6.8pfsense_ngIncrease UFS read-ahead speeds to match current state of hard drives and NCQ. More information here: http://ivoras.sharanet.org/blog/tree/2010-11-19.ufs-read-ahead.htmlvfs.read_maxdefaultSet the ephemeral port range to be lower.net.inet.ip.portrange.firstdefaultDrop packets to closed TCP ports without returning a RSTnet.inet.tcp.blackholedefaultDo not send ICMP port unreachable messages for closed UDP portsnet.inet.udp.blackholedefaultRandomize the ID field in IP packets (default is 0: sequential IP IDs)net.inet.ip.random_iddefaultDrop SYN-FIN packets (breaks RFC1379, but nobody uses it anyway)net.inet.tcp.drop_synfindefaultEnable sending IPv4 redirectsnet.inet.ip.redirectdefaultEnable sending IPv6 redirectsnet.inet6.ip6.redirectdefaultGenerate SYN cookies for outbound SYN-ACK packetsnet.inet.tcp.syncookiesdefaultMaximum incoming/outgoing TCP datagram size (receive)net.inet.tcp.recvspacedefaultMaximum incoming/outgoing TCP datagram size (send)net.inet.tcp.sendspacedefaultIP Fastforwardingnet.inet.ip.fastforwardingdefaultDo not delay ACK to try and piggyback it onto a data packetnet.inet.tcp.delayed_ackdefaultMaximum outgoing UDP datagram sizenet.inet.udp.maxdgramdefaultHandling of non-IP packets which are not passed to pfil (see if_bridge(4))net.link.bridge.pfil_onlyipdefaultSet to 0 to disable filtering on the incoming and outgoing member interfaces.net.link.bridge.pfil_memberdefaultSet to 1 to enable filtering on the bridge interfacenet.link.bridge.pfil_bridgedefaultAllow unprivileged access to tap(4) device nodesnet.link.tap.user_opendefaultVerbosity of the rndtest driver (0: do not display results on console)kern.rndtest.verbosedefaultRandomize PID's (see src/sys/kern/kern_fork.c: sysctl_kern_randompid())kern.randompiddefaultMaximum size of the IP input queuenet.inet.ip.intr_queue_maxlendefaultDisable CTRL+ALT+Delete reboot from keyboard.hw.syscons.kbd_rebootdefaultEnable TCP Inflight modenet.inet.tcp.inflight.enabledefaultEnable TCP extended debuggingnet.inet.tcp.log_debugdefaultSet ICMP Limitsnet.inet.icmp.icmplimdefaultTCP Offload Enginenet.inet.tcp.tsodefaultnormalpfSenselocaldomainallAll Userssystem19980adminsSystem Administratorssystem19990page-alladminSystem Administratorsystemadmins$1$dSJImFph$GvZ7.1UbuWu.Yb8etC0re.0user-shell-access20002000Etc/UTC3000.pfsense.pool.ntp.orghttpsyesvr1dhcpvr0192.168.1.124192.168.1.100192.168.1.199publicpassDefault allow LAN to any rulelan0****root/usr/bin/nice -n20 newsyslog1,310-5***root/usr/bin/nice -n20 adjkerntz -a131**root/usr/bin/nice -n20 /etc/rc.update_bogons.sh*/60****root/usr/bin/nice -n20 /usr/local/sbin/expiretable -v -t 3600 sshlockout11***root/usr/bin/nice -n20 /etc/rc.dyndns.update*/60****root/usr/bin/nice -n20 /usr/local/sbin/expiretable -v -t 3600 virusprot*/5****root/usr/bin/nice -n20 /usr/local/bin/checkreload.shICMPicmpICMPTCPtcpGeneric TCPHTTPhttpGeneric HTTP/200HTTPShttpsGeneric HTTPS/200SMTPsendGeneric SMTPEHLO nosuchhost250-system_information-container:col1:show,captive_portal_status-container:col1:close,carp_status-container:col1:close,cpu_graphs-container:col1:close,gateways-container:col1:close,gmirror_status-container:col1:close,installed_packages-container:col1:close,interface_statistics-container:col1:close,interfaces-container:col2:show,ipsec-container:col2:close,load_balancer_status-container:col2:close,log-container:col2:close,picture-container:col2:close,rss-container:col2:close,services_status-container:col2:close,traffic_graphs-container:col2:close