eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500 inet 192.168.50.2 netmask 255.255.254.0 broadcast 192.168.51.255
LAN 2022-09-13T09:08:35 192.168.50.2:443 192.168.51.10:53027 tcp Default deny / state violation rule LAN 2022-09-13T09:08:34 192.168.50.2:443 192.168.51.10:53027 tcp Default deny / state violation rule LAN 2022-09-13T09:08:33 192.168.50.2:443 192.168.51.10:53027 tcp Default deny / state violation rule LAN 2022-09-13T09:08:33 192.168.50.2:443 192.168.51.10:53027 tcp Default deny / state violation rule LAN 2022-09-13T09:08:32 192.168.50.2:443 192.168.51.10:53027 tcp Default deny / state violation rule LAN 2022-09-13T09:08:31 192.168.50.2:443 192.168.51.10:53027 tcp Default deny / state violation rule
__timestamp__ 2022-09-13T09:08:35ack 2551861249action [block]anchorname datalen 0dir [in]dst 192.168.51.10dstport 53027ecn id 0interface igb0interface_name LANipflags DFipversion 4label Default deny / state violation rulelength 60offset 0protoname tcpprotonum 6reason matchrid 02f4bab031b57d1e30553ce08e0ec131rulenr 14seq 3121781003src 192.168.50.2srcport 443subrulenr tcpflags SAEtcpopts tos 0x0ttl 64urp 65160
IPv4 * LAN net * * * * * Default allow LAN to any rule IPv6 * LAN net * * * * * Default allow LAN IPv6 to any rule
09:14:50.815803 IP 192.168.51.10.53036 > 192.168.50.2.443: Flags [SEW], seq 2284235656, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 2341413872 ecr 0,sackOK,eol], length 009:14:50.815934 IP 192.168.50.2.443 > 192.168.51.10.53036: Flags [S.E], seq 2610416432, ack 2284235657, win 65160, options [mss 1460,sackOK,TS val 1298482186 ecr 2341413872,nop,wscale 7], length 009:14:51.818903 IP 192.168.50.2.443 > 192.168.51.10.53036: Flags [S.E], seq 2610416432, ack 2284235657, win 65160, options [mss 1460,sackOK,TS val 1298483189 ecr 2341413872,nop,wscale 7], length 0
igb0: flags=8863<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500 description: LAN options=4800028<VLAN_MTU,JUMBO_MTU,NOMAP> inet 192.168.50.1 netmask 0xfffffe00 broadcast 192.168.51.255