<?xml version="1.0"?>
<opnsense>
  <theme>opnsense</theme>
  <sysctl>
    <item>
      <descr>Increase UFS read-ahead speeds to match the state of hard drives and NCQ.</descr>
      <tunable>vfs.read_max</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>Set the ephemeral port range to be lower.</descr>
      <tunable>net.inet.ip.portrange.first</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>Drop packets to closed TCP ports without returning a RST</descr>
      <tunable>net.inet.tcp.blackhole</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>Do not send ICMP port unreachable messages for closed UDP ports</descr>
      <tunable>net.inet.udp.blackhole</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>Randomize the ID field in IP packets</descr>
      <tunable>net.inet.ip.random_id</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>
        Source routing is another way for an attacker to try to reach non-routable addresses behind your box.
        It can also be used to probe for information about your internal networks. These functions come enabled
        as part of the standard FreeBSD core system.
      </descr>
      <tunable>net.inet.ip.sourceroute</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>
        Source routing is another way for an attacker to try to reach non-routable addresses behind your box.
        It can also be used to probe for information about your internal networks. These functions come enabled
        as part of the standard FreeBSD core system.
      </descr>
      <tunable>net.inet.ip.accept_sourceroute</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>
        This option turns off the logging of redirect packets because there is no limit and this could fill
        up your logs consuming your whole hard drive.
      </descr>
      <tunable>net.inet.icmp.log_redirect</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>Drop SYN-FIN packets (breaks RFC1379, but nobody uses it anyway)</descr>
      <tunable>net.inet.tcp.drop_synfin</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>Enable sending IPv6 redirects</descr>
      <tunable>net.inet6.ip6.redirect</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>Enable privacy settings for IPv6 (RFC 4941)</descr>
      <tunable>net.inet6.ip6.use_tempaddr</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>Prefer privacy addresses and use them over the normal addresses</descr>
      <tunable>net.inet6.ip6.prefer_tempaddr</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>Generate SYN cookies for outbound SYN-ACK packets</descr>
      <tunable>net.inet.tcp.syncookies</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>Maximum incoming/outgoing TCP datagram size (receive)</descr>
      <tunable>net.inet.tcp.recvspace</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>Maximum incoming/outgoing TCP datagram size (send)</descr>
      <tunable>net.inet.tcp.sendspace</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>Do not delay ACK to try and piggyback it onto a data packet</descr>
      <tunable>net.inet.tcp.delayed_ack</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>Maximum outgoing UDP datagram size</descr>
      <tunable>net.inet.udp.maxdgram</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>Handling of non-IP packets which are not passed to pfil (see if_bridge(4))</descr>
      <tunable>net.link.bridge.pfil_onlyip</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>Set to 1 to additionally filter on the physical interface for locally destined packets</descr>
      <tunable>net.link.bridge.pfil_local_phys</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>Set to 0 to disable filtering on the incoming and outgoing member interfaces.</descr>
      <tunable>net.link.bridge.pfil_member</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>Set to 1 to enable filtering on the bridge interface</descr>
      <tunable>net.link.bridge.pfil_bridge</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>Allow unprivileged access to tap(4) device nodes</descr>
      <tunable>net.link.tap.user_open</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>Randomize PID's (see src/sys/kern/kern_fork.c: sysctl_kern_randompid())</descr>
      <tunable>kern.randompid</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>Maximum size of the IP input queue</descr>
      <tunable>net.inet.ip.intr_queue_maxlen</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>Disable CTRL+ALT+Delete reboot from keyboard.</descr>
      <tunable>hw.syscons.kbd_reboot</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>Enable TCP extended debugging</descr>
      <tunable>net.inet.tcp.log_debug</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>Set ICMP Limits</descr>
      <tunable>net.inet.icmp.icmplim</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>TCP Offload Engine</descr>
      <tunable>net.inet.tcp.tso</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>UDP Checksums</descr>
      <tunable>net.inet.udp.checksum</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>Maximum socket buffer size</descr>
      <tunable>kern.ipc.maxsockbuf</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>Page Table Isolation (Meltdown mitigation, requires reboot.)</descr>
      <tunable>vm.pmap.pti</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>Disable Indirect Branch Restricted Speculation (Spectre V2 mitigation)</descr>
      <tunable>hw.ibrs_disable</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>Hide processes running as other groups</descr>
      <tunable>security.bsd.see_other_gids</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>Hide processes running as other users</descr>
      <tunable>security.bsd.see_other_uids</tunable>
      <value>default</value>
    </item>
    <item>
      <descr>Enable/disable sending of ICMP redirects in response to IP packets for which a better,
        and for the sender directly reachable, route and next hop is known.
      </descr>
      <tunable>net.inet.ip.redirect</tunable>
      <value>0</value>
    </item>
    <item>
      <descr>
        Redirect attacks are the purposeful mass-issuing of ICMP type 5 packets. In a normal network, redirects
        to the end stations should not be required. This option enables the NIC to drop all inbound ICMP redirect
        packets without returning a response.
      </descr>
      <tunable>net.inet.icmp.drop_redirect</tunable>
      <value>1</value>
    </item>
    <item>
      <descr>Maximum outgoing UDP datagram size</descr>
      <tunable>net.local.dgram.maxdgram</tunable>
      <value>default</value>
    </item>
  </sysctl>
  <system>
    <optimization>normal</optimization>
    <hostname>CSE-BB-GW</hostname>
    <domain>tut.ac.za</domain>
    <dnsallowoverride>1</dnsallowoverride>
    <group>
      <name>admins</name>
      <description>System Administrators</description>
      <scope>system</scope>
      <gid>1999</gid>
      <member>0</member>
      <priv>page-all</priv>
    </group>
    <user>
      <name>root</name>
      <descr>System Administrator</descr>
      <scope>system</scope>
      <groupname>admins</groupname>
      <password>$2y$10$R0o6yNwnGki4r54EtksF7uOizpBrNkTugGaPLFt509yCQ8W8H1cMm</password>
      <uid>0</uid>
    </user>
    <nextuid>2000</nextuid>
    <nextgid>2000</nextgid>
    <timezone>Africa/Johannesburg</timezone>
    <timeservers>tut.ac.za</timeservers>
    <webgui>
      <protocol>https</protocol>
      <ssl-certref>5f5a419c30b1d</ssl-certref>
      <port/>
      <ssl-ciphers/>
      <interfaces/>
      <compression/>
    </webgui>
    <disablenatreflection>yes</disablenatreflection>
    <usevirtualterminal>1</usevirtualterminal>
    <disableconsolemenu>1</disableconsolemenu>
    <disablevlanhwfilter>1</disablevlanhwfilter>
    <disablechecksumoffloading>1</disablechecksumoffloading>
    <disablesegmentationoffloading>1</disablesegmentationoffloading>
    <disablelargereceiveoffloading>1</disablelargereceiveoffloading>
    <ipv6allow/>
    <powerd_ac_mode>hadp</powerd_ac_mode>
    <powerd_battery_mode>hadp</powerd_battery_mode>
    <powerd_normal_mode>hadp</powerd_normal_mode>
    <bogons>
      <interval>monthly</interval>
    </bogons>
    <backupcount>60</backupcount>
    <crypto_hardware>aesni</crypto_hardware>
    <pf_share_forward>1</pf_share_forward>
    <lb_use_sticky>1</lb_use_sticky>
    <ssh>
      <group>admins</group>
      <noauto>1</noauto>
      <interfaces/>
      <kex/>
      <ciphers/>
      <macs/>
      <keys/>
      <enabled>enabled</enabled>
      <permitrootlogin>1</permitrootlogin>
      <passwordauth>1</passwordauth>
    </ssh>
    <backup>
      <nextcloud version="1.0.0">
        <enabled>0</enabled>
        <url/>
        <user/>
        <password/>
        <password_encryption/>
        <backupdir>OPNsense-Backup</backupdir>
      </nextcloud>
    </backup>
    <dnsserver>168.172.121.1</dnsserver>
    <dnsserver>168.172.64.19</dnsserver>
    <language>en_US</language>
    <serialspeed>115200</serialspeed>
    <primaryconsole>video</primaryconsole>
    <firmware version="1.0.0">
      <mirror/>
      <flavour/>
      <plugins>os-virtualbox,os-sunnyvalley</plugins>
      <type/>
    </firmware>
    <prefer_ipv4>1</prefer_ipv4>
    <dnsallowoverride_exclude/>
    <dnslocalhost>1</dnslocalhost>
    <dns1gw>TUT_DHCP</dns1gw>
    <dns2gw>TUT_DHCP</dns2gw>
    <dns3gw>none</dns3gw>
    <dns4gw>none</dns4gw>
    <dns5gw>none</dns5gw>
    <dns6gw>none</dns6gw>
    <dns7gw>none</dns7gw>
    <dns8gw>none</dns8gw>
  </system>
  <interfaces>
    <lan>
      <if>em0</if>
      <descr/>
      <enable>1</enable>
      <spoofmac/>
      <ipaddr>10.0.0.254</ipaddr>
      <subnet>21</subnet>
    </lan>
    <lo0>
      <internal_dynamic>1</internal_dynamic>
      <descr>Loopback</descr>
      <enable>1</enable>
      <if>lo0</if>
      <ipaddr>127.0.0.1</ipaddr>
      <ipaddrv6>::1</ipaddrv6>
      <subnet>8</subnet>
      <subnetv6>128</subnetv6>
      <type>none</type>
      <virtual>1</virtual>
    </lo0>
    <opt1>
      <if>em1</if>
      <descr>TUT</descr>
      <enable>1</enable>
      <lock>1</lock>
      <spoofmac/>
      <ipaddr>dhcp</ipaddr>
      <dhcphostname/>
      <alias-address/>
      <alias-subnet>32</alias-subnet>
      <dhcprejectfrom/>
      <adv_dhcp_pt_timeout/>
      <adv_dhcp_pt_retry/>
      <adv_dhcp_pt_select_timeout/>
      <adv_dhcp_pt_reboot/>
      <adv_dhcp_pt_backoff_cutoff/>
      <adv_dhcp_pt_initial_interval/>
      <adv_dhcp_pt_values>SavedCfg</adv_dhcp_pt_values>
      <adv_dhcp_send_options/>
      <adv_dhcp_request_options/>
      <adv_dhcp_required_options/>
      <adv_dhcp_option_modifiers/>
      <adv_dhcp_config_advanced/>
      <adv_dhcp_config_file_override/>
      <adv_dhcp_config_file_override_path/>
    </opt1>
    <opt2>
      <if>em2</if>
      <descr>AA</descr>
      <enable>1</enable>
      <lock>1</lock>
      <spoofmac/>
      <ipaddr>10.10.10.254</ipaddr>
      <subnet>24</subnet>
    </opt2>
  </interfaces>
  <dhcpd>
    <lan>
      <range>
        <from>10.0.0.10</from>
        <to>10.0.0.245</to>
      </range>
    </lan>
  </dhcpd>
  <unbound>
    <custom_options/>
    <enable>1</enable>
    <noreglladdr6>1</noreglladdr6>
    <cache_max_ttl/>
    <cache_min_ttl/>
    <incoming_num_tcp>10</incoming_num_tcp>
    <infra_cache_numhosts>10000</infra_cache_numhosts>
    <infra_host_ttl>900</infra_host_ttl>
    <jostle_timeout>200</jostle_timeout>
    <log_verbosity>1</log_verbosity>
    <msgcachesize>50</msgcachesize>
    <num_queries_per_thread>4096</num_queries_per_thread>
    <outgoing_num_tcp>10</outgoing_num_tcp>
    <unwanted_reply_threshold/>
  </unbound>
  <snmpd>
    <syslocation/>
    <syscontact/>
    <rocommunity>public</rocommunity>
  </snmpd>
  <syslog>
    <reverse/>
  </syslog>
  <nat>
    <outbound>
      <mode>automatic</mode>
    </outbound>
  </nat>
  <filter>
    <rule>
      <type>block</type>
      <interface>opt2,lan,opt1</interface>
      <ipprotocol>inet6</ipprotocol>
      <statetype>keep state</statetype>
      <direction>any</direction>
      <floating>yes</floating>
      <quick>1</quick>
      <source>
        <any>1</any>
      </source>
      <destination>
        <any>1</any>
      </destination>
      <updated>
        <username>root@10.0.0.2</username>
        <time>1639061246.3689</time>
        <description>/firewall_rules_edit.php made changes</description>
      </updated>
      <created>
        <username>root@10.0.0.2</username>
        <time>1639061246.3709</time>
        <description>/firewall_rules_edit.php made changes</description>
      </created>
    </rule>
    <rule>
      <type>pass</type>
      <ipprotocol>inet</ipprotocol>
      <statetype>keep state</statetype>
      <direction>in</direction>
      <floating>yes</floating>
      <quick>1</quick>
      <protocol>tcp</protocol>
      <source>
        <any>1</any>
      </source>
      <destination>
        <network>(self)</network>
        <port>443</port>
      </destination>
      <updated>
        <username>root@10.0.0.2</username>
        <time>1599745034.8933</time>
        <description>/firewall_rules_edit.php made changes</description>
      </updated>
      <created>
        <username>root@10.0.0.2</username>
        <time>1599745034.8934</time>
        <description>/firewall_rules_edit.php made changes</description>
      </created>
    </rule>
    <rule>
      <type>pass</type>
      <ipprotocol>inet</ipprotocol>
      <statetype>keep state</statetype>
      <direction>in</direction>
      <floating>yes</floating>
      <quick>1</quick>
      <protocol>tcp</protocol>
      <source>
        <any>1</any>
      </source>
      <destination>
        <network>(self)</network>
        <port>8338</port>
      </destination>
      <updated>
        <username>root@168.172.250.32</username>
        <time>1600257828.0251</time>
        <description>/firewall_rules_edit.php made changes</description>
      </updated>
      <created>
        <username>root@168.172.250.32</username>
        <time>1600257828.0251</time>
        <description>/firewall_rules_edit.php made changes</description>
      </created>
      <disabled>1</disabled>
    </rule>
    <rule>
      <type>pass</type>
      <ipprotocol>inet</ipprotocol>
      <statetype>keep state</statetype>
      <direction>in</direction>
      <floating>yes</floating>
      <quick>1</quick>
      <protocol>tcp</protocol>
      <source>
        <any>1</any>
      </source>
      <destination>
        <network>(self)</network>
        <port>666</port>
      </destination>
      <updated>
        <username>root@168.172.250.32</username>
        <time>1600260240.0222</time>
        <description>/firewall_rules_edit.php made changes</description>
      </updated>
      <created>
        <username>root@168.172.250.32</username>
        <time>1600260240.0223</time>
        <description>/firewall_rules_edit.php made changes</description>
      </created>
      <disabled>1</disabled>
    </rule>
    <rule>
      <type>pass</type>
      <ipprotocol>inet</ipprotocol>
      <statetype>keep state</statetype>
      <direction>in</direction>
      <floating>yes</floating>
      <quick>1</quick>
      <protocol>tcp</protocol>
      <source>
        <any>1</any>
      </source>
      <destination>
        <network>(self)</network>
        <port>22</port>
      </destination>
      <updated>
        <username>root@10.0.0.2</username>
        <time>1599745067.6489</time>
        <description>/firewall_rules_edit.php made changes</description>
      </updated>
      <created>
        <username>root@10.0.0.2</username>
        <time>1599745067.6506</time>
        <description>/firewall_rules_edit.php made changes</description>
      </created>
      <disabled>1</disabled>
    </rule>
    <rule>
      <type>pass</type>
      <interface>lan,opt1</interface>
      <ipprotocol>inet</ipprotocol>
      <statetype>keep state</statetype>
      <direction>in</direction>
      <floating>yes</floating>
      <quick>1</quick>
      <protocol>tcp/udp</protocol>
      <source>
        <any>1</any>
      </source>
      <destination>
        <network>(self)</network>
        <port>53</port>
      </destination>
      <updated>
        <username>root@10.0.0.2</username>
        <time>1622123947.5157</time>
        <description>/firewall_rules_edit.php made changes</description>
      </updated>
      <created>
        <username>root@168.172.250.33</username>
        <time>1599819089.5267</time>
        <description>/firewall_rules_edit.php made changes</description>
      </created>
    </rule>
    <rule>
      <type>pass</type>
      <interface>opt2,lan,opt1</interface>
      <ipprotocol>inet</ipprotocol>
      <statetype>keep state</statetype>
      <direction>in</direction>
      <floating>yes</floating>
      <quick>1</quick>
      <protocol>icmp</protocol>
      <source>
        <any>1</any>
      </source>
      <destination>
        <any>1</any>
      </destination>
      <updated>
        <username>root@10.0.0.2</username>
        <time>1639121365.4613</time>
        <description>/firewall_rules_edit.php made changes</description>
      </updated>
      <created>
        <username>root@10.0.0.2</username>
        <time>1639121365.4613</time>
        <description>/firewall_rules_edit.php made changes</description>
      </created>
      <disabled>1</disabled>
    </rule>
    <rule>
      <type>block</type>
      <interface>lan</interface>
      <ipprotocol>inet6</ipprotocol>
      <statetype>keep state</statetype>
      <descr>Default allow LAN IPv6 to any rule</descr>
      <direction>in</direction>
      <quick>1</quick>
      <source>
        <network>lan</network>
      </source>
      <destination>
        <any>1</any>
      </destination>
      <updated>
        <username>root@10.0.0.2</username>
        <time>1639120196.2555</time>
        <description>/firewall_rules_edit.php made changes</description>
      </updated>
    </rule>
    <rule>
      <type>pass</type>
      <interface>lan</interface>
      <ipprotocol>inet</ipprotocol>
      <statetype>keep state</statetype>
      <descr>Default allow LAN IPv4 to any rule</descr>
      <direction>in</direction>
      <quick>1</quick>
      <source>
        <network>lan</network>
      </source>
      <destination>
        <any>1</any>
      </destination>
      <updated>
        <username>root@168.172.250.32</username>
        <time>1600251001.611</time>
        <description>/firewall_rules_edit.php made changes</description>
      </updated>
      <created>
        <username>root@168.172.250.32</username>
        <time>1600250978.4023</time>
        <description>/firewall_rules_edit.php made changes</description>
      </created>
      <disabled>1</disabled>
    </rule>
    <rule>
      <type>pass</type>
      <interface>lan</interface>
      <ipprotocol>inet</ipprotocol>
      <statetype>keep state</statetype>
      <direction>in</direction>
      <quick>1</quick>
      <protocol>tcp/udp</protocol>
      <source>
        <network>lan</network>
      </source>
      <destination>
        <any>1</any>
        <port>Web</port>
      </destination>
      <updated>
        <username>root@10.0.0.2</username>
        <time>1639121297.94</time>
        <description>/firewall_rules_edit.php made changes</description>
      </updated>
      <created>
        <username>root@10.0.0.2</username>
        <time>1639121225.5304</time>
        <description>/firewall_rules_edit.php made changes</description>
      </created>
    </rule>
    <rule>
      <type>pass</type>
      <interface>lan</interface>
      <ipprotocol>inet</ipprotocol>
      <statetype>keep state</statetype>
      <direction>in</direction>
      <quick>1</quick>
      <source>
        <address>10.0.3.169</address>
      </source>
      <destination>
        <any>1</any>
      </destination>
      <updated>
        <username>root@10.0.0.2</username>
        <time>1599982745.5875</time>
        <description>/firewall_rules_edit.php made changes</description>
      </updated>
      <created>
        <username>root@10.0.0.2</username>
        <time>1599982745.5875</time>
        <description>/firewall_rules_edit.php made changes</description>
      </created>
    </rule>
    <rule>
      <type>pass</type>
      <interface>lan</interface>
      <ipprotocol>inet</ipprotocol>
      <statetype>keep state</statetype>
      <direction>in</direction>
      <quick>1</quick>
      <source>
        <address>10.0.4.169</address>
      </source>
      <destination>
        <any>1</any>
      </destination>
      <updated>
        <username>root@10.0.0.2</username>
        <time>1599982795.1333</time>
        <description>/firewall_rules_edit.php made changes</description>
      </updated>
      <created>
        <username>root@10.0.0.2</username>
        <time>1599982795.1333</time>
        <description>/firewall_rules_edit.php made changes</description>
      </created>
    </rule>
    <rule>
      <type>pass</type>
      <interface>lan</interface>
      <ipprotocol>inet</ipprotocol>
      <statetype>keep state</statetype>
      <descr>Default allow LAN to any rule</descr>
      <direction>in</direction>
      <quick>1</quick>
      <source>
        <network>lan</network>
      </source>
      <destination>
        <address>TUT</address>
      </destination>
      <updated>
        <username>root@168.172.250.33</username>
        <time>1599821945.0444</time>
        <description>/firewall_rules_edit.php made changes</description>
      </updated>
    </rule>
    <rule>
      <type>pass</type>
      <interface>lan</interface>
      <ipprotocol>inet</ipprotocol>
      <statetype>keep state</statetype>
      <descr>Default allow LAN to any rule</descr>
      <direction>in</direction>
      <quick>1</quick>
      <source>
        <network>lan</network>
      </source>
      <destination>
        <address>OneDrive</address>
      </destination>
      <updated>
        <username>root@168.172.250.33</username>
        <time>1599821970.0412</time>
        <description>/firewall_rules_edit.php made changes</description>
      </updated>
      <created>
        <username>root@168.172.250.33</username>
        <time>1599821970.0412</time>
        <description>/firewall_rules_edit.php made changes</description>
      </created>
    </rule>
    <rule>
      <type>pass</type>
      <interface>lan</interface>
      <ipprotocol>inet</ipprotocol>
      <statetype>keep state</statetype>
      <descr>Default allow LAN to any rule</descr>
      <direction>in</direction>
      <quick>1</quick>
      <source>
        <network>lan</network>
      </source>
      <destination>
        <address>OneDrive1</address>
      </destination>
      <updated>
        <username>root@168.172.250.33</username>
        <time>1599821986.948</time>
        <description>/firewall_rules_edit.php made changes</description>
      </updated>
      <created>
        <username>root@168.172.250.33</username>
        <time>1599821986.9481</time>
        <description>/firewall_rules_edit.php made changes</description>
      </created>
    </rule>
    <rule>
      <type>pass</type>
      <interface>lan</interface>
      <ipprotocol>inet</ipprotocol>
      <statetype>keep state</statetype>
      <descr>Default allow LAN to any rule</descr>
      <direction>in</direction>
      <quick>1</quick>
      <source>
        <network>lan</network>
      </source>
      <destination>
        <address>OneDrive2</address>
      </destination>
      <updated>
        <username>root@168.172.250.33</username>
        <time>1599821998.8391</time>
        <description>/firewall_rules_edit.php made changes</description>
      </updated>
      <created>
        <username>root@168.172.250.33</username>
        <time>1599821998.8391</time>
        <description>/firewall_rules_edit.php made changes</description>
      </created>
    </rule>
    <rule>
      <type>pass</type>
      <interface>lan</interface>
      <ipprotocol>inet</ipprotocol>
      <statetype>keep state</statetype>
      <descr>Default allow LAN to any rule</descr>
      <direction>in</direction>
      <quick>1</quick>
      <source>
        <network>lan</network>
      </source>
      <destination>
        <address>BlackBoard</address>
      </destination>
      <updated>
        <username>root@168.172.250.32</username>
        <time>1600250876.0982</time>
        <description>/firewall_rules_edit.php made changes</description>
      </updated>
      <created>
        <username>root@168.172.250.32</username>
        <time>1600250876.0983</time>
        <description>/firewall_rules_edit.php made changes</description>
      </created>
    </rule>
    <rule>
      <type>block</type>
      <interface>opt1</interface>
      <ipprotocol>inet6</ipprotocol>
      <statetype>keep state</statetype>
      <direction>in</direction>
      <quick>1</quick>
      <source>
        <any>1</any>
      </source>
      <destination>
        <any>1</any>
      </destination>
      <updated>
        <username>root@10.0.0.2</username>
        <time>1639061108.4037</time>
        <description>/firewall_rules_edit.php made changes</description>
      </updated>
      <created>
        <username>root@10.0.0.2</username>
        <time>1639061108.4039</time>
        <description>/firewall_rules_edit.php made changes</description>
      </created>
    </rule>
    <rule>
      <type>block</type>
      <interface>opt1</interface>
      <ipprotocol>inet</ipprotocol>
      <statetype>keep state</statetype>
      <direction>in</direction>
      <quick>1</quick>
      <source>
        <network>opt1</network>
      </source>
      <destination>
        <network>lan</network>
      </destination>
      <updated>
        <username>root@10.0.0.2</username>
        <time>1622124165.0718</time>
        <description>/firewall_rules_edit.php made changes</description>
      </updated>
      <created>
        <username>root@10.0.0.2</username>
        <time>1622124165.0718</time>
        <description>/firewall_rules_edit.php made changes</description>
      </created>
    </rule>
    <rule>
      <type>pass</type>
      <interface>opt1</interface>
      <ipprotocol>inet</ipprotocol>
      <statetype>keep state</statetype>
      <direction>in</direction>
      <quick>1</quick>
      <protocol>tcp</protocol>
      <source>
        <network>opt1</network>
      </source>
      <destination>
        <any>1</any>
        <port>80</port>
      </destination>
      <updated>
        <username>root@10.0.0.2</username>
        <time>1622124129.9607</time>
        <description>/firewall_rules_edit.php made changes</description>
      </updated>
      <created>
        <username>root@10.0.0.2</username>
        <time>1622123993.3469</time>
        <description>/firewall_rules_edit.php made changes</description>
      </created>
    </rule>
    <rule>
      <type>pass</type>
      <interface>opt1</interface>
      <ipprotocol>inet</ipprotocol>
      <statetype>keep state</statetype>
      <direction>in</direction>
      <quick>1</quick>
      <protocol>tcp</protocol>
      <source>
        <network>opt1</network>
      </source>
      <destination>
        <any>1</any>
        <port>443</port>
      </destination>
      <updated>
        <username>root@10.0.0.2</username>
        <time>1622124210.0389</time>
        <description>/firewall_rules_edit.php made changes</description>
      </updated>
      <created>
        <username>root@10.0.0.2</username>
        <time>1622124210.039</time>
        <description>/firewall_rules_edit.php made changes</description>
      </created>
    </rule>
    <rule>
      <type>pass</type>
      <interface>opt2</interface>
      <ipprotocol>inet</ipprotocol>
      <statetype>keep state</statetype>
      <direction>in</direction>
      <quick>1</quick>
      <protocol>tcp/udp</protocol>
      <source>
        <network>opt2</network>
      </source>
      <destination>
        <any>1</any>
        <port>Web</port>
      </destination>
      <updated>
        <username>root@10.0.0.2</username>
        <time>1639121505.1834</time>
        <description>/firewall_rules_edit.php made changes</description>
      </updated>
      <created>
        <username>root@10.0.0.2</username>
        <time>1627580143.9374</time>
        <description>/firewall_rules_edit.php made changes</description>
      </created>
    </rule>
    <rule>
      <type>block</type>
      <interface>opt2</interface>
      <ipprotocol>inet</ipprotocol>
      <statetype>keep state</statetype>
      <direction>in</direction>
      <quick>1</quick>
      <source>
        <network>opt2</network>
      </source>
      <destination>
        <network>lan</network>
      </destination>
      <updated>
        <username>root@10.0.0.2</username>
        <time>1639121572.8158</time>
        <description>/firewall_rules_edit.php made changes</description>
      </updated>
      <created>
        <username>root@10.0.0.2</username>
        <time>1639121572.8159</time>
        <description>/firewall_rules_edit.php made changes</description>
      </created>
    </rule>
  </filter>
  <rrd>
    <enable/>
  </rrd>
  <load_balancer>
    <monitor_type>
      <name>ICMP</name>
      <type>icmp</type>
      <descr>ICMP</descr>
      <options/>
    </monitor_type>
    <monitor_type>
      <name>TCP</name>
      <type>tcp</type>
      <descr>Generic TCP</descr>
      <options/>
    </monitor_type>
    <monitor_type>
      <name>HTTP</name>
      <type>http</type>
      <descr>Generic HTTP</descr>
      <options>
        <path>/</path>
        <host/>
        <code>200</code>
      </options>
    </monitor_type>
    <monitor_type>
      <name>HTTPS</name>
      <type>https</type>
      <descr>Generic HTTPS</descr>
      <options>
        <path>/</path>
        <host/>
        <code>200</code>
      </options>
    </monitor_type>
    <monitor_type>
      <name>SMTP</name>
      <type>send</type>
      <descr>Generic SMTP</descr>
      <options>
        <send/>
        <expect>220 *</expect>
      </options>
    </monitor_type>
  </load_balancer>
  <ntpd>
    <prefer>0.opnsense.pool.ntp.org</prefer>
  </ntpd>
  <widgets>
    <sequence>system_information-container:00000000-col3:show,services_status-container:00000001-col3:show,gateways-container:00000002-col4:show,interface_list-container:00000003-col4:show,traffic_graphs-container:00000004-col4:show</sequence>
    <column_count>2</column_count>
    <traffic_graphs_interfaces>opt2,lan</traffic_graphs_interfaces>
  </widgets>
  <revision>
    <username>root@10.0.0.2</username>
    <time>1639121572.8693</time>
    <description>/firewall_rules_edit.php made changes</description>
  </revision>
  <OPNsense>
    <Firewall>
      <Alias version="1.0.0">
        <geoip>
          <url/>
        </geoip>
        <aliases>
          <alias uuid="394b3a2e-8cab-449c-9dbf-72ee6896f903">
            <enabled>1</enabled>
            <name>TUT</name>
            <type>network</type>
            <proto/>
            <counters>0</counters>
            <updatefreq/>
            <content>168.172.0.0/16</content>
            <description/>
          </alias>
          <alias uuid="e94df8c5-b52b-46db-ba33-3625239a10e9">
            <enabled>1</enabled>
            <name>OneDrive</name>
            <type>host</type>
            <proto/>
            <counters>0</counters>
            <updatefreq/>
            <content>tut4lifeac-my.sharepoint.com
onedrive.live.com
login.live.com
g.live.com
spoprod-a.akamaihd.net
p.sfx.ms
oneclient.sfx.ms
fabric.io
vortex.data.microsoft.com
posarprodcssservice.accesscontrol.windows.net
redemptionservices.accesscontrol.windows.net
token.cp.microsoft.com
tokensit.cp.microsoft-tst.com
vas.samsungapps.com
odc.officeapps.live.com
login.windows.net
login.microsoftonline.com
storage.live.com
favorites.live.com
oauth.live.com
photos.live.com
skydrive.live.com
api.live.net
apis.live.net
docs.live.net
policies.live.net
settings.live.net
skyapi.live.net
snapi.live.net
storage.msn.com
ssw.live.com
admin.onedrive.com
officeclient.microsoft.com</content>
            <description/>
          </alias>
          <alias uuid="0d507d82-929f-49e0-a515-b7b00662ab17">
            <enabled>1</enabled>
            <name>OneDrive1</name>
            <type>host</type>
            <proto/>
            <counters>0</counters>
            <updatefreq/>
            <content>oneclient.sfx.ms
g.live.com
cdn.sharepointonline.com
privatecdn.sharepointonline.com
publiccdn.sharepointonline.com
spoprod-a.akamaihd.net
static.sharepointonline.com
prod.msocdn.com
watson.telemetry.microsoft.com
tut4lifeac-files.sharepoint.com
tut4lifeac-myfiles.sharepoint.com
teams.microsoft.com
www.microsoft.com
go.microsoft.com
onedrive.live.com
login.microsoftonline.com</content>
            <description/>
          </alias>
          <alias uuid="55a96c6c-8b02-4c05-91d8-14a60d4c29a1">
            <enabled>1</enabled>
            <name>OneDrive2</name>
            <type>network</type>
            <proto/>
            <counters>0</counters>
            <updatefreq/>
            <content>13.107.64.0/18
52.112.0.0/14
52.120.0.0/14
52.238.119.141/32
52.244.160.207/32
13.107.6.171/32
13.107.140.6/32
52.108.0.0/14
52.238.106.116/32
52.244.37.168/32
52.244.203.72/32
52.244.207.172/32
52.244.223.198/32
52.247.150.191/32
104.73.46.0/24
172.217.170.0/24
23.60.7.0/24
196.24.45.0/24
51.105.249.0/24
152.199.23.0/24
20.190.129.19/32
216.58.223.0/24
23.33.48.0/24
51.11.168.0/24
40.122.160.0/24
2.17.205.0/24
23.202.80.0/24
152.199.19.0/24
40.126.0.0/16
40.115.3.0/24
23.56.194.0/24
52.98.0.0/16
13.107.0.0/16</content>
            <description/>
          </alias>
          <alias uuid="89ee98fd-ff36-4aa6-a174-67e60ac66ddb">
            <enabled>1</enabled>
            <name>BlackBoard</name>
            <type>network</type>
            <proto/>
            <counters>0</counters>
            <updatefreq/>
            <content>69.196.237.0/24
34.239.40.0/22
108.129.37.0/24
63.35.119.0/24
52.211.221.0/24
34.251.106.0/24</content>
            <description/>
          </alias>
          <alias uuid="5193bd4e-398a-48e1-962a-b18ebe4d4b81">
            <enabled>1</enabled>
            <name>Web</name>
            <type>port</type>
            <proto/>
            <counters>0</counters>
            <updatefreq/>
            <content>80
443
53
21</content>
            <description>Connection to Internet</description>
          </alias>
        </aliases>
      </Alias>
      <Category version="1.0.0">
        <categories/>
      </Category>
      <Lvtemplate version="0.0.1">
        <templates/>
      </Lvtemplate>
    </Firewall>
    <captiveportal version="1.0.0">
      <zones/>
      <templates/>
    </captiveportal>
    <Netflow version="1.0.1">
      <capture>
        <interfaces/>
        <egress_only/>
        <version>v9</version>
        <targets/>
      </capture>
      <collect>
        <enable>0</enable>
      </collect>
      <activeTimeout>1800</activeTimeout>
      <inactiveTimeout>15</inactiveTimeout>
    </Netflow>
    <Interfaces>
      <vxlans/>
      <loopbacks/>
    </Interfaces>
    <OpenVPNExport version="0.0.1">
      <servers/>
    </OpenVPNExport>
    <Syslog version="1.0.0">
      <general>
        <enabled>1</enabled>
      </general>
      <destinations/>
    </Syslog>
    <TrafficShaper version="1.0.3">
      <pipes/>
      <queues/>
      <rules/>
    </TrafficShaper>
    <unboundplus version="1.0.0">
      <service_enabled/>
      <dnsbl>
        <enabled>0</enabled>
        <type/>
        <lists/>
        <whitelists/>
      </dnsbl>
      <dots/>
      <miscellaneous>
        <privatedomain/>
      </miscellaneous>
    </unboundplus>
    <maltrail>
      <sensor version="0.0.1">
        <enabled>1</enabled>
        <captureall>0</captureall>
        <remoteserver/>
        <remoteport>8337</remoteport>
      </sensor>
      <server version="0.0.1">
        <enabled>1</enabled>
        <listenaddress>0.0.0.0</listenaddress>
        <listenport>666</listenport>
        <loglistenaddress/>
        <loglistenport/>
      </server>
      <general version="0.0.1">
        <heuristics>1</heuristics>
        <updateperiod>86400</updateperiod>
        <adminpassword>9d777935627a29c77604c57273520eb42635fd1847d2eeea1e7441fbaeb26253</adminpassword>
        <monitorinterface>wan</monitorinterface>
        <whitelist/>
      </general>
    </maltrail>
    <cron version="1.0.2">
      <jobs/>
    </cron>
    <proxy version="1.0.5">
      <general>
        <enabled>0</enabled>
        <error_pages>opnsense</error_pages>
        <icpPort/>
        <logging>
          <enable>
            <accessLog>1</accessLog>
            <storeLog>1</storeLog>
          </enable>
          <ignoreLogACL/>
          <target/>
        </logging>
        <alternateDNSservers/>
        <dnsV4First>0</dnsV4First>
        <forwardedForHandling>on</forwardedForHandling>
        <uriWhitespaceHandling>strip</uriWhitespaceHandling>
        <enablePinger>1</enablePinger>
        <useViaHeader>1</useViaHeader>
        <suppressVersion>0</suppressVersion>
        <connecttimeout/>
        <VisibleEmail>admin@localhost.local</VisibleEmail>
        <VisibleHostname/>
        <cache>
          <local>
            <enabled>0</enabled>
            <directory>/var/squid/cache</directory>
            <cache_mem>256</cache_mem>
            <maximum_object_size/>
            <maximum_object_size_in_memory/>
            <memory_cache_mode>always</memory_cache_mode>
            <size>100</size>
            <l1>16</l1>
            <l2>256</l2>
            <cache_linux_packages>0</cache_linux_packages>
            <cache_windows_updates>0</cache_windows_updates>
          </local>
        </cache>
        <traffic>
          <enabled>0</enabled>
          <maxDownloadSize>2048</maxDownloadSize>
          <maxUploadSize>1024</maxUploadSize>
          <OverallBandwidthTrotteling>1024</OverallBandwidthTrotteling>
          <perHostTrotteling>256</perHostTrotteling>
        </traffic>
        <parentproxy>
          <enabled>0</enabled>
          <host/>
          <enableauth>0</enableauth>
          <user>username</user>
          <password>password</password>
          <port/>
          <localdomains/>
          <localips/>
        </parentproxy>
      </general>
      <forward>
        <interfaces>lan</interfaces>
        <port>3128</port>
        <sslbumpport>3129</sslbumpport>
        <sslbump>0</sslbump>
        <sslurlonly>0</sslurlonly>
        <sslcertificate/>
        <sslnobumpsites/>
        <ssl_crtd_storage_max_size>4</ssl_crtd_storage_max_size>
        <sslcrtd_children>5</sslcrtd_children>
        <snmp_enable>0</snmp_enable>
        <snmp_port>3401</snmp_port>
        <snmp_password>public</snmp_password>
        <ftpInterfaces/>
        <ftpPort>2121</ftpPort>
        <ftpTransparentMode>0</ftpTransparentMode>
        <addACLforInterfaceSubnets>1</addACLforInterfaceSubnets>
        <transparentMode>0</transparentMode>
        <acl>
          <allowedSubnets/>
          <unrestricted/>
          <bannedHosts/>
          <whiteList/>
          <blackList/>
          <browser/>
          <mimeType/>
          <googleapps/>
          <youtube/>
          <safePorts>80:http,21:ftp,443:https,70:gopher,210:wais,1025-65535:unregistered ports,280:http-mgmt,488:gss-http,591:filemaker,777:multiling http</safePorts>
          <sslPorts>443:https</sslPorts>
          <remoteACLs>
            <blacklists/>
            <UpdateCron/>
          </remoteACLs>
        </acl>
        <icap>
          <enable>0</enable>
          <RequestURL>icap://[::1]:1344/avscan</RequestURL>
          <ResponseURL>icap://[::1]:1344/avscan</ResponseURL>
          <SendClientIP>1</SendClientIP>
          <SendUsername>0</SendUsername>
          <EncodeUsername>0</EncodeUsername>
          <UsernameHeader>X-Username</UsernameHeader>
          <EnablePreview>1</EnablePreview>
          <PreviewSize>1024</PreviewSize>
          <OptionsTTL>60</OptionsTTL>
          <exclude/>
        </icap>
        <authentication>
          <method/>
          <authEnforceGroup/>
          <realm>OPNsense proxy authentication</realm>
          <credentialsttl>2</credentialsttl>
          <children>5</children>
        </authentication>
      </forward>
      <pac/>
      <error_pages>
        <template/>
      </error_pages>
    </proxy>
    <IPsec version="1.0.0">
      <general>
        <enabled/>
      </general>
      <keyPairs/>
    </IPsec>
    <IDS version="1.0.7">
      <rules/>
      <policies/>
      <userDefinedRules/>
      <files/>
      <fileTags/>
      <general>
        <enabled>0</enabled>
        <ips>0</ips>
        <promisc>0</promisc>
        <interfaces>wan</interfaces>
        <homenet>192.168.0.0/16,10.0.0.0/8,172.16.0.0/12</homenet>
        <defaultPacketSize/>
        <UpdateCron/>
        <AlertLogrotate>W0D23</AlertLogrotate>
        <AlertSaveLogs>4</AlertSaveLogs>
        <MPMAlgo>ac</MPMAlgo>
        <detect>
          <Profile>medium</Profile>
          <toclient_groups/>
          <toserver_groups/>
        </detect>
        <syslog>0</syslog>
        <syslog_eve>0</syslog_eve>
        <LogPayload>0</LogPayload>
      </general>
    </IDS>
    <monit version="1.0.11">
      <general>
        <enabled>0</enabled>
        <interval>120</interval>
        <startdelay>120</startdelay>
        <mailserver>127.0.0.1</mailserver>
        <port>25</port>
        <username/>
        <password/>
        <ssl>0</ssl>
        <sslversion>auto</sslversion>
        <sslverify>1</sslverify>
        <logfile>syslog facility log_daemon</logfile>
        <statefile/>
        <eventqueuePath/>
        <eventqueueSlots/>
        <httpdEnabled>0</httpdEnabled>
        <httpdUsername>root</httpdUsername>
        <httpdPassword>dtAjlcgqSL1eWLEAtRKrUfe5T2qXoZ2</httpdPassword>
        <httpdPort>2812</httpdPort>
        <httpdAllow/>
        <mmonitUrl/>
        <mmonitTimeout>5</mmonitTimeout>
        <mmonitRegisterCredentials>1</mmonitRegisterCredentials>
      </general>
      <alert uuid="09939b29-7a08-417d-89dd-e58a9e64a2d9">
        <enabled>0</enabled>
        <recipient>root@localhost.local</recipient>
        <noton>0</noton>
        <events/>
        <format/>
        <reminder>10</reminder>
        <description/>
      </alert>
      <service uuid="afc4a546-a36b-450d-aebb-b792c85b4167">
        <enabled>1</enabled>
        <name>$HOST</name>
        <description/>
        <type>system</type>
        <pidfile/>
        <match/>
        <path/>
        <timeout>300</timeout>
        <address/>
        <interface/>
        <start/>
        <stop/>
        <tests>616ab278-3f13-41c2-8b8b-e7bac69cfde2,315d913a-8cd6-4375-8d2d-fbac9af6dc80,6f6797b1-b7de-4a3c-9bc7-745433e74402,c7d846f4-b7ec-450d-954e-0245cd6b13e0</tests>
        <depends/>
        <polltime/>
      </service>
      <service uuid="58195e6a-55d1-4127-b23c-57063e7b0111">
        <enabled>1</enabled>
        <name>RootFs</name>
        <description/>
        <type>filesystem</type>
        <pidfile/>
        <match/>
        <path>/</path>
        <timeout>300</timeout>
        <address/>
        <interface/>
        <start/>
        <stop/>
        <tests>cffe2e1b-9970-4ee8-a00c-c66e40a6e5cd</tests>
        <depends/>
        <polltime/>
      </service>
      <service uuid="b51381a6-b782-4326-8865-df0f1bd2e0df">
        <enabled>0</enabled>
        <name>carp_status_change</name>
        <description/>
        <type>custom</type>
        <pidfile/>
        <match/>
        <path>/usr/local/opnsense/scripts/OPNsense/Monit/carp_status</path>
        <timeout>300</timeout>
        <address/>
        <interface/>
        <start/>
        <stop/>
        <tests>aa55dc87-72ac-4cbd-ad77-6cd5fa5d4518</tests>
        <depends/>
        <polltime/>
      </service>
      <service uuid="15c6783c-50d9-4e54-84ac-95ecb10fe497">
        <enabled>0</enabled>
        <name>gateway_alert</name>
        <description/>
        <type>custom</type>
        <pidfile/>
        <match/>
        <path>/usr/local/opnsense/scripts/OPNsense/Monit/gateway_alert</path>
        <timeout>300</timeout>
        <address/>
        <interface/>
        <start/>
        <stop/>
        <tests>ba0459cd-05b3-4466-9410-761a2886ab91</tests>
        <depends/>
        <polltime/>
      </service>
      <test uuid="59b5f26a-9db8-472f-8da4-e3114d4a6926">
        <name>Ping</name>
        <type>NetworkPing</type>
        <condition>failed ping</condition>
        <action>alert</action>
        <path/>
      </test>
      <test uuid="fbc2a732-ce3c-4c79-969b-1841980a1838">
        <name>NetworkLink</name>
        <type>NetworkInterface</type>
        <condition>failed link</condition>
        <action>alert</action>
        <path/>
      </test>
      <test uuid="6084bb2a-f061-4d7d-aee6-044ac8245734">
        <name>NetworkSaturation</name>
        <type>NetworkInterface</type>
        <condition>saturation is greater than 75%</condition>
        <action>alert</action>
        <path/>
      </test>
      <test uuid="616ab278-3f13-41c2-8b8b-e7bac69cfde2">
        <name>MemoryUsage</name>
        <type>SystemResource</type>
        <condition>memory usage is greater than 75%</condition>
        <action>alert</action>
        <path/>
      </test>
      <test uuid="315d913a-8cd6-4375-8d2d-fbac9af6dc80">
        <name>CPUUsage</name>
        <type>SystemResource</type>
        <condition>cpu usage is greater than 75%</condition>
        <action>alert</action>
        <path/>
      </test>
      <test uuid="6f6797b1-b7de-4a3c-9bc7-745433e74402">
        <name>LoadAvg1</name>
        <type>SystemResource</type>
        <condition>loadavg (1min) is greater than 8</condition>
        <action>alert</action>
        <path/>
      </test>
      <test uuid="c7d846f4-b7ec-450d-954e-0245cd6b13e0">
        <name>LoadAvg5</name>
        <type>SystemResource</type>
        <condition>loadavg (5min) is greater than 6</condition>
        <action>alert</action>
        <path/>
      </test>
      <test uuid="5aaf6952-edbd-47a3-a8ce-7df1e99e1f2b">
        <name>LoadAvg15</name>
        <type>SystemResource</type>
        <condition>loadavg (15min) is greater than 4</condition>
        <action>alert</action>
        <path/>
      </test>
      <test uuid="cffe2e1b-9970-4ee8-a00c-c66e40a6e5cd">
        <name>SpaceUsage</name>
        <type>SpaceUsage</type>
        <condition>space usage is greater than 75%</condition>
        <action>alert</action>
        <path/>
      </test>
      <test uuid="aa55dc87-72ac-4cbd-ad77-6cd5fa5d4518">
        <name>ChangedStatus</name>
        <type>ProgramStatus</type>
        <condition>changed status</condition>
        <action>alert</action>
        <path/>
      </test>
      <test uuid="ba0459cd-05b3-4466-9410-761a2886ab91">
        <name>NonZeroStatus</name>
        <type>ProgramStatus</type>
        <condition>status != 0</condition>
        <action>alert</action>
        <path/>
      </test>
    </monit>
  </OPNsense>
  <ca/>
  <gateways>
    <gateway_item>
      <descr>Interface WAN Gateway</descr>
      <defaultgw>1</defaultgw>
      <ipprotocol>inet</ipprotocol>
      <interface>wan</interface>
      <gateway>168.172.184.1</gateway>
      <monitor_disable>1</monitor_disable>
      <name>GW_WAN</name>
      <interval>1</interval>
      <weight>1</weight>
    </gateway_item>
    <gateway_item>
      <interface>lan</interface>
      <gateway>10.0.0.2</gateway>
      <name>LAN_GWv4</name>
      <priority/>
      <weight/>
      <ipprotocol>inet</ipprotocol>
      <interval/>
      <descr/>
    </gateway_item>
  </gateways>
  <cert>
    <refid>5f5a419c30b1d</refid>
    <descr>Web GUI SSL certificate</descr>
    <crt>LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUdYVENDQkVXZ0F3SUJBZ0lVTlBxZEkrUXJqb0Q0ZVM5UXM4RlkxaDl5RVd3d0RRWUpLb1pJaHZjTkFRRUwKQlFBd1RqRUxNQWtHQTFVRUJoTUNUa3d4RlRBVEJnTlZCQWdNREZwMWFXUXRTRzlzYkdGdVpERVZNQk1HQTFVRQpCd3dNVFdsa1pHVnNhR0Z5Ym1sek1SRXdEd1lEVlFRS0RBaFBVRTV6Wlc1elpUQWVGdzB5TURBNU1UQXhOVEE1Ck1UZGFGdzB5TWpFeU1UUXhOVEE1TVRkYU1FNHhDekFKQmdOVkJBWVRBazVNTVJVd0V3WURWUVFJREF4YWRXbGsKTFVodmJHeGhibVF4RlRBVEJnTlZCQWNNREUxcFpHUmxiR2hoY201cGN6RVJNQThHQTFVRUNnd0lUMUJPYzJWdQpjMlV3Z2dJaU1BMEdDU3FHU0liM0RRRUJBUVVBQTRJQ0R3QXdnZ0lLQW9JQ0FRREZxOWF4eDRKdTFyREpoQm83ClZSdC91ekRvc0Q4TTdCVlNPSXFBK2lySEFRVS9qK212ZEkzNVhZaVNBdW96N1BHbUdoL0dQSUFBZlJqcS9Pbk4KN0RHREFLNzRtdEl1ZlZpdkNUdmdTWE9vaDA2T1U1V1FsRElURnNsVWZLQTdHWFNCL2hyRXdzTlduK1hidUNyQQo2ZEg1MEk2ZlRobkd2eDBhRE84YWlaOENBMGNUQlh6Yy9VVnI5WVJ6UnJvMjVEQmtPLzZncVgzaEx0MUJTc0ZGCmMyQnRKSjRkaVdna3VicGJDTlRWbGY2c0l0cGhaeFBMaDg1UHpyTVZHbUxwcUwrU1R4K2pSZnY1dUtrUTU0YTMKT1lBZnZFOFpYZXljb1VDc1VKL1Z4MUY1bW0wWURlQ2lBSWFJZ2JtS3R5cUhvRWtSaTFseE5vZVd3eGI3aGd4QgowUnJ6cjBTQ3UwR29sdXFBVWsyQUx3RUdhWUxYYytKSnhScUxjN3FRbzBSRVVvOHdlR3ZoMHVNb2lmZ1ZkOW9KCm5DODRkT1EweWJScmdHNk80b2tZT2FWMUw1RWRON1ZPRGN1MStEWWU4UlNLS3ljYVhGMk5iSTV4UHEvV2x0ZlIKZ0pzeG0zNFZmYXhOdEtyZFZwaHhyd0lGTnUrRVVJRzBac01DMTkvbDhsbHIvZ0VDK2tEVjhnSWF0UmZTZTFOUAp6MzR5c2lzT084NnBZZFNIU29mNTlLaHc4SlBZdklqb1FkSEM4aGZlWm9HWnZPRVFxWVNQWlNHcjYxMEV0b1F2CnNVc3pmcko4Q1g2eDVDSW16VHduVkNMOWNQaldlRi9veUxoTklRWnB1bVpIU2xPVHNGOWM0SnQ1cGp4SDR2UFYKNkRXTFB4UUdaa1hRR0MvdjZDdTFMOFNaOXdJREFRQUJvNElCTVRDQ0FTMHdDUVlEVlIwVEJBSXdBREFSQmdsZwpoa2dCaHZoQ0FRRUVCQU1DQmtBd05BWUpZSVpJQVliNFFnRU5CQ2NXSlU5UVRuTmxibk5sSUVkbGJtVnlZWFJsClpDQlRaWEoyWlhJZ1EyVnlkR2xtYVdOaGRHVXdIUVlEVlIwT0JCWUVGTmlMWVpiRkRQdHlNNy9LYnBKWlNuNjMKWHVyM01JR0xCZ05WSFNNRWdZTXdnWUNBRk5pTFlaYkZEUHR5TTcvS2JwSlpTbjYzWHVyM29WS2tVREJPTVFzdwpDUVlEVlFRR0V3Sk9UREVWTUJNR0ExVUVDQXdNV25WcFpDMUliMnhzWVc1a01SVXdFd1lEVlFRSERBeE5hV1JrClpXeG9ZWEp1YVhNeEVUQVBCZ05WQkFvTUNFOVFUbk5sYm5ObGdoUTArcDBqNUN1T2dQaDVMMUN6d1ZqV0gzSVIKYkRBZEJnTlZIU1VFRmpBVUJnZ3JCZ0VGQlFjREFRWUlLd1lCQlFVSUFnSXdDd1lEVlIwUEJBUURBZ1dnTUEwRwpDU3FHU0liM0RRRUJDd1VBQTRJQ0FRQWtKODNma3RQZ3NhbGRHVWM5ZC9KcThTYTZ0dWo3dG1peEZVZVVxTS9kCmdtTU5EaG8yc1Y2Q0RaZHZaTGxwNGVKbWNIb3lCRGFXM3AzK1ArUFBDVklYQlJodlpvd0tVTWFKRGR5ZDV2T3UKS2hJekpwcENIcHc0b2xBZUR6UGorQkE4TVlSb3FYL1N3b3luZTdQKzhNOGh1bUFVUG9ublh2U2xkNG9xRUcrLwpQQm5hc1Nkd2ZoMUhyb2d6amZybzZCZEMxZEIyV0xYSi9pVUdBU1RJS2hlajVyZmt6N2Z1OFdFWVQ0cjRSQUEyCnhHZjdOQ2F2dVJHWmpaKzZIaFpta05BRElsamhQU3JTeTZiSDg2dFAxdHdMNTROS1pQZmd3NG4wYVk4TTRSRUYKaWxUQ205ZzZLNGZaMXNiOGJWd0tVR05QbG9mNGVqa0gzSG9uZVZGa1ZZNjJ2SklYOThrSXNjUHVuSTg3MENmZApSWUdXdjNackpSMVJneDFSNmU5MFY3ajYxeE5aeFgyWklxYWZxM1lMNzRhWHlOMHZjRy9BWHJId1NnNkJwUGJQCnpYbktlcjRBRXFzRzNHakZ0OE9neEtQcVM2QlZKS3d5SmRsbjNxVWJPdnJuVmh2WnJMWThNN3MwTkd1TzY2TXoKaDB3YVBHUko3a2JnSCtmYnpFU0c0Qm55b2h4YVJNQTU0NVpxYXRtOUpoSUU2OHY4TEkyWm1lZzhIZVlTQUdKVwpxOURWTGlSWm50YmtpM0lBa1ZOSktLcVF1QUFuT2ZPaWJJNkE3bEFYRDlMYXgwdE5BbitGamVnUGgrL2tLR1M0CkpyaEwwZnJ5YVdhSEh3Yml4UmdQaHBiOFhTWW5iVi81N0gvVWlZUUJGT0J3dy9xZXlDdXhGYnNJeXdQWitRMVAKL2c9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==</crt>
    <prv>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</prv>
  </cert>
  <ppps>
    <ppp/>
  </ppps>
  <virtualip>
    <vip/>
  </virtualip>
  <dnsmasq/>
  <staticroutes/>
</opnsense>
