There is no TCP/UDP stream and WAF (Web Application Firewall) support in this plugin. For a business grade Reverse Proxy with WAF functionality, use os-OPNWAF. For TCP/UDP streaming, use either os-nginx or os-haproxy.
As an alternative to a WAF, it is simple to integrate Caddy with CrowdSec. Check the tutorial section for guidance
They can be used to restrict access per domain. In this example, they are used to restrict access to only internal IPv4 networks, refusing connections from the internet.
os-OPNWAF ist keine Erweiterung von os-caddy, sondern ein eigener Reverse Proxy mit WAF basierend auf Apache2 in der OPNsense Business Edition.
"info","ts":"2024-06-22T09:01:52Z","logger":"http.log.access.37fc6c8b-42c2-41e0-baba-c38516660295","msg":"NOP","request":{"remote_ip":"X.X.X.X","remote_port":"6102","client_ip":"X.X.X.X","proto":"HTTP/2.0","method":"GET","host":"ncloud.example.com","uri":"/login","headers":{"Accept":["text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8"],"Dnt":["1"],"Te":["trailers"],"Accept-Language":["de,en-US;q=0.7,en;q=0.3"],"Sec-Fetch-Site":["none"],"Sec-Gpc":["1"],"Priority":["u=1"],"Sec-Fetch-Mode":["navigate"],"Sec-Fetch-User":["?1"],"User-Agent":["Mozilla/5.0 (X11; Linux x86_64; rv:127.0) Gecko/20100101 Firefox/127.0"],"Accept-Encoding":["gzip, deflate, br, zstd"],"Upgrade-Insecure-Requests":["1"],"Sec-Fetch-Dest":["document"]},"tls":{"resumed":true,"version":772,"cipher_suite":4865,"proto":"h2","server_name":"ncloud.example.com"}},"bytes_read":0,"user_id":"","duration":0.000012932,"size":0,"status":0,"resp_headers":{"Server":["Caddy"],"Alt-Svc":["h3=\":443\"; ma=2592000"]}}
rules filter rules @0 scrub in on wireguard all max-mss 1360 fragment reassemble @1 scrub in all fragment reassemble @0 block drop in log on ! igc1 inet from 192.168.1.0/24 to any @1 block drop in log inet from <__automatic_73dcf8_0:6> to any @2 block drop in log on ! igc2 inet from 192.168.100.0/25 to any @3 block drop in log on ! igc3 inet from 192.168.200.0/25 to any @4 block drop in log on ! wg0 inet from 100.65.0.0/24 to any @5 block drop in log on ! igc0 inet from 192.168.178.0/24 to any @6 block drop in log on ! igc4 inet from 192.168.99.0/26 to any @7 block drop in log on igc1 inet6 from fe80::e63a:6eff:fe5d:9b3c to any @8 block drop in log on igc2 inet6 from fe80::e63a:6eff:fe5d:9b3d to any @9 block drop in log on igc3 inet6 from fe80::e63a:6eff:fe5d:9b3e to any @10 block drop in log on igc0 inet6 from fe80::e63a:6eff:fe5d:9b3b to any @11 block drop in log on igc4 inet6 from fe80::e63a:6eff:fe5d:9b3f to any @12 block drop in log inet all label "02f4bab031b57d1e30553ce08e0ec131" @13 block drop in log inet6 all label "02f4bab031b57d1e30553ce08e0ec131" @14 pass in log quick inet6 proto ipv6-icmp all icmp6-type unreach keep state label "1d245529367b2e34eeaff16086aeafe9" @15 pass in log quick inet6 proto ipv6-icmp all icmp6-type toobig keep state label "1d245529367b2e34eeaff16086aeafe9" @16 pass in log quick inet6 proto ipv6-icmp all icmp6-type neighbrsol keep state label "1d245529367b2e34eeaff16086aeafe9" @17 pass in log quick inet6 proto ipv6-icmp all icmp6-type neighbradv keep state label "1d245529367b2e34eeaff16086aeafe9" @18 pass out log quick inet6 proto ipv6-icmp from (self:7) to fe80::/10 icmp6-type echoreq keep state label "acdbb900b50d8fb4ae21ddfdc609ecf8" @19 pass out log quick inet6 proto ipv6-icmp from (self:7) to ff02::/16 icmp6-type echoreq keep state label "acdbb900b50d8fb4ae21ddfdc609ecf8" @20 pass out log quick inet6 proto ipv6-icmp from (self:7) to fe80::/10 icmp6-type echorep keep state label "acdbb900b50d8fb4ae21ddfdc609ecf8" @21 pass out log quick inet6 proto ipv6-icmp from (self:7) to ff02::/16 icmp6-type echorep keep state label "acdbb900b50d8fb4ae21ddfdc609ecf8" @22 pass out log quick inet6 proto ipv6-icmp from (self:7) to fe80::/10 icmp6-type routersol keep state label "acdbb900b50d8fb4ae21ddfdc609ecf8" @23 pass out log quick inet6 proto ipv6-icmp from (self:7) to ff02::/16 icmp6-type routersol keep state label "acdbb900b50d8fb4ae21ddfdc609ecf8" @24 pass out log quick inet6 proto ipv6-icmp from (self:7) to fe80::/10 icmp6-type routeradv keep state label "acdbb900b50d8fb4ae21ddfdc609ecf8" @25 pass out log quick inet6 proto ipv6-icmp from (self:7) to ff02::/16 icmp6-type routeradv keep state label "acdbb900b50d8fb4ae21ddfdc609ecf8" @26 pass out log quick inet6 proto ipv6-icmp from (self:7) to fe80::/10 icmp6-type neighbrsol keep state label "acdbb900b50d8fb4ae21ddfdc609ecf8" @27 pass out log quick inet6 proto ipv6-icmp from (self:7) to ff02::/16 icmp6-type neighbrsol keep state label "acdbb900b50d8fb4ae21ddfdc609ecf8" @28 pass out log quick inet6 proto ipv6-icmp from (self:7) to fe80::/10 icmp6-type neighbradv keep state label "acdbb900b50d8fb4ae21ddfdc609ecf8" @29 pass out log quick inet6 proto ipv6-icmp from (self:7) to ff02::/16 icmp6-type neighbradv keep state label "acdbb900b50d8fb4ae21ddfdc609ecf8" @30 pass in log quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type echoreq keep state label "42e9d787749713a849d8e92432efdfaa" @31 pass in log quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type echoreq keep state label "42e9d787749713a849d8e92432efdfaa" @32 pass in log quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routersol keep state label "42e9d787749713a849d8e92432efdfaa" @33 pass in log quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routersol keep state label "42e9d787749713a849d8e92432efdfaa" @34 pass in log quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routeradv keep state label "42e9d787749713a849d8e92432efdfaa" @35 pass in log quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routeradv keep state label "42e9d787749713a849d8e92432efdfaa" @36 pass in log quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type neighbrsol keep state label "42e9d787749713a849d8e92432efdfaa" @37 pass in log quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type neighbrsol keep state label "42e9d787749713a849d8e92432efdfaa" @38 pass in log quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type neighbradv keep state label "42e9d787749713a849d8e92432efdfaa" @39 pass in log quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type neighbradv keep state label "42e9d787749713a849d8e92432efdfaa" @40 pass in log quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type echoreq keep state label "8752fca75c6be992847ea984161bd3f1" @41 pass in log quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type routersol keep state label "8752fca75c6be992847ea984161bd3f1" @42 pass in log quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type routeradv keep state label "8752fca75c6be992847ea984161bd3f1" @43 pass in log quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type neighbrsol keep state label "8752fca75c6be992847ea984161bd3f1" @44 pass in log quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type neighbradv keep state label "8752fca75c6be992847ea984161bd3f1" @45 pass in log quick inet6 proto ipv6-icmp from :: to ff02::/16 icmp6-type echoreq keep state label "71dd196398b3f1da265dbd9dcad00e70" @46 pass in log quick inet6 proto ipv6-icmp from :: to ff02::/16 icmp6-type routersol keep state label "71dd196398b3f1da265dbd9dcad00e70" @47 pass in log quick inet6 proto ipv6-icmp from :: to ff02::/16 icmp6-type routeradv keep state label "71dd196398b3f1da265dbd9dcad00e70" @48 pass in log quick inet6 proto ipv6-icmp from :: to ff02::/16 icmp6-type neighbrsol keep state label "71dd196398b3f1da265dbd9dcad00e70" @49 pass in log quick inet6 proto ipv6-icmp from :: to ff02::/16 icmp6-type neighbradv keep state label "71dd196398b3f1da265dbd9dcad00e70" @50 block drop in log quick inet proto tcp from any port = 0 to any label "7b5bdc64d7ae74be1932f6764a591da5" @51 block drop in log quick inet proto udp from any port = 0 to any label "7b5bdc64d7ae74be1932f6764a591da5" @52 block drop in log quick inet6 proto tcp from any port = 0 to any label "7b5bdc64d7ae74be1932f6764a591da5" @53 block drop in log quick inet6 proto udp from any port = 0 to any label "7b5bdc64d7ae74be1932f6764a591da5" @54 block drop in log quick inet proto tcp from any to any port = 0 label "ae69f581dc429e3484a65f8ecd63baa5" @55 block drop in log quick inet proto udp from any to any port = 0 label "ae69f581dc429e3484a65f8ecd63baa5" @56 block drop in log quick inet6 proto tcp from any to any port = 0 label "ae69f581dc429e3484a65f8ecd63baa5" @57 block drop in log quick inet6 proto udp from any to any port = 0 label "ae69f581dc429e3484a65f8ecd63baa5" @58 pass log quick inet6 proto carp from any to ff02::12 keep state label "cf439d72ef4d245e8ad4a1405df1f665" @59 pass log quick inet proto carp from any to 224.0.0.18 keep state label "2ffa978d51f7b3fbc9000c2895106ee7" @60 block drop in log quick proto tcp from <sshlockout:0> to (self:14) port = 8908 label "db8f7226d24fe8390da89c8bfcab11d4" @61 block drop in log quick proto tcp from <sshlockout:0> to (self:14) port = 8443 label "8a7589316cc5c5cb69c0eb81112fb366" @62 block drop in log quick from <virusprot:0> to any label "8e367e2f9944d93137ae56d788c5d5e1" @63 pass in log quick on igc1 inet proto udp from any port = bootpc to 255.255.255.255 port = bootps keep state label "5168be2cca1e130b1ef2ac18161356a8" @64 pass in log quick on igc1 proto udp from any port = bootpc to (self:14) port = bootps keep state label "0b032d1bab91fc97e4a7faf03a7f17c3" @65 pass out log quick on igc1 proto udp from (self:14) port = bootps to any port = bootpc keep state label "5039e43005a9aa50eb032af274cc9aad" @66 pass in log quick on igc1 inet6 proto udp from fe80::/10 to fe80::/10 port = dhcpv6-client keep state label "fef3d333d96a8d3558956de1fffc61cc" @67 pass in log quick on igc1 inet6 proto udp from fe80::/10 to ff02::/16 port = dhcpv6-client keep state label "fef3d333d96a8d3558956de1fffc61cc" @68 pass in log quick on igc1 inet6 proto udp from fe80::/10 to ff02::/16 port = dhcpv6-server keep state label "d2bd536587a9f5680c1f850b2d346839" @69 pass in log quick on igc1 inet6 proto udp from ff02::/16 to fe80::/10 port = dhcpv6-server keep state label "3420206ced96c01ef73fbc4ac9deb745" @70 pass in log quick on igc1 inet6 proto udp from fe80::/10 to (self:7) port = dhcpv6-client keep state label "0fd202708c326aebbe44ab710b6d3652" @71 pass out log quick on igc1 inet6 proto udp from (self:7) port = dhcpv6-server to fe80::/10 keep state label "83f6c28de8efae9b444094e4a5bf898c" @72 pass in log quick on igc2 inet proto udp from any port = bootpc to 255.255.255.255 port = bootps keep state label "07daf606e4baa82915478774a40f014d" @73 pass in log quick on igc2 proto udp from any port = bootpc to (self:14) port = bootps keep state label "1e13125d68d267924569eadb69fa1ad1" @74 pass out log quick on igc2 proto udp from (self:14) port = bootps to any port = bootpc keep state label "4eb553ee95bcbf5299054b24b13f5528" @75 pass in log quick on igc3 inet proto udp from any port = bootpc to 255.255.255.255 port = bootps keep state label "102fc1c757023ef7f945d512ed212862" @76 pass in log quick on igc3 proto udp from any port = bootpc to (self:14) port = bootps keep state label "09ef23f01c5890e379d587e8e2d3dea0" @77 pass out log quick on igc3 proto udp from (self:14) port = bootps to any port = bootpc keep state label "4d95e0fbab26f616dedb0dda7c7581c3" @78 pass in log quick on igc0 proto udp from any port = bootps to any port = bootpc keep state label "f994f615e00b8be0042263f86c79913f" @79 pass out log quick on igc0 proto udp from any port = bootpc to any port = bootps keep state label "5cf7ab808da1fcbca1ddb9ba9b46b669" @80 pass in log quick on igc4 inet proto udp from any port = bootpc to 255.255.255.255 port = bootps keep state label "5abb7d88958c4e6df293f4bdf4663c7b" @81 pass in log quick on igc4 proto udp from any port = bootpc to (self:14) port = bootps keep state label "033633dc5b7d01a4ed8a7ee32de9e4f6" @82 pass out log quick on igc4 proto udp from (self:14) port = bootps to any port = bootpc keep state label "d0acc14b6054e272353f9b9147abb923" @83 block drop in quick inet from <crowdsec_blacklists:38091> to any label "3dece8d37a64bb42cdb4de03f79519e7" @84 block drop in quick inet6 from <crowdsec6_blacklists:29> to any label "2fe2f572b74d29f8a46214fc4c95b151" @85 block drop in log quick on igc0 inet from <bogons:853> to any label "b7cd97a164650b538506fb551a0369e7" @86 block drop in log quick on igc0 inet6 from <bogonsv6:144340> to any label "f140a48ddade668b9d6f5259669a1d5c" @87 block drop in log quick on igc0 inet from 10.0.0.0/8 to any label "1eb94a38e58994641aff378c21d5984f" @88 block drop in log quick on igc0 inet from 127.0.0.0/8 to any label "1eb94a38e58994641aff378c21d5984f" @89 block drop in log quick on igc0 inet from 100.64.0.0/10 to any label "1eb94a38e58994641aff378c21d5984f" @90 block drop in log quick on igc0 inet from 172.16.0.0/12 to any label "1eb94a38e58994641aff378c21d5984f" @91 block drop in log quick on igc0 inet from 192.168.0.0/16 to any label "1eb94a38e58994641aff378c21d5984f" @92 block drop in log quick on igc0 inet6 from fc00::/7 to any label "45afd72424c84d011c07957569151480" @93 pass in quick on lo0 all no state label "7535c94082e72e2207679aadb26afd92" @94 pass out log all flags S/SA keep state allow-opts label "fae559338f65e11c53669fc3642c93c2" @95 pass in log quick on igc1 proto tcp from any to (self:14) port = 8443 flags S/SA keep state label "b3d0aa308cae0f22daa73b5ebfdd6380" @96 pass in log quick on igc1 proto tcp from any to (self:14) port = 8908 flags S/SA keep state label "b3d0aa308cae0f22daa73b5ebfdd6380" @97 pass out log route-to (igc0 192.168.178.1) inet from (igc0:1) to ! (igc0:network:1) flags S/SA keep state allow-opts label "43ddc4e7182143cfd0e584aa8c76e779" @98 pass log quick on igc1 inet proto tcp from any to <GIT_IP_Whitelist:2> port = https flags S/SA keep state label "5fe609e54818e435919c8acdc9ae5fc8" @99 pass log quick on igc2 inet proto tcp from any to <GIT_IP_Whitelist:2> port = https flags S/SA keep state label "5fe609e54818e435919c8acdc9ae5fc8" @100 pass log quick on igc3 inet proto tcp from any to <GIT_IP_Whitelist:2> port = https flags S/SA keep state label "5fe609e54818e435919c8acdc9ae5fc8" @101 pass log quick on wg0 inet proto tcp from any to <GIT_IP_Whitelist:2> port = https flags S/SA keep state label "5fe609e54818e435919c8acdc9ae5fc8" @102 pass log quick on igc0 inet proto tcp from any to <GIT_IP_Whitelist:2> port = https flags S/SA keep state label "5fe609e54818e435919c8acdc9ae5fc8" @103 pass log quick on igc1 inet proto tcp from any to 140.82.121.4 port = ssh flags S/SA keep state label "f4ba95622bae15933a258d80d7ce1e8c" @104 pass log quick on igc2 inet proto tcp from any to 140.82.121.4 port = ssh flags S/SA keep state label "f4ba95622bae15933a258d80d7ce1e8c" @105 pass log quick on igc3 inet proto tcp from any to 140.82.121.4 port = ssh flags S/SA keep state label "f4ba95622bae15933a258d80d7ce1e8c" @106 pass log quick on wg0 inet proto tcp from any to 140.82.121.4 port = ssh flags S/SA keep state label "f4ba95622bae15933a258d80d7ce1e8c" @107 pass log quick on igc0 inet proto tcp from any to 140.82.121.4 port = ssh flags S/SA keep state label "f4ba95622bae15933a258d80d7ce1e8c" @108 pass in quick inet proto tcp from any to ! <GIT_IP_Whitelist:2> flags S/SA keep state label "d3591b10e43743e30a709ce7663b59fa" @109 pass in quick inet proto udp from any to ! <GIT_IP_Whitelist:2> keep state label "d3591b10e43743e30a709ce7663b59fa" @110 block drop log quick on igc1 inet from <Malicious_IPs:18916> to any label "676a9f50666a42c84301e677e1372c22" @111 block drop log quick on igc1 inet6 from <Malicious_IPs:18916> to any label "676a9f50666a42c84301e677e1372c22" @112 block drop log quick on igc2 inet from <Malicious_IPs:18916> to any label "676a9f50666a42c84301e677e1372c22" @113 block drop log quick on igc2 inet6 from <Malicious_IPs:18916> to any label "676a9f50666a42c84301e677e1372c22" @114 block drop log quick on igc3 inet from <Malicious_IPs:18916> to any label "676a9f50666a42c84301e677e1372c22" @115 block drop log quick on igc3 inet6 from <Malicious_IPs:18916> to any label "676a9f50666a42c84301e677e1372c22" @116 block drop log quick on wg0 inet from <Malicious_IPs:18916> to any label "676a9f50666a42c84301e677e1372c22" @117 block drop log quick on wg0 inet6 from <Malicious_IPs:18916> to any label "676a9f50666a42c84301e677e1372c22" @118 block drop log quick on igc0 inet from <Malicious_IPs:18916> to any label "676a9f50666a42c84301e677e1372c22" @119 block drop log quick on igc0 inet6 from <Malicious_IPs:18916> to any label "676a9f50666a42c84301e677e1372c22" @120 block drop log quick on igc4 inet from <Malicious_IPs:18916> to any label "676a9f50666a42c84301e677e1372c22" @121 block drop log quick on igc4 inet6 from <Malicious_IPs:18916> to any label "676a9f50666a42c84301e677e1372c22" @122 block drop log quick on igc1 inet from any to <Malicious_IPs:18916> label "be5085ce30e680463235dc3d9e4c436d" @123 block drop log quick on igc1 inet6 from any to <Malicious_IPs:18916> label "be5085ce30e680463235dc3d9e4c436d" @124 block drop log quick on igc2 inet from any to <Malicious_IPs:18916> label "be5085ce30e680463235dc3d9e4c436d" @125 block drop log quick on igc2 inet6 from any to <Malicious_IPs:18916> label "be5085ce30e680463235dc3d9e4c436d" @126 block drop log quick on igc3 inet from any to <Malicious_IPs:18916> label "be5085ce30e680463235dc3d9e4c436d" @127 block drop log quick on igc3 inet6 from any to <Malicious_IPs:18916> label "be5085ce30e680463235dc3d9e4c436d" @128 block drop log quick on wg0 inet from any to <Malicious_IPs:18916> label "be5085ce30e680463235dc3d9e4c436d" @129 block drop log quick on wg0 inet6 from any to <Malicious_IPs:18916> label "be5085ce30e680463235dc3d9e4c436d" @130 block drop log quick on igc0 inet from any to <Malicious_IPs:18916> label "be5085ce30e680463235dc3d9e4c436d" @131 block drop log quick on igc0 inet6 from any to <Malicious_IPs:18916> label "be5085ce30e680463235dc3d9e4c436d" @132 block drop log quick on igc4 inet from any to <Malicious_IPs:18916> label "be5085ce30e680463235dc3d9e4c436d" @133 block drop log quick on igc4 inet6 from any to <Malicious_IPs:18916> label "be5085ce30e680463235dc3d9e4c436d" @134 block drop in log quick inet from any to <Malicious_IPs:18916> label "15d4b08e375bd5b4a1bfe3b8dd0e8eaf" @135 block drop in log quick inet6 from any to <Malicious_IPs:18916> label "15d4b08e375bd5b4a1bfe3b8dd0e8eaf" @136 block drop in log quick on igc1 inet from any to <crowdsec_blacklists:38091> label "33d9f0f6541d0b4f4e3d0cff2c201978" @137 block drop in log quick on igc2 inet from any to <crowdsec_blacklists:38091> label "33d9f0f6541d0b4f4e3d0cff2c201978" @138 block drop in log quick on igc3 inet from any to <crowdsec_blacklists:38091> label "33d9f0f6541d0b4f4e3d0cff2c201978" @139 block drop in log quick on wg0 inet from any to <crowdsec_blacklists:38091> label "33d9f0f6541d0b4f4e3d0cff2c201978" @140 block drop in log quick on igc0 reply-to (igc0 192.168.178.1) inet from any to <crowdsec_blacklists:38091> label "33d9f0f6541d0b4f4e3d0cff2c201978" @141 block drop in log quick on wireguard inet from any to <crowdsec_blacklists:38091> label "33d9f0f6541d0b4f4e3d0cff2c201978" @142 block drop in log quick on igc1 inet from any to <crowdsec6_blacklists:29> label "257e8fa5902cc9c5e1428aad8d1b5953" @143 block drop in log quick on igc2 inet from any to <crowdsec6_blacklists:29> label "257e8fa5902cc9c5e1428aad8d1b5953" @144 block drop in log quick on igc3 inet from any to <crowdsec6_blacklists:29> label "257e8fa5902cc9c5e1428aad8d1b5953" @145 block drop in log quick on wg0 inet from any to <crowdsec6_blacklists:29> label "257e8fa5902cc9c5e1428aad8d1b5953" @146 block drop in log quick on igc0 reply-to (igc0 192.168.178.1) inet from any to <crowdsec6_blacklists:29> label "257e8fa5902cc9c5e1428aad8d1b5953" @147 block drop in log quick on wireguard inet from any to <crowdsec6_blacklists:29> label "257e8fa5902cc9c5e1428aad8d1b5953" @148 pass in log quick on igc0 reply-to (igc0 192.168.178.1) inet proto udp from any to (igc0:1) port = 51820 keep state label "d1a7879fa18dc8ea0aa7df5c99b10957" @149 pass in quick on igc0 reply-to (igc0 192.168.178.1) inet proto tcp from any to (igc0:1) port = http flags S/SA keep state label "e1c879a2f139a936f547b953d96c3ea8" @150 pass in quick on igc0 reply-to (igc0 192.168.178.1) inet proto tcp from any to (igc0:1) port = https flags S/SA keep state label "e1c879a2f139a936f547b953d96c3ea8" @151 pass in quick on igc0 reply-to (igc0 192.168.178.1) inet proto tcp from any to (self:7) port = http flags S/SA keep state label "da8e692e0c200ca488800341b823ad5f" @152 pass in quick on igc0 inet6 proto tcp from any to (self:7) port = http flags S/SA keep state label "da8e692e0c200ca488800341b823ad5f" @153 pass in quick on igc0 reply-to (igc0 192.168.178.1) inet proto tcp from any to (self:7) port = https flags S/SA keep state label "c79619348261fdc4b0204ec4a93888bf" @154 pass in quick on igc0 inet6 proto tcp from any to (self:7) port = https flags S/SA keep state label "c79619348261fdc4b0204ec4a93888bf" @155 pass in quick on igc1 inet from (igc1:network:1) to any flags S/SA keep state label "7ec30a775f5761dbf17c1d22463d22f8" @156 pass in quick on igc1 inet proto tcp from any to (self:7) port = http flags S/SA keep state label "5a3af4610c82e86b6113ec6de17d01e6" @157 pass in quick on igc1 inet proto tcp from any to (self:7) port = https flags S/SA keep state label "f2db1a9c60f4c9b97b664231fc82661f" @158 pass in log quick on igc2 inet proto tcp from any to any port = http flags S/SA keep state label "e1547fc82abbc47d6ef7b9440d85e82b" @159 pass in log quick on igc2 inet6 proto tcp from any to any port = http flags S/SA keep state label "e1547fc82abbc47d6ef7b9440d85e82b" @160 pass in log quick on igc2 inet proto tcp from any to any port = https flags S/SA keep state label "f95e87d88701fc2304c8e349665351ff" @161 pass in log quick on igc2 inet6 proto tcp from any to any port = https flags S/SA keep state label "f95e87d88701fc2304c8e349665351ff" @162 block drop in log quick on igc2 inet all label "7197d9fcb10047f871039c7c234b4dbf" @163 block drop in log quick on igc2 inet6 all label "7197d9fcb10047f871039c7c234b4dbf" @164 pass in quick on wg0 inet from (wg0:network:1) to any flags S/SA keep state label "2e8c745ab1902678c973687535685c2b" @165 pass in quick on wg0 inet6 from (wg0:network:*) to any flags S/SA keep state label "2e8c745ab1902678c973687535685c2b" @166 pass in quick on wg0 inet6 from fe80::/10 to any flags S/SA keep state label "2e8c745ab1902678c973687535685c2b" @167 block drop in quick on wg0 inet all label "40581bc9034fd36869d4ab7e5becf3f8" @168 block drop in quick on wg0 inet6 all label "40581bc9034fd36869d4ab7e5becf3f8" @169 pass in quick on igc3 inet proto tcp from any to any port = http flags S/SA keep state label "1ee9e2a05608bfdb51125289d53f8f0f" @170 pass in quick on igc3 inet6 proto tcp from any to any port = http flags S/SA keep state label "1ee9e2a05608bfdb51125289d53f8f0f" @171 pass in quick on igc3 inet proto tcp from any to any port = https flags S/SA keep state label "a38d8e0ca66004679bc5382f1f5cfb46" @172 pass in quick on igc3 inet6 proto tcp from any to any port = https flags S/SA keep state label "a38d8e0ca66004679bc5382f1f5cfb46" @173 block drop in log quick on igc3 inet all label "74bd3df10ff01798ced3ef3c799b8204" @174 block drop in log quick on igc3 inet6 all label "74bd3df10ff01798ced3ef3c799b8204" @175 pass in log quick on igc4 inet proto tcp from any to any port = https flags S/SA keep state label "eb48731bc83c94b53075159c2f99a83e" @176 pass in log quick on igc4 inet6 proto tcp from any to any port = https flags S/SA keep state label "eb48731bc83c94b53075159c2f99a83e" @177 pass in log quick on igc4 inet proto tcp from any to any port = http flags S/SA keep state label "f373f203f7e75e24591ab4035e1e4b65" @178 pass in log quick on igc4 inet6 proto tcp from any to any port = http flags S/SA keep state label "f373f203f7e75e24591ab4035e1e4b65" @179 block drop in log quick on igc4 inet all label "bb19ae9f9b0fc5379daa88758052b390" @180 block drop in log quick on igc4 inet6 all label "bb19ae9f9b0fc5379daa88758052b390" @181 pass in quick on wireguard inet from (wireguard:network:1) to any flags S/SA keep state label "2be27c99ad49942931537e63da8b9c23" @182 block drop in log quick on wireguard inet from (wireguard:network:1) to any label "53ceaf9f9d50ae2042c06b1322219941" @183 anchor "acme-client/*" all @184 anchor "iperf" all nat rules @0 no nat proto carp all @1 nat on igc0 inet from (igc1:network:1) to any port = isakmp -> (igc0:0) static-port @2 nat on igc0 inet from (lo0:network:1) to any port = isakmp -> (igc0:0) static-port @3 nat on igc0 inet from (igc2:network:1) to any port = isakmp -> (igc0:0) static-port @4 nat on igc0 inet from (igc3:network:1) to any port = isakmp -> (igc0:0) static-port @5 nat on igc0 inet from (wg0:network:1) to any port = isakmp -> (igc0:0) static-port @6 nat on igc0 inet from (igc4:network:1) to any port = isakmp -> (igc0:0) static-port @7 nat on igc0 inet from 127.0.0.0/8 to any port = isakmp -> (igc0:0) static-port @8 nat on igc0 inet from (igc1:network:1) to any -> (igc0:0) port 1024:65535 @9 nat on igc0 inet from (lo0:network:1) to any -> (igc0:0) port 1024:65535 @10 nat on igc0 inet from (igc2:network:1) to any -> (igc0:0) port 1024:65535 @11 nat on igc0 inet from (igc3:network:1) to any -> (igc0:0) port 1024:65535 @12 nat on igc0 inet from (wg0:network:1) to any -> (igc0:0) port 1024:65535 @13 nat on igc0 inet from (igc4:network:1) to any -> (igc0:0) port 1024:65535 @14 nat on igc0 inet from 127.0.0.0/8 to any -> (igc0:0) port 1024:65535 @15 nat-anchor "acme-client/*" all @0 no rdr proto carp all @1 no rdr on igc1 proto tcp from any to (igc1:2) port = 8443 @2 no rdr on igc1 proto tcp from any to (igc1:2) port = 8908 @3 rdr-anchor "acme-client/*" all
Flags: 0x8182 Standard query response, Server failure 1... .... .... .... = Response: Message is a response .000 0... .... .... = Opcode: Standard query (0) .... .0.. .... .... = Authoritative: Server is not an authority for domain .... ..0. .... .... = Truncated: Message is not truncated .... ...1 .... .... = Recursion desired: Do query recursively .... .... 1... .... = Recursion available: Server can do recursive queries .... .... .0.. .... = Z: reserved (0) .... .... ..0. .... = Answer authenticated: Answer/authority portion was not authenticated by the server .... .... ...0 .... = Non-authenticated data: Unacceptable .... .... .... 0010 = Reply code: Server failure (2)