NuestraRED.org/opnsensebk/config-fw.nuestrared.org-20...

1115 lines
56 KiB
XML

<?xml version="1.0"?>
<opnsense>
<theme>opnsense</theme>
<sysctl>
<item>
<descr>Disable the pf ftp proxy handler.</descr>
<tunable>debug.pfftpproxy</tunable>
<value>default</value>
</item>
<item>
<descr>Increase UFS read-ahead speeds to match the state of hard drives and NCQ.</descr>
<tunable>vfs.read_max</tunable>
<value>default</value>
</item>
<item>
<descr>Set the ephemeral port range to be lower.</descr>
<tunable>net.inet.ip.portrange.first</tunable>
<value>default</value>
</item>
<item>
<descr>Drop packets to closed TCP ports without returning a RST</descr>
<tunable>net.inet.tcp.blackhole</tunable>
<value>default</value>
</item>
<item>
<descr>Do not send ICMP port unreachable messages for closed UDP ports</descr>
<tunable>net.inet.udp.blackhole</tunable>
<value>default</value>
</item>
<item>
<descr>Randomize the ID field in IP packets (default is 0: sequential IP IDs)</descr>
<tunable>net.inet.ip.random_id</tunable>
<value>default</value>
</item>
<item>
<descr>
Source routing is another way for an attacker to try to reach non-routable addresses behind your box.
It can also be used to probe for information about your internal networks. These functions come enabled
as part of the standard FreeBSD core system.
</descr>
<tunable>net.inet.ip.sourceroute</tunable>
<value>default</value>
</item>
<item>
<descr>
Source routing is another way for an attacker to try to reach non-routable addresses behind your box.
It can also be used to probe for information about your internal networks. These functions come enabled
as part of the standard FreeBSD core system.
</descr>
<tunable>net.inet.ip.accept_sourceroute</tunable>
<value>default</value>
</item>
<item>
<descr>
Redirect attacks are the purposeful mass-issuing of ICMP type 5 packets. In a normal network, redirects
to the end stations should not be required. This option enables the NIC to drop all inbound ICMP redirect
packets without returning a response.
</descr>
<tunable>net.inet.icmp.drop_redirect</tunable>
<value>default</value>
</item>
<item>
<descr>
This option turns off the logging of redirect packets because there is no limit and this could fill
up your logs consuming your whole hard drive.
</descr>
<tunable>net.inet.icmp.log_redirect</tunable>
<value>default</value>
</item>
<item>
<descr>Drop SYN-FIN packets (breaks RFC1379, but nobody uses it anyway)</descr>
<tunable>net.inet.tcp.drop_synfin</tunable>
<value>default</value>
</item>
<item>
<descr>Enable sending IPv4 redirects</descr>
<tunable>net.inet.ip.redirect</tunable>
<value>default</value>
</item>
<item>
<descr>Enable sending IPv6 redirects</descr>
<tunable>net.inet6.ip6.redirect</tunable>
<value>default</value>
</item>
<item>
<descr>Enable privacy settings for IPv6 (RFC 4941)</descr>
<tunable>net.inet6.ip6.use_tempaddr</tunable>
<value>default</value>
</item>
<item>
<descr>Prefer privacy addresses and use them over the normal addresses</descr>
<tunable>net.inet6.ip6.prefer_tempaddr</tunable>
<value>default</value>
</item>
<item>
<descr>Generate SYN cookies for outbound SYN-ACK packets</descr>
<tunable>net.inet.tcp.syncookies</tunable>
<value>default</value>
</item>
<item>
<descr>Maximum incoming/outgoing TCP datagram size (receive)</descr>
<tunable>net.inet.tcp.recvspace</tunable>
<value>default</value>
</item>
<item>
<descr>Maximum incoming/outgoing TCP datagram size (send)</descr>
<tunable>net.inet.tcp.sendspace</tunable>
<value>default</value>
</item>
<item>
<descr>Do not delay ACK to try and piggyback it onto a data packet</descr>
<tunable>net.inet.tcp.delayed_ack</tunable>
<value>default</value>
</item>
<item>
<descr>Maximum outgoing UDP datagram size</descr>
<tunable>net.inet.udp.maxdgram</tunable>
<value>default</value>
</item>
<item>
<descr>Handling of non-IP packets which are not passed to pfil (see if_bridge(4))</descr>
<tunable>net.link.bridge.pfil_onlyip</tunable>
<value>default</value>
</item>
<item>
<descr>Set to 1 to additionally filter on the physical interface for locally destined packets</descr>
<tunable>net.link.bridge.pfil_local_phys</tunable>
<value>default</value>
</item>
<item>
<descr>Set to 0 to disable filtering on the incoming and outgoing member interfaces.</descr>
<tunable>net.link.bridge.pfil_member</tunable>
<value>default</value>
</item>
<item>
<descr>Set to 1 to enable filtering on the bridge interface</descr>
<tunable>net.link.bridge.pfil_bridge</tunable>
<value>default</value>
</item>
<item>
<descr>Allow unprivileged access to tap(4) device nodes</descr>
<tunable>net.link.tap.user_open</tunable>
<value>default</value>
</item>
<item>
<descr>Randomize PID's (see src/sys/kern/kern_fork.c: sysctl_kern_randompid())</descr>
<tunable>kern.randompid</tunable>
<value>default</value>
</item>
<item>
<descr>Maximum size of the IP input queue</descr>
<tunable>net.inet.ip.intr_queue_maxlen</tunable>
<value>default</value>
</item>
<item>
<descr>Disable CTRL+ALT+Delete reboot from keyboard.</descr>
<tunable>hw.syscons.kbd_reboot</tunable>
<value>default</value>
</item>
<item>
<descr>Enable TCP extended debugging</descr>
<tunable>net.inet.tcp.log_debug</tunable>
<value>default</value>
</item>
<item>
<descr>Set ICMP Limits</descr>
<tunable>net.inet.icmp.icmplim</tunable>
<value>default</value>
</item>
<item>
<descr>TCP Offload Engine</descr>
<tunable>net.inet.tcp.tso</tunable>
<value>default</value>
</item>
<item>
<descr>UDP Checksums</descr>
<tunable>net.inet.udp.checksum</tunable>
<value>default</value>
</item>
<item>
<descr>Maximum socket buffer size</descr>
<tunable>kern.ipc.maxsockbuf</tunable>
<value>default</value>
</item>
<item>
<descr>Page Table Isolation (Meltdown mitigation, requires reboot.)</descr>
<tunable>vm.pmap.pti</tunable>
<value>default</value>
</item>
<item>
<descr>Disable Indirect Branch Restricted Speculation (Spectre V2 mitigation)</descr>
<tunable>hw.ibrs_disable</tunable>
<value>default</value>
</item>
<item>
<descr>Hide processes running as other groups</descr>
<tunable>security.bsd.see_other_gids</tunable>
<value>default</value>
</item>
<item>
<descr>Hide processes running as other users</descr>
<tunable>security.bsd.see_other_uids</tunable>
<value>default</value>
</item>
</sysctl>
<system>
<optimization>normal</optimization>
<hostname>fw</hostname>
<domain>nuestrared.org</domain>
<dnsallowoverride>on</dnsallowoverride>
<group>
<name>admins</name>
<description>System Administrators</description>
<scope>system</scope>
<gid>1999</gid>
<member>0</member>
<priv>page-all</priv>
</group>
<user>
<name>root</name>
<descr>System Administrator</descr>
<scope>system</scope>
<groupname>admins</groupname>
<password>$2y$10$eE36wle/4Ma00KlIY62XzO8dvMPlJCsY5H2H8J/Ej2crzlPEjtvWq</password>
<uid>0</uid>
</user>
<nextuid>2000</nextuid>
<nextgid>2000</nextgid>
<timezone>America/Bogota</timezone>
<timeservers>0.opnsense.pool.ntp.org 1.opnsense.pool.ntp.org 2.opnsense.pool.ntp.org 3.opnsense.pool.ntp.org</timeservers>
<webgui>
<protocol>https</protocol>
<ssl-certref>5c7caf43d381f</ssl-certref>
<port>8443</port>
<ssl-ciphers/>
<interfaces/>
<compression>5</compression>
<nohttpreferercheck>1</nohttpreferercheck>
</webgui>
<disablenatreflection>yes</disablenatreflection>
<usevirtualterminal>1</usevirtualterminal>
<disableconsolemenu>1</disableconsolemenu>
<disablevlanhwfilter>2</disablevlanhwfilter>
<disablechecksumoffloading>1</disablechecksumoffloading>
<disablesegmentationoffloading>1</disablesegmentationoffloading>
<disablelargereceiveoffloading>1</disablelargereceiveoffloading>
<ipv6allow/>
<powerd_ac_mode>hadp</powerd_ac_mode>
<powerd_battery_mode>hadp</powerd_battery_mode>
<powerd_normal_mode>hadp</powerd_normal_mode>
<bogons>
<interval>monthly</interval>
</bogons>
<kill_states/>
<backupcount>60</backupcount>
<crypto_hardware>aesni</crypto_hardware>
<pf_share_forward>1</pf_share_forward>
<lb_use_sticky>1</lb_use_sticky>
<ssh>
<group>admins</group>
<noauto>1</noauto>
<interfaces/>
<enabled>enabled</enabled>
<port>2222</port>
</ssh>
<backup>
<nextcloud version="1.0.0">
<enabled>0</enabled>
<url/>
<user/>
<password/>
<password_encryption/>
<backupdir>OPNsense-Backup</backupdir>
</nextcloud>
</backup>
<dnsserver>192.168.100.1</dnsserver>
<dnsserver>8.8.8.8</dnsserver>
<language>en_US</language>
<firmware>
<plugins>os-arp-scan,os-pppoe,os-acme-client,os-freeradius,os-iperf</plugins>
</firmware>
<authserver>
<refid>5c7ca8d772787</refid>
<type>radius</type>
<name>RadiusAuthNosRed</name>
<host>10.132.1.1</host>
<radius_secret>nw2gqat60</radius_secret>
<radius_timeout>5</radius_timeout>
<radius_auth_port>1812</radius_auth_port>
<radius_acct_port>1813</radius_acct_port>
</authserver>
<authserver>
<refid>5c7ca90c59ead</refid>
<type>voucher</type>
<name>VaucherAuthNosred</name>
<simplePasswords>1</simplePasswords>
<usernameLength/>
<passwordLength/>
</authserver>
<serialspeed>115200</serialspeed>
<primaryconsole>video</primaryconsole>
</system>
<interfaces>
<wan>
<if>vtnet0</if>
<descr/>
<enable>1</enable>
<lock>1</lock>
<spoofmac/>
<blockbogons>1</blockbogons>
<ipaddr>192.168.100.254</ipaddr>
<subnet>24</subnet>
<gateway>GW_WAN</gateway>
</wan>
<lan>
<if>vtnet1</if>
<descr/>
<enable>1</enable>
<lock>1</lock>
<spoofmac/>
<ipaddr>10.132.1.1</ipaddr>
<subnet>16</subnet>
</lan>
</interfaces>
<dhcpd>
<lan>
<enable>1</enable>
<domain>nuestrared.org</domain>
<ddnsdomainalgorithm>hmac-md5</ddnsdomainalgorithm>
<numberoptions>
<item/>
</numberoptions>
<range>
<from>10.132.60.10</from>
<to>10.132.80.245</to>
</range>
<winsserver/>
<dnsserver/>
<ntpserver/>
</lan>
</dhcpd>
<unbound>
<enable>on</enable>
<domainoverrides>
<domain>nuestrared.org</domain>
<ip>10.132.1.2</ip>
<descr>Domain nuestrared</descr>
</domainoverrides>
<hosts>
<host>fw</host>
<domain>nuestrared.org</domain>
<rr>A</rr>
<ip>10.132.1.1</ip>
<mxprio/>
<mx/>
<descr>Firewall NuestraRED.org</descr>
</hosts>
</unbound>
<snmpd>
<syslocation/>
<syscontact/>
<rocommunity>public</rocommunity>
</snmpd>
<syslog>
<reverse/>
</syslog>
<nat>
<outbound>
<mode>automatic</mode>
</outbound>
<rule/>
</nat>
<filter>
<rule>
<type>pass</type>
<ipprotocol>inet</ipprotocol>
<descr>Default allow LAN to any rule</descr>
<interface>lan</interface>
<source>
<network>lan</network>
</source>
<destination>
<any/>
</destination>
</rule>
<rule>
<type>pass</type>
<ipprotocol>inet6</ipprotocol>
<descr>Default allow LAN IPv6 to any rule</descr>
<interface>lan</interface>
<source>
<network>lan</network>
</source>
<destination>
<any/>
</destination>
</rule>
</filter>
<rrd>
<enable/>
</rrd>
<load_balancer>
<monitor_type>
<name>ICMP</name>
<type>icmp</type>
<descr>ICMP</descr>
<options/>
</monitor_type>
<monitor_type>
<name>TCP</name>
<type>tcp</type>
<descr>Generic TCP</descr>
<options/>
</monitor_type>
<monitor_type>
<name>HTTP</name>
<type>http</type>
<descr>Generic HTTP</descr>
<options>
<path>/</path>
<host/>
<code>200</code>
</options>
</monitor_type>
<monitor_type>
<name>HTTPS</name>
<type>https</type>
<descr>Generic HTTPS</descr>
<options>
<path>/</path>
<host/>
<code>200</code>
</options>
</monitor_type>
<monitor_type>
<name>SMTP</name>
<type>send</type>
<descr>Generic SMTP</descr>
<options>
<send/>
<expect>220 *</expect>
</options>
</monitor_type>
</load_balancer>
<ntpd>
<prefer>0.opnsense.pool.ntp.org</prefer>
<statsgraph>on</statsgraph>
<interface>lan</interface>
</ntpd>
<widgets>
<sequence>system_information-container:00000000-col3:show,services_status-container:00000001-col4:show,gateways-container:00000002-col4:show,interface_list-container:00000003-col4:show</sequence>
<column_count>2</column_count>
</widgets>
<revision>
<username>root@10.132.1.10</username>
<time>1554439445.3676</time>
<description>/api/captiveportal/settings/addZone/ made changes</description>
</revision>
<OPNsense>
<Firewall>
<Alias version="1.0.0">
<aliases/>
</Alias>
</Firewall>
<IDS version="1.0.2">
<rules/>
<userDefinedRules/>
<files/>
<fileTags/>
<general>
<enabled>0</enabled>
<ips>0</ips>
<promisc>0</promisc>
<interfaces>wan</interfaces>
<homenet>192.168.0.0/16,10.0.0.0/8,172.16.0.0/12</homenet>
<defaultPacketSize/>
<UpdateCron/>
<AlertLogrotate>W0D23</AlertLogrotate>
<AlertSaveLogs>4</AlertSaveLogs>
<MPMAlgo>ac</MPMAlgo>
<syslog>0</syslog>
<LogPayload>0</LogPayload>
</general>
</IDS>
<OpenVPNExport version="0.0.1">
<servers/>
</OpenVPNExport>
<TrafficShaper version="1.0.2">
<pipes/>
<queues/>
<rules/>
</TrafficShaper>
<ARPscanner version="1.0.0">
<general>
<interface>lan</interface>
<networks/>
</general>
</ARPscanner>
<freeradius>
<eap version="1.0.0">
<default_eap_type>md5</default_eap_type>
<enable_client_cert>0</enable_client_cert>
<ca/>
<certificate/>
<crl/>
</eap>
<ldap version="1.0.0">
<protocol>LDAPS</protocol>
<server/>
<identity/>
<password/>
<base_dn>dc=example,dc=domain,dc=com</base_dn>
<user_filter>(uid=%{%{Stripped-User-Name}:-%{User-Name}})</user_filter>
<group_filter>(objectClass=posixGroup)</group_filter>
</ldap>
<client version="1.0.0">
<clients>
<client uuid="5931ccc1-8b3a-4cd5-831b-d9bd5906e984">
<enabled>1</enabled>
<name>authnosred</name>
<secret>nw2gqat60</secret>
<ip>10.132.0.0/16</ip>
</client>
</clients>
</client>
<general version="1.0.0">
<enabled>1</enabled>
<vlanassign>0</vlanassign>
<ldap_enabled>0</ldap_enabled>
<wispr>1</wispr>
<chillispot>1</chillispot>
<mikrotik>1</mikrotik>
<sqlite>1</sqlite>
<sessionlimit>1</sessionlimit>
<log_destination>files</log_destination>
<log_authentication_request>1</log_authentication_request>
<log_authbadpass>1</log_authbadpass>
<log_authgoodpass>1</log_authgoodpass>
</general>
<user version="1.0.2">
<users>
<user uuid="f735861a-7bfd-4c2c-a6a1-2450b346f29e">
<enabled>1</enabled>
<username>kleper</username>
<password>ferkaton76</password>
<description>Usuario Kleper</description>
<ip/>
<subnet/>
<route/>
<ip6/>
<vlan/>
<logintime/>
<simuse/>
<wispr_bw_min_up/>
<wispr_bw_max_up/>
<wispr_bw_min_down/>
<wispr_bw_max_down/>
<chillispot_bw_max_up/>
<chillispot_bw_max_down/>
<mikrotik_vlan_id_number/>
<mikrotik_vlan_id_type/>
<sessionlimit_max_session_limit/>
</user>
</users>
</user>
</freeradius>
<Netflow version="1.0.0">
<capture>
<interfaces>lan</interfaces>
<egress_only>wan</egress_only>
<version>v9</version>
<targets/>
</capture>
<collect>
<enable>0</enable>
</collect>
</Netflow>
<cron version="1.0.1">
<jobs>
<job uuid="99c58055-2319-49fe-b941-ad1030604bcf">
<origin>AcmeClient</origin>
<enabled>1</enabled>
<minutes>0</minutes>
<hours>0</hours>
<days>*</days>
<months>*</months>
<weekdays>*</weekdays>
<who>root</who>
<command>acmeclient cron-auto-renew</command>
<parameters/>
<description>AcmeClient Cronjob for Certificate AutoRenewal</description>
</job>
</jobs>
</cron>
<AcmeClient version="1.5.0">
<settings>
<enabled>1</enabled>
<autoRenewal>1</autoRenewal>
<UpdateCron>99c58055-2319-49fe-b941-ad1030604bcf</UpdateCron>
<environment>prod</environment>
<challengePort>43580</challengePort>
<restartTimeout>600</restartTimeout>
<haproxyIntegration>0</haproxyIntegration>
<haproxyAclRef/>
<haproxyActionRef/>
<haproxyServerRef/>
<haproxyBackendRef/>
<logLevel>normal</logLevel>
</settings>
<accounts>
<account uuid="e49750e6-4d42-4047-94e7-abed03a2075a">
<id>5c7cab505cb087.20055669</id>
<enabled>1</enabled>
<name>NuestraRED.org</name>
<description>Acme NuestraRED Firewall</description>
<email>correo@nuestrared.org</email>
<certificateAuthority>letsencrypt</certificateAuthority>
<key>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</key>
<lastUpdate>1551674297</lastUpdate>
</account>
</accounts>
<certificates>
<certificate uuid="d2a09dcd-152b-4d48-9473-ad56edbcc8c4">
<id>5c7cab9aa643d0.89304687</id>
<enabled>1</enabled>
<name>fw.nuestrared.org</name>
<description>Certificado Firewall</description>
<altNames/>
<account>e49750e6-4d42-4047-94e7-abed03a2075a</account>
<validationMethod>b6df93fa-c08c-4829-90f9-8c9f9f870f8a</validationMethod>
<keyLength>key_4096</keyLength>
<ocsp>0</ocsp>
<restartActions/>
<autoRenewal>1</autoRenewal>
<renewInterval>60</renewInterval>
<certRefId>5c7caf43d381f</certRefId>
<lastUpdate>1551675203</lastUpdate>
<statusCode/>
<statusLastUpdate/>
</certificate>
</certificates>
<validations>
<validation uuid="b6df93fa-c08c-4829-90f9-8c9f9f870f8a">
<id>5c7cab7c72b502.94225746</id>
<enabled>1</enabled>
<name>DreamhostAPI</name>
<description>Dominios en Dreamhost</description>
<method>dns01</method>
<http_service>opnsense</http_service>
<http_opn_autodiscovery>1</http_opn_autodiscovery>
<http_opn_interface>wan</http_opn_interface>
<http_opn_ipaddresses/>
<http_haproxyInject>1</http_haproxyInject>
<http_haproxyFrontends/>
<dns_service>dns_dreamhost</dns_service>
<dns_sleep>120</dns_sleep>
<dns_ad_key/>
<dns_ali_key/>
<dns_ali_secret/>
<dns_autodns_user/>
<dns_autodns_password/>
<dns_autodns_context/>
<dns_aws_id/>
<dns_aws_secret/>
<dns_azuredns_subscriptionid/>
<dns_azuredns_tenantid/>
<dns_azuredns_appid/>
<dns_azuredns_clientsecret/>
<dns_cf_email/>
<dns_cf_key/>
<dns_cloudns_auth_id/>
<dns_cloudns_sub_auth_id/>
<dns_cloudns_auth_password/>
<dns_cx_key/>
<dns_cx_secret/>
<dns_cyon_user/>
<dns_cyon_password/>
<dns_da_key/>
<dns_da_insecure>1</dns_da_insecure>
<dns_dgon_key/>
<dns_dnsimple_token/>
<dns_do_pid/>
<dns_do_password/>
<dns_dp_id/>
<dns_dp_key/>
<dns_dh_key>9ZZB2XMH5X43TYMM</dns_dh_key>
<dns_duckdns_token/>
<dns_dyn_customer/>
<dns_dyn_user/>
<dns_dyn_password/>
<dns_dynu_clientid/>
<dns_dynu_secret/>
<dns_freedns_user/>
<dns_freedns_password/>
<dns_gandi_livedns_key/>
<dns_gd_key/>
<dns_gd_secret/>
<dns_he_user/>
<dns_he_password/>
<dns_infoblox_credentials/>
<dns_infoblox_server/>
<dns_inwx_user/>
<dns_inws_password/>
<dns_ispconfig_user/>
<dns_ispconfig_password/>
<dns_ispconfig_api/>
<dns_ispconfig_insecure>1</dns_ispconfig_insecure>
<dns_kinghost_username/>
<dns_kinghost_password/>
<dns_knot_server/>
<dns_knot_key/>
<dns_lexicon_provider>cloudflare</dns_lexicon_provider>
<dns_lexicon_user/>
<dns_lexicon_token/>
<dns_linode_key/>
<dns_lua_email/>
<dns_lua_key/>
<dns_me_key/>
<dns_me_secret/>
<dns_namecom_user/>
<dns_namecom_token/>
<dns_namesilo_key/>
<dns_nsone_key/>
<dns_nsupdate_server/>
<dns_nsupdate_key/>
<dns_ovh_app_key/>
<dns_ovh_app_secret/>
<dns_ovh_consumer_key/>
<dns_ovh_endpoint/>
<dns_pdns_url/>
<dns_pdns_serverid/>
<dns_pdns_token/>
<dns_sl_key/>
<dns_servercow_username/>
<dns_servercow_password/>
<dns_uno_key/>
<dns_uno_user/>
<dns_vscale_key/>
<dns_yandex_token/>
<dns_zilore_key/>
<dns_zm_key/>
<dns_gdnsdk_user/>
<dns_gdnsdk_password/>
<dns_acmedns_user/>
<dns_acmedns_password/>
<dns_acmedns_subdomain/>
<dns_acmedns_updateurl/>
</validation>
</validations>
<actions>
<action uuid="e81caf81-1230-447c-9522-016e03d77f86">
<id>5c7caeb7f09452.55378870</id>
<enabled>1</enabled>
<name>RenewFirewall</name>
<description/>
<type>restart_gui</type>
<highwinds_account_hash/>
<highwinds_access_token/>
<configd/>
</action>
</actions>
</AcmeClient>
<monit version="1.0.8">
<general>
<enabled>1</enabled>
<interval>120</interval>
<startdelay>120</startdelay>
<mailserver>127.0.0.1</mailserver>
<port>25</port>
<username>root</username>
<password>nosred2018</password>
<ssl>0</ssl>
<sslversion>auto</sslversion>
<sslverify>1</sslverify>
<logfile>syslog facility log_daemon</logfile>
<statefile/>
<eventqueuePath/>
<eventqueueSlots/>
<httpdEnabled>0</httpdEnabled>
<httpdUsername>root</httpdUsername>
<httpdPassword>TWbu5i5T0lm4LBLjnkSp</httpdPassword>
<httpdPort>2812</httpdPort>
<httpdAllow/>
<mmonitUrl/>
<mmonitTimeout>5</mmonitTimeout>
<mmonitRegisterCredentials>1</mmonitRegisterCredentials>
</general>
<alert uuid="293b06bb-ef1a-4fd9-b6ab-ca57bb054f6f">
<enabled>0</enabled>
<recipient>root@localhost.local</recipient>
<noton>0</noton>
<events/>
<format/>
<reminder>10</reminder>
<description/>
</alert>
<service uuid="b7e6c670-87f7-4564-b124-4f840e3827d3">
<enabled>1</enabled>
<name>$HOST</name>
<type>system</type>
<pidfile/>
<match/>
<path/>
<timeout>300</timeout>
<address/>
<interface/>
<start/>
<stop/>
<tests>0079eb63-53b6-4ec9-9fe8-4148ccd9f856,cf5e41d6-6721-49d0-aa32-1dbd614a92eb,dbb00b9b-ffcb-4833-94ef-15e4aaf43059,543e1993-5cf2-4db3-b625-3452d6c54c8e</tests>
<depends/>
</service>
<service uuid="21e7589f-b5fa-4498-97df-5d40547d870f">
<enabled>1</enabled>
<name>RootFs</name>
<type>filesystem</type>
<pidfile/>
<match/>
<path>/</path>
<timeout>300</timeout>
<address/>
<interface/>
<start/>
<stop/>
<tests>d45c8e90-5796-4e47-b159-67d4bf5b17dc</tests>
<depends/>
</service>
<service uuid="08e57331-0611-4ece-aca6-6cc978eaab4b">
<enabled>0</enabled>
<name>carp_status_change</name>
<type>custom</type>
<pidfile/>
<match/>
<path>/usr/local/opnsense/scripts/OPNsense/Monit/carp_status</path>
<timeout>300</timeout>
<address/>
<interface/>
<start/>
<stop/>
<tests>a0a620e0-6474-4906-809f-3c612f193d91</tests>
<depends/>
</service>
<service uuid="2328e0e1-6a5d-4c92-8755-c36154ca0c92">
<enabled>0</enabled>
<name>gateway_alert</name>
<type>custom</type>
<pidfile/>
<match/>
<path>/usr/local/opnsense/scripts/OPNsense/Monit/gateway_alert</path>
<timeout>300</timeout>
<address/>
<interface/>
<start/>
<stop/>
<tests>2b0582ff-d02c-482a-97b8-603902f5906f</tests>
<depends/>
</service>
<test uuid="8df0601b-db16-40ae-8732-85bea5a9300e">
<name>Ping</name>
<type>Custom</type>
<condition>failed ping</condition>
<action>alert</action>
<path/>
</test>
<test uuid="2217f0bb-b741-4ae7-94d8-bf734c7b9601">
<name>NetworkLink</name>
<type>Custom</type>
<condition>failed link</condition>
<action>alert</action>
<path/>
</test>
<test uuid="4344a2a0-51c2-44f3-a6f9-3c4887a200e6">
<name>NetworkSaturation</name>
<type>Custom</type>
<condition>saturation is greater than 75%</condition>
<action>alert</action>
<path/>
</test>
<test uuid="0079eb63-53b6-4ec9-9fe8-4148ccd9f856">
<name>MemoryUsage</name>
<type>Custom</type>
<condition>memory usage is greater than 75%</condition>
<action>alert</action>
<path/>
</test>
<test uuid="cf5e41d6-6721-49d0-aa32-1dbd614a92eb">
<name>CPUUsage</name>
<type>Custom</type>
<condition>cpu usage is greater than 75%</condition>
<action>alert</action>
<path/>
</test>
<test uuid="dbb00b9b-ffcb-4833-94ef-15e4aaf43059">
<name>LoadAvg1</name>
<type>Custom</type>
<condition>loadavg (1min) is greater than 8</condition>
<action>alert</action>
<path/>
</test>
<test uuid="543e1993-5cf2-4db3-b625-3452d6c54c8e">
<name>LoadAvg5</name>
<type>Custom</type>
<condition>loadavg (5min) is greater than 6</condition>
<action>alert</action>
<path/>
</test>
<test uuid="77abdb89-9b51-4eaf-8546-a4dea9caa863">
<name>LoadAvg15</name>
<type>Custom</type>
<condition>loadavg (15min) is greater than 4</condition>
<action>alert</action>
<path/>
</test>
<test uuid="d45c8e90-5796-4e47-b159-67d4bf5b17dc">
<name>SpaceUsage</name>
<type>Custom</type>
<condition>space usage is greater than 75%</condition>
<action>alert</action>
<path/>
</test>
<test uuid="a0a620e0-6474-4906-809f-3c612f193d91">
<name>ChangedStatus</name>
<type>Custom</type>
<condition>changed status</condition>
<action>alert</action>
<path/>
</test>
<test uuid="2b0582ff-d02c-482a-97b8-603902f5906f">
<name>NonZeroStatus</name>
<type>Custom</type>
<condition>status != 0</condition>
<action>alert</action>
<path/>
</test>
</monit>
<proxy version="1.0.3">
<general>
<enabled>0</enabled>
<icpPort/>
<logging>
<enable>
<accessLog>1</accessLog>
<storeLog>1</storeLog>
</enable>
<ignoreLogACL/>
<target/>
</logging>
<alternateDNSservers/>
<dnsV4First>1</dnsV4First>
<forwardedForHandling>on</forwardedForHandling>
<uriWhitespaceHandling>strip</uriWhitespaceHandling>
<useViaHeader>1</useViaHeader>
<suppressVersion>1</suppressVersion>
<VisibleEmail>correo@nuestrared.org</VisibleEmail>
<VisibleHostname>nuestrared.org</VisibleHostname>
<cache>
<local>
<enabled>0</enabled>
<directory>/var/squid/cache</directory>
<cache_mem>256</cache_mem>
<maximum_object_size>2</maximum_object_size>
<size>256</size>
<l1>16</l1>
<l2>256</l2>
<cache_linux_packages>1</cache_linux_packages>
<cache_windows_updates>1</cache_windows_updates>
</local>
</cache>
<traffic>
<enabled>0</enabled>
<maxDownloadSize>2048</maxDownloadSize>
<maxUploadSize>1024</maxUploadSize>
<OverallBandwidthTrotteling>1024</OverallBandwidthTrotteling>
<perHostTrotteling>256</perHostTrotteling>
</traffic>
<parentproxy>
<enabled>0</enabled>
<host/>
<enableauth>0</enableauth>
<user>username</user>
<password>password</password>
<port/>
<localdomains/>
<localips/>
</parentproxy>
</general>
<forward>
<interfaces>lan</interfaces>
<port>3128</port>
<sslbumpport>3129</sslbumpport>
<sslbump>0</sslbump>
<sslurlonly>0</sslurlonly>
<sslcertificate>5c7caf43d2e5f</sslcertificate>
<sslnobumpsites>.nuestrared.org</sslnobumpsites>
<ssl_crtd_storage_max_size>16</ssl_crtd_storage_max_size>
<sslcrtd_children>8</sslcrtd_children>
<snmp_enable>0</snmp_enable>
<snmp_port>3401</snmp_port>
<snmp_password>public</snmp_password>
<ftpInterfaces/>
<ftpPort>2121</ftpPort>
<ftpTransparentMode>0</ftpTransparentMode>
<addACLforInterfaceSubnets>1</addACLforInterfaceSubnets>
<transparentMode>0</transparentMode>
<acl>
<allowedSubnets>10.132.0.0/16</allowedSubnets>
<unrestricted/>
<bannedHosts/>
<whiteList/>
<blackList/>
<browser/>
<mimeType/>
<safePorts>80:http,21:ftp,443:https,70:gopher,210:wais,1025-65535:unregistered ports,280:http-mgmt,488:gss-http,591:filemaker,777:multiling http</safePorts>
<sslPorts>443:https</sslPorts>
<remoteACLs>
<blacklists>
<blacklist uuid="c69cdd7a-6cc7-4b89-87b5-37af452c23e9">
<enabled>1</enabled>
<filename>shallalist</filename>
<url>http://www.shallalist.de/Downloads/shallalist.tar.gz</url>
<username/>
<password/>
<filter>finance/moneylending,automobile/boats,porn,ringtones,drugs,socialnet,dynamic,anonvpn,library,science/astronomy,costtraps,finance/insurance,chat,politics,searchengines,shopping,aggressive,hospitals,urlshortener,adv,weapons,updatesites,recreation/restaurants,radiotv,alcohol,isp,finance/trading,webmail,sex/lingerie,religion,tracker,music,automobile/planes,hobby/gardening,recreation/humor,hobby/games-misc,redirector,gamble,fortunetelling,jobsearch,finance/banking,hobby/cooking,webtv,government,models,automobile/bikes,downloads,hobby/pets,warez,homestyle,recreation/martialarts,spyware,recreation/wellness,news,hobby/games-online,recreation/travel,webphone,sex/education,finance/other,automobile/cars,dating,remotecontrol,forum,violence,imagehosting,podcasts,movies,webradio,military,hacking,finance/realestate,science/chemistry,education/schools,recreation/sports</filter>
<sslNoVerify>1</sslNoVerify>
<description>Shallalist Blacklist</description>
</blacklist>
</blacklists>
<UpdateCron/>
</remoteACLs>
</acl>
<icap>
<enable>0</enable>
<RequestURL>icap://[::1]:1344/avscan</RequestURL>
<ResponseURL>icap://[::1]:1344/avscan</ResponseURL>
<SendClientIP>1</SendClientIP>
<SendUsername>0</SendUsername>
<EncodeUsername>0</EncodeUsername>
<UsernameHeader>X-Username</UsernameHeader>
<EnablePreview>1</EnablePreview>
<PreviewSize>1024</PreviewSize>
<OptionsTTL>60</OptionsTTL>
<exclude/>
</icap>
<authentication>
<method/>
<realm>OPNsense proxy authentication</realm>
<credentialsttl>2</credentialsttl>
<children>5</children>
</authentication>
</forward>
<pac/>
</proxy>
<captiveportal version="1.0.0">
<zones>
<zone uuid="daac5008-816c-4d4e-8dde-b03942bb4a77">
<enabled>1</enabled>
<zoneid>0</zoneid>
<interfaces>lan</interfaces>
<authservers>RadiusAuthNosRed,VaucherAuthNosred</authservers>
<alwaysSendAccountingReqs>1</alwaysSendAccountingReqs>
<authEnforceGroup/>
<idletimeout>15</idletimeout>
<hardtimeout>30</hardtimeout>
<concurrentlogins>1</concurrentlogins>
<certificate>5c7caf43d381f</certificate>
<servername>fw.nuestrared.org</servername>
<allowedAddresses/>
<allowedMACAddresses/>
<transparentHTTPProxy>0</transparentHTTPProxy>
<transparentHTTPSProxy>0</transparentHTTPSProxy>
<template/>
<description>NuestraRED.org CaptivePortal</description>
</zone>
</zones>
<templates/>
</captiveportal>
</OPNsense>
<gateways>
<gateway_item>
<descr>Interface WAN Gateway</descr>
<defaultgw>1</defaultgw>
<ipprotocol>inet</ipprotocol>
<interface>wan</interface>
<gateway>192.168.100.1</gateway>
<monitor_disable>1</monitor_disable>
<name>GW_WAN</name>
<interval>1</interval>
<weight>1</weight>
</gateway_item>
</gateways>
<ca>
<crt>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</crt>
<refid>5c7caf43d2e5f</refid>
<descr>Let's Encrypt Authority X3 (Let's Encrypt)</descr>
</ca>
<cert>
<refid>5c7c9b01656eb</refid>
<descr>Web GUI SSL certificate</descr>
<crt>LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUZiekNDQTFlZ0F3SUJBZ0lKQVA1QkM2Wlo2RzNVTUEwR0NTcUdTSWIzRFFFQkN3VUFNRTR4Q3pBSkJnTlYKQkFZVEFrNU1NUlV3RXdZRFZRUUlEQXhhZFdsa0xVaHZiR3hoYm1ReEZUQVRCZ05WQkFjTURFMXBaR1JsYkdoaApjbTVwY3pFUk1BOEdBMVVFQ2d3SVQxQk9jMlZ1YzJVd0hoY05NVGt3TXpBME1ETXlOalU0V2hjTk1qQXdNekF6Ck1ETXlOalU1V2pCT01Rc3dDUVlEVlFRR0V3Sk9UREVWTUJNR0ExVUVDQXdNV25WcFpDMUliMnhzWVc1a01SVXcKRXdZRFZRUUhEQXhOYVdSa1pXeG9ZWEp1YVhNeEVUQVBCZ05WQkFvTUNFOVFUbk5sYm5ObE1JSUNJakFOQmdrcQpoa2lHOXcwQkFRRUZBQU9DQWc4QU1JSUNDZ0tDQWdFQW9mZmg1dk1ZOXZ1R1FYSEk5aXhvZFo2aHoyZWZ6UDVkCkVNUlcxbFJmZldtMDFJbCsycmtNR3dkZzhwK0U0eE8xYytITmhJTzNnN0JyRUY4YTBYcmZydUJSVEdXWjFWb1cKNjdDTzNVVTh2ZVlZd25DMTd4emFTdG9zYktiMVQvVmsrMHZuUmY2djRTS2FRSG4xR1VNdGlVb1pYTGdUWkp1TAp2aXYweUl6aGd6MUhhMjB3bTRPcjhJZFA2UEpjcVM3L2owUXFYb2RiQ0lLd3NVcVhwTEMreWYwSGFDS0JXM0RDCmdmS0dlVFdyeFppaXpZQmhvUWp4SG5SNEt5WXpJekhKTkpFQzFQQWxqeUJGUTRmQ0FVREhpY0Z3aEtNU0ppTzYKUkFpVktjR092THA1T0FGQjhueTdlK0xkMjNtd1IvUHZkNkRZL1o5dVpiMGsvNVN6WGo0VGZSd1R0dlVHS2orVgpDUVdUbWV4MWRXUUlpckZvRHBhdHl3Zzd3VUx1K1pKZEYvZjBKdWJnUEFDY3Bpbms1ZzJwVStCSlNtYi9ObUFOClloTEg2UFRHenI1QUxneFdMcW5xb1lMenh2ZkYva05lTkhVdmwyQURDUjdvNzJ0Wnk2YnZpZXd1Mk9PZTI1WXQKdW1UY3pVNzJ6WWtGcVRxelI0elhkbGFEYXZjUUhCVnZMejN3eFpwajRGTnQ4ais1RWJoZHRGRk5SNlBET0R2KwpKeUhBcUxJUXdPOVEyRzFwaHN6S0t1Tk1OTjBCTTcrcDBhZENQeG5RaU53eG9NYlNuVGhJZTVvbmdadUVzNll4Cm5QZFpDQkc1UXhUaGt1WWYrSmc0VllHVTR6eUpJaWFOeXR5Mmg5T01tYU15Q1NtZDg5QmhibUxMcm1Hb3UrbTIKSUZtQ1hXQ0l2M2tDQXdFQUFhTlFNRTR3SFFZRFZSME9CQllFRktDY1hHRlZNRUNFcE5FTmZNTFFmRUMvUEQyWQpNQjhHQTFVZEl3UVlNQmFBRktDY1hHRlZNRUNFcE5FTmZNTFFmRUMvUEQyWU1Bd0dBMVVkRXdRRk1BTUJBZjh3CkRRWUpLb1pJaHZjTkFRRUxCUUFEZ2dJQkFBVnEvcm54M0llaVJKSzlhVnN5VmpwZWRlQUxqN0o1U2d1Mk85d0oKczhtVFNoT3lOa2VraTFsWGNHcER4bTRqTWNYRkF6OEgwTjJiazdFUUNrSHNGdGRVdEZEbVJjWHRpKzBnbGVIdgpoei9UWWF5UkE4UEtEdm0wb1pQcWx2dU9EV1BJQUw2RExLWkxES3ZSa3hFRXVGdEFyK0JmenJjc2VEcCt3UVFHCmg1c1VKaGhQT2VGR2J0K0hjRmE1QWIrREJnb3dmeFVGdENVa3l3dEpybnBGTHhsSGxBQ0FYTk9odXFzUzE1NnkKaDJXZGJ1WEZ1cG8rUHBRRkk2dDY1V0ZiK2VDL255MDdWWXM2Wm1lem1Eb1l3dEFiWURrcDZCT0NhTmx2UVA2TApKeXAzVHVUaGhTcVVBb3dhTmNYZmV3T3FpbTJkNnIrR3R6SG5xTHd5UWJid1c2VjlEdW9HY0lzU3ZQajBVeHFJCldzd3pGVDBjRVdwaHJZRWVmL1VSMWpiUHJFY3Y0YWFCTWxqNEVyYTBVeVQ1MUsxSnpCRHY1YmxESkhlM2N3NEcKTmFOczBnQ0pjbHE3WWJpNVQwUDFjMTlMUmJzb3hLVWtUREk3c0lhSnE4K1JUVmZSUFNwQ0F4OWlFbmh5aEpGMgpjSlJBMU1GT1BoY3RuNS8wYUVaTlJNS1JOeVZRUlFvQzBPc3pPSmxuWk43cHVSRy9TVUpwNEpSMzYyNEw5Vk1iCkFXbTduMGFUdXlMbEd0dEllaC9xOUh5Qk4yV0lHcTNLMHlXUFNYNDFpK0Z3ZnRRU2hnTVAyRU5wSGVzdndTU08KOUsrVDljRzAra1lvRmRHYnBSSXRkaUFRZ1g4U0RvWEViUHlrVzU4VG9BR1NNWm5lVUMwaE4wWTJKOGdWTjJTVwpmNTVzCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K</crt>
<prv>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</prv>
</cert>
<cert>
<refid>5c7caf43d381f</refid>
<caref>5c7caf43d2e5f</caref>
<descr>fw.nuestrared.org (Let's Encrypt)</descr>
<crt>LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUdXekNDQlVPZ0F3SUJBZ0lTQTlEdFN2dHZVTWlVOHNudjNMQXc5R1h0TUEwR0NTcUdTSWIzRFFFQkN3VUEKTUVveEN6QUpCZ05WQkFZVEFsVlRNUll3RkFZRFZRUUtFdzFNWlhRbmN5QkZibU55ZVhCME1TTXdJUVlEVlFRRApFeHBNWlhRbmN5QkZibU55ZVhCMElFRjFkR2h2Y21sMGVTQllNekFlRncweE9UQXpNRFF3TXpVek1qSmFGdzB4Ck9UQTJNREl3TXpVek1qSmFNQnd4R2pBWUJnTlZCQU1URVdaM0xtNTFaWE4wY21GeVpXUXViM0puTUlJQ0lqQU4KQmdrcWhraUc5dzBCQVFFRkFBT0NBZzhBTUlJQ0NnS0NBZ0VBcW1ObncyMU1XWlNHSjkzRFU5aEUwWXhndlVoaApMVzVuMnJlRzVwdmpkVmtBZVlGWEJkakd1YVBiUCs1dHQ5aUpKRFlSYjhTdTNqVVhvcjlheTZFWkFCU0dUTElPClVpOWhrTFdOYitPWnZQWTQvMnIxM3U3eDFKU213MkZyUFhRLzhnZnNreWVPTXRGb1lxT3czQ2NjbCtCaUtZb3UKY29OS1dnckh3MkpRelhCams5bjlNaFY4NEJHdHNBb3NqNURoLzRGYjI4Q1FDSERJN1ErZ2VocEVQR0U0LzBsUAprdzVZc3g2aFNEN3pFZ0dCbm1NYlNrOVVNT1FFQ0FHZ0ludUxZYzBiUUg1Zkk3bE9BTGwzSjc3MVBxcTFoZkdJCmpnNHZyQ0dtMENnSzhyWGRMcVdBZytzWGxKdVBpWG93V0RYMUhFWW1FUTRnMENpVVI1eVRkbzgyK2NMWEZvUU8KZ01FQUREQ2NUYmFjVFNaakp4bjlhN0Y3VndFWlJjMEdjOEF0SkVDSkFKMzJUK291RU1KeHhiTW5aVmE1blJqNAo4T1k1R3pYakN3ZnhMSlRUTDR4OERKRGw1ZlBSMFk4QjF1UkduYk5OaVg0aUdzSU4rbVdFaWpGMitZMlFwazRZCjYzZ0xSdHhNeFBIbFE2NXM5Z0RTQVNIUDNES1k4di85dVJma2Zld0hmdk9wRzgxbFJSS2FCZnRwbkw0UW9lUE4KR25kNGxxT3JERVdzM1VpZlhWWm15NDJSeEIyelh4dWQ1bjVoeVhwSFVaaVBBMUdSZndqeVNJMTNzZWRHT1cxdApWWEF5THdUdmlHaXpaNExBaVJQeWVoeWdCS2p2dmRFenoyMlhLcVV3MFVhODRRSXI2TFExU3pPeFVsYmtIT2pvCitiMzZlMkdycFpLMWNZOENBd0VBQWFPQ0FtY3dnZ0pqTUE0R0ExVWREd0VCL3dRRUF3SUZvREFkQmdOVkhTVUUKRmpBVUJnZ3JCZ0VGQlFjREFRWUlLd1lCQlFVSEF3SXdEQVlEVlIwVEFRSC9CQUl3QURBZEJnTlZIUTRFRmdRVQpocHNGbXkrQ3RNWWRNZ2E5My9oVStoVFM3UWd3SHdZRFZSMGpCQmd3Rm9BVXFFcHFZd1I5M2JybTBUbTNwa1ZsCjcvT283S0V3YndZSUt3WUJCUVVIQVFFRVl6QmhNQzRHQ0NzR0FRVUZCekFCaGlKb2RIUndPaTh2YjJOemNDNXAKYm5RdGVETXViR1YwYzJWdVkzSjVjSFF1YjNKbk1DOEdDQ3NHQVFVRkJ6QUNoaU5vZEhSd09pOHZZMlZ5ZEM1cApiblF0ZURNdWJHVjBjMlZ1WTNKNWNIUXViM0puTHpBY0JnTlZIUkVFRlRBVGdoRm1keTV1ZFdWemRISmhjbVZrCkxtOXlaekJNQmdOVkhTQUVSVEJETUFnR0JtZUJEQUVDQVRBM0Jnc3JCZ0VFQVlMZkV3RUJBVEFvTUNZR0NDc0cKQVFVRkJ3SUJGaHBvZEhSd09pOHZZM0J6TG14bGRITmxibU55ZVhCMExtOXlaekNDQVFVR0Npc0dBUVFCMW5rQwpCQUlFZ2ZZRWdmTUE4UUIzQU9KcFM2NG02T2xBQ2VpR0c3WTdnOVErNS81MGlQdWtqeWlUQVozZDhkditBQUFCCmFVY01uRGtBQUFRREFFZ3dSZ0loQU1yMEJ2VVhkSWVvc2M0MDF1bDM5VFkwRnBkOENkRE9Ocm5lQWdEWXd0Wm4KQWlFQSs2V2xpRDBDT1dkbFF0VXpBRjM0ZzJCV2dlYXBDK1l5VTRuVGpDZGJFUXNBZGdCajh0dk42RHZNTE04TApjb1FuVjJzenBJMWhkNCs5ZGFZNHNjZG9WRXZZalFBQUFXbEhESnlQQUFBRUF3QkhNRVVDSVFDaXFWSXFBU2M0Ckpmbk5uMXIrUmpIbW91aTFpTjdGSlU2WTNHMUg0dzU2YWdJZ0krc1I2aGhTbGZFcENWVk5XVDNRNW55WGFXZmMKbUxXT3pvRTZjSVdyS0VJd0RRWUpLb1pJaHZjTkFRRUxCUUFEZ2dFQkFCSXVNaUpyVWpqc1ExUjdzS09WT1JzdApwQ0FUZHEvWGY0SGlVSjRsYTRpa1YrcXo4RmxHOGEzZzlsMk1kYnNiZ09TVUdQS0I2VUlyQSsyOUdqT2xYNnNWCkZmTER4R0FyWTVBTUU1bm5aUmJoaHpNVnNqek1iV2FQTkJyS3NNWHRkeGdjVlI4SDIyVWpjbkVsa1hmb3JWWkUKZURBditudWR3ZHJya0RBQ2tCSURBVXZHSGNXbitrd0wrKzJrSzg3NS9uMkdyMzhhTllJMVI2RUwxVWtBTUNGTwpqM28ybEhsN2Nsc2FYNXE3b0M5bjU4cU5sTms5TmNvanZGR2paTlJCb3c0THlkalBETVRPZzVvRnBCTko3WVo4CkxUM1dWNGxtWTgvRS81Ryt2b3ZBa2R1eldMV2ZVK0lBWHh2NTF5dmVIdXJZVWc4TEMvL0srNkZTUEg1RDByUT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=</crt>
<prv>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</prv>
</cert>
<ppps>
<ppp/>
</ppps>
<staticroutes>
<route/>
</staticroutes>
</opnsense>