWENKT3hQcnIxRkxiU2M1T1JUcDdaUzRwK3ZhMC9zY21pV1F2U2hSTG1OCmI5cE56dzd0L3JSR1E1c0p6UHRzOFllQW1DKzhsNXp5SUF3QVhUZFVhSzV1UXR0WTMrYmVNcDdkdjVZb0lUaEIKS1BHMUFvSUJBUUM0QTNCcjZNd0g3RlNUdVpVSElGUk9TVDdRS0dLaWU4MlpvSUhJV0RPVno2Z0VacGl1NktuSwp5blBOTVFQOHVzOHlGVzY0V09iVmlJWDBENWJEc1MyVzJJTmpqTGNMRG91OFpWU2ZqSWVMM1k4Z1dTRkxYNS83CjhFb2lqTFo1ZzBGTE1BS3RWRlRKUGIrUkxHbUM3cUh4aklTb2t0VENNQjJSNjdSSis0cHpnbkhQZlVSb1VrWTIKMTdGZUducUpNNnlrRGxrZ1AxOGpnTHNiL2l6M0F4VnJsS2tzZHF2MDlzNUVxUnFJS1EyZWRvT2tSaGN3ZnJlNgpPZTBOVURNUTB4bHZwMFlIRlVLY0RGeUV0dER4d1NlNlZzZGRUQXBUc2VVZk5qYnllK3RZdTNMd0UyRVl6U0R0ClhFVmcxaEtTcUI3R2tjdXZYZlVka0d5Y2dic1FQZ0toQW9JQkFRRFJDZGhxSUVxRFBQUkJ6Tzg0UVRJYUtURVYKL3B2SFVDT0RVRThGd2tJbysrTXdMcm8wY2p3M3BEc1QzV3R5bllxWHNQdDhsNzNGVjdGOTBTRitYNWZxcjJRaAorOWI1dEYwOGVCTmZYdXpwdmNVMHFyU01XaXBCa1lIdkJnaTR4bjduRFpYK1kwZXVzT0xmQklSNGJVK0tQSUxFCmtCbjBrOXBISUVYR2U5NGhRNFhheE0rUHdGQ1lCekFmYzZUY0RCck9CbU
|
||
|
</cert>
|
||
|
<ppps>
|
||
|
<ppp/>
|
||
|
</ppps>
|
||
|
<staticroutes>
|
||
|
<route/>
|
||
|
</staticroutes>
|
||
|
</opnsense>
|