Skip to main content

Recent Posts

Untitled

Mar 31, 2025AustinLeath

0 likes • 3 views

{
"bindAddress": "",
"bindPort": 2001,
"publicAddress": "",
"publicPort": 2001,
"a2s": {
"address": "0.0.0.0",
"port": 17777
},
"rcon": {
"address": "0.0.0.0",
"port": 19999,
"password": "fobarma1234!",
"permission": "admin",
"blacklist": [],
"whitelist": []
},
"game": {
"name": "[NA3] FOB Arma | Arland Game Master | fobarma.com",
"password": "",
"passwordAdmin": "fobarma1234!",
"admins": [
"76561198054239558",
"76561198097176793",
"76561198968225358",
"76561199833357392",
"76561198073098171"
],
"scenarioId": "{2BBBE828037C6F4B}Missions/22_GM_Arland.conf",
"maxPlayers": 128,
"visible": true,
"crossPlatform": true,
"gameProperties": {
"serverMaxViewDistance": 2500,
"serverMinGrassDistance": 100,
"networkViewDistance": 1500,
"disableThirdPerson": true,
"fastValidation": true,
"battlEye": true,
"VONDisableUI": false,
"VONDisableDirectSpeechUI": false,
"VONCanTransmitCrossFaction": false
},
"mods": [
{
"modId": "5AAAC70D754245DD",
"name": "Server Admin Tools"
},
{
"modId": "595F2BF2F44836FB",
"name": "RHS - Status Quo"
},
{
"modId": "6148E5A6D60AA2BA",
"name": "Prefab Optimizations - Glass"
},
{
"modId": "614627BACB991914",
"name": "Prefab Optimizations - Core"
},
{
"modId": "611773E9DBCA20AC",
"name": "Prefab Optimizations"
},
{
"modId": "5E2B79A65B0B6362",
"name": "Change Teams"
},
{
"modId": "5C73156675E11A0F",
"name": "GM Persistent Loadouts"
},
{
"modId": "5B0D1E4380971EBD",
"name": "COALITION Squad Interface"
},
{
"modId": "5E92F5A4A1B75A75",
"name": "Player Map Markers"
},
{
"modId": "628F720BC527C143",
"name": "Rayzis Optics"
},
{
"modId": "6088A3044B7ECBFD",
"name": "Keep Gun When Uncon"
},
{
"modId": "60ED3CC6E7E40221",
"name": "Sikorsky MH60 DAP Project"
}
]
},
"operating": {
"lobbyPlayerSynchronise": true,
"joinQueue": {
"maxSize": 50
}
}
}

Arma Recruitment DM

Mar 23, 2025AustinLeath

0 likes • 1 view

Hey! I saw that you posted in the #looking_for_unit channel in the official Arma Discord and so I figured I would send you a DM to see if you are interested in joining our community.
I represent an up and coming Arma Reforger community called FOB Arma ( https://fobarma.com ) and we are looking for players that are new to the game and who also want to have a good time.
We have a dedicated Arma Reforger server named `[NA1] Fob Arma | Rivne Oblast Conflict | fobarma.com` and have put in some work to create custom scenarios that members of our community can take part in and would love to have you along for the ride.
Also, we have a playtest of our community scenario coming up tonight. If you are interested just join the Discord and comment in general chat that you are here for the playtest. Closer to the event we will organize players into teams based on what side they want to play on.
If you have any questions let me know!
https://discord.gg/5yxZDKy9?event=1352863145827373220

Untitled

Mar 13, 2025AustinLeath

0 likes • 3 views

[
{"Name": "Chat Message Roles", "Version": "1.0.11", "ID": "5D071A427403AB2C"},
{"Name": "Disable Game Master Budgets", "Version": "1.0.1", "ID": "5F2944B7474F043F"},
{"Name": "Game Master Enhanced", "Version": "1.3.2", "ID": "5964E0B3BB7410CE"},
{"Name": "Game Master FX", "Version": "1.0.94", "ID": "5994AD5A9F33BE57"},
{"Name": "GMFX artillery expansion", "Version": "1.0.3", "ID": "622B1027A8796320"},
{"Name": "Where Am I", "Version": "1.2.0", "ID": "5965550F24A0C152"},
{"Name": "Player Map Markers", "Version": "1.1.2", "ID": "5E92F5A4A1B75A75"},
{"Name": "Server Admin Tools", "Version": "1.0.62", "ID": "5AAAC70D754245DD"},
{"Name": "Team Balancer", "Version": "1.0.0", "ID": "5F0289EB493E9977"},
{"Name": "WeakerWalls", "Version": "1.0.0", "ID": "620A15433CA8D688"},
{"Name": "COALITION Squad Interface", "Version": "1.6.13", "ID": "5B0D1E4380971EBD"},
{"Name": "More Damage", "Version": "1.0.3", "ID": "60DCBC196B6C9667"},
{"Name": "ACE Core", "Version": "1.2.1", "ID": "60C4CE4888FF4621"},
{"Name": "ACE Backblast", "Version": "1.2.0", "ID": "60E573C9B04CC408"},
{"Name": "ACE Compass", "Version": "1.2.0", "ID": "60C53A9372ED3964"},
{"Name": "ACE Carrying", "Version": "1.2.0", "ID": "5DBD560C5148E1DA"},
{"Name": "ACE Explosives", "Version": "1.2.1", "ID": "61B7763A8AEB53B7"},
{"Name": "ACE Magazine Repack", "Version": "1.2.0", "ID": "611CB1D409001EB0"},
{"Name": "ACE Medical", "Version": "1.2.0", "ID": "60C4C12DAE90727B"},
{"Name": "Simplified Medical System", "Version": "1.0.11", "ID": "64AA22C8FD9AD83E"},
{"Name": "AutoTurretCore", "Version": "0.1.29", "ID": "621E93B201310954"},
{"Name": "WCS_Core", "Version": "1.0.1", "ID": "64610AFB74AA9842"},
{"Name": "WCS_SpawnProtection", "Version": "2.0.15", "ID": "614C00DA7F8765F6"},
{"Name": "WCS_VehicleLock", "Version": "1.0.11", "ID": "61BA4EB5C886D396"},
{"Name": "WCS_Armament", "Version": "1.0.85", "ID": "629B2BA37EFFD577"},
{"Name": "RHS - Status Quo", "Version": "0.10.4075", "ID": "595F2BF2F44836FB"},
{"Name": "Gs BTR-90", "Version": "3.0.3", "ID": "618C2492CC62D0D5"},
{"Name": "SpaceCore", "Version": "1.2.40", "ID": "5E389BB9F58B79A6"},
{"Name": "M2 Bradley Fighting Vehicle", "Version": "1.0.22", "ID": "63120AE07E6C0966"},
{"Name": "Cougar MRAP", "Version": "1.0.13", "ID": "5D5A20A8AE33C21E"},
{"Name": "Black_Sheep_FPV_Drones", "Version": "1.0.4", "ID": "64D347B1000FBDA4"},
{"Name": "Joint Light Tactical Vehicle", "Version": "1.2.17", "ID": "5C721177A220B42F"},
{"Name": "Tactical Flava", "Version": "0.1.69", "ID": "5D550926D43F1409"},
{"Name": "AKI CORE", "Version": "1.0.3", "ID": "62CCD69DD17E4F2F"},
{"Name": "AH6M", "Version": "1.1.18", "ID": "6273146ADFE8241D"},
{"Name": "WCS_Mi-24V", "Version": "1.0.45", "ID": "628933A0D3A0D700"},
{"Name": "STRYKER", "Version": "1.2.8", "ID": "5B02128D896F7DE8"},
{"Name": "Add AH6M to RU Depot", "Version": "1.0.8", "ID": "62BD130768A713EF"},
{"Name": "RIS Laser Attachments", "Version": "1.0.79", "ID": "5ABD0CB57F7E9EB1"},
{"Name": "Custom Attachments Slots", "Version": "1.0.1", "ID": "62DED82740D3DDDB"},
{"Name": "Rayzis Optics", "Version": "1.1.28", "ID": "628F720BC527C143"},
{"Name": "Desert Eagle", "Version": "1.2.0", "ID": "5AD299F4421F1D6A"},
{"Name": "Caps Weapon Pack", "Version": "1.0.19", "ID": "6319242B050D1483"},
{"Name": "AK 50", "Version": "1.0.9", "ID": "5D7E9E98C4523E16"},
{"Name": "PKP-B", "Version": "0.0.45", "ID": "6447378A6C7CB747"},
{"Name": "Snipex Alligator 14.5x114", "Version": "1.0.7", "ID": "6330B96AA6C84654"},
{"Name": "Bacon Suppressors", "Version": "1.2.7", "ID": "5AB301290317994A"},
{"Name": "M110 DMR", "Version": "1.0.25", "ID": "5CA125536EE7430A"},
{"Name": "MCX SPEAR 6.8", "Version": "1.0.5", "ID": "6086E7EBC78E9039"},
{"Name": "Mar-10", "Version": "1.0.7", "ID": "62CD51E9C58D6957"},
{"Name": "FN SCAR -HEAVY and LIGHT-", "Version": "1.6.3", "ID": "616478A18DC7DCB6"},
{"Name": "AS50", "Version": "1.0.4", "ID": "6132B80DC62D8507"},
{"Name": "MAKO AK 105 Zentico", "Version": "1.0.42", "ID": "5DF14A2FD0C42CC0"},
{"Name": "StrikeWorks Ru Small Arms Pack", "Version": "1.0.46", "ID": "63132835C7B48A57"},
{"Name": "Big Chungus SMGs", "Version": "1.0.33", "ID": "60E6F54E174C53C5"},
{"Name": "Big Chungus RPD", "Version": "1.0.10", "ID": "61344BDC155A5A28"},
{"Name": "Big Chungus Shotguns", "Version": "1.0.20", "ID": "620E584B1D2C96A4"},
{"Name": "FAMAS", "Version": "0.0.9", "ID": "6338D68D2B800800"},
{"Name": "HK Pack", "Version": "1.0.12", "ID": "64863EE1C8CF7512"},
{"Name": "M4 Block II and URG-I", "Version": "1.2.9", "ID": "5AB890B71D748750"},
{"Name": "Spectre M4", "Version": "1.0.12", "ID": "62BCDB26C5195526"},
{"Name": "SVT-40", "Version": "1.0.7", "ID": "5D7D22C2C587DE66"},
{"Name": "CheyTac M200 Intervention", "Version": "1.0.15", "ID": "62F262030463CDFB"},
{"Name": "SWORD_International_Mk 18", "Version": "1.0.12", "ID": "62CAEB00E5A7304A"},
{"Name": "Zeliks Character", "Version": "1.1.18", "ID": "5D0551624969C92E"},
{"Name": "RHS Extra Camo Pack", "Version": "1.0.8", "ID": "62E76AB6CC8DFD39"},
{"Name": "Bundeswehr Equipment - Stable", "Version": "2.6.85", "ID": "607890C143259412"},
{"Name": "Ghillie Suits", "Version": "1.0.11", "ID": "61DD377AE51CB4BD"},
{"Name": "MOTAR_GhillieSuit", "Version": "0.0.1", "ID": "64D4E4ACDE3EBEDB"},
{"Name": "Russian Tactical Gear", "Version": "1.0.44", "ID": "647CB046E0EDE0D9"},
{"Name": "American Patches Pack", "Version": "1.0.1", "ID": "623731A5982A63E8"},
{"Name": "Country Flag Patches", "Version": "1.0.17", "ID": "60D23A92813D0C8E"},
{"Name": "SpawnLoadout_NoArsenal", "Version": "0.1.0", "ID": "61B503ED3E717226"},
{"Name": "Bacon Loadout Editor", "Version": "1.2.26", "ID": "606B100247F5C709"},
{"Name": "WCS_Sounds", "Version": "1.0.15", "ID": "631C3C1AEE9C90BC"},
{"Name": "WCS_Earplugs", "Version": "1.0.9", "ID": "612F512CD4CB21D5"},
{"Name": "WCS_Rostov", "Version": "1.0.13", "ID": "617CBAD67DCDCBF8"},
{"Name": "Rostov Oblast", "Version": "1.0.1", "ID": "5E172C6CAD10FBFC"},
{"Name": "BlackSheep Rostov", "Version": "2.0.2", "ID": "64715EA60D239D4B"},
{"Name": "Blacksheep_Server_Core", "Version": "1.0.19", "ID": "64D1112616A35521"}
]
# Amazon Web Services
# Virtual Private Cloud
# AWS utilizes unique identifiers to manipulate the configuration of
# a VPN Connection. Each VPN Connection is assigned an identifier and is
# associated with two other identifiers, namely the
# Customer Gateway Identifier and Virtual Private Gateway Identifier.
#
# Your VPN Connection ID : {$AWS_VPN_ID}
# Your Virtual Private Gateway ID :
# Your Customer Gateway ID : {$CGW_ID}
#
#
# This configuration consists of two tunnels. Both tunnels must be
# configured on your Customer Gateway.
#
# --------------------------------------------------------------------------------
# IPSec Tunnel #1
# --------------------------------------------------------------------------------
# #1: Internet Key Exchange (IKE) Configuration
#
# A policy is established for the supported ISAKMP encryption,
# authentication, Diffie-Hellman, lifetime, and key parameters.
# Please note, these sample configurations are for the minimum requirement of AES128, SHA1, and DH Group 2.
# Category "VPN" connections in the GovCloud region have a minimum requirement of AES128, SHA2, and DH Group 14.
# You will need to modify these sample configuration files to take advantage of AES256, SHA256, or other DH groups like 2, 14-18, 22, 23, and 24.
# NOTE: If you customized tunnel options when creating or modifying your VPN connection, you may need to modify these sample configurations to match
# the custom settings for your tunnels.
#
# Higher parameters are only available for VPNs of category "VPN," and not for "VPN-Classic". The address of the external interface for your
# customer gateway must be a static address.
# Your customer gateway may reside behind a device performing network address translation (NAT).
# To ensure that NAT traversal (NAT-T) can function, you must adjust your firewall rules to unblock UDP port 4500.
# If not behind NAT, and you are not using an Accelerated VPN, we recommend disabling NAT-T. If you are using an Accelerated VPN, make sure
# that NAT-T is enabled.
#
1. Navigate to VPN --> IPsec --> Click "Add P1"
General Information
Description: {$AWS_VPN_ID}-1
IKE Endpoint Configuration
Key Exchange version: IKEv2
Internet Protocol: IPv4
Interface: WAN
Remote Gateway: {$AWS_TUNNEL_1_OUTSIDE_IP}
Phase 1 Proposal (Authentication)
Authentication Method: Mutual PSK
My identifier: IP address --> {$PFSENSE_WAN_INTERFACE_PUBLIC_IP}
Peer identifier: IP address --> {$AWS_TUNNEL_1_OUTSIDE_IP}
Pre-Shared Key: {$AWS_TUNNEL_1_PSK}
Phase 1 Proposal
Encryption Algorithm:
Algorithm: AES128-GCM
Key length: 128 bits
Hash: SHA256
DH Group: 2 (1024 bit)
Expiration and Replacement
Life Time: 28800
Advanced Options:
Child SA Start Action: default
Child SA Close Action: default
NAT Traversal: Auto
MOBIKE: Disable
Dead Peer Detection: enabled
Delay: 10
2. Click "Save"
3. Click "Apply Changes"
# #2: IPSec Configuration
#
# The IPSec transform set defines the encryption, authentication, and IPSec mode parameters.
#
# Category "VPN" connections in the GovCloud region have a minimum requirement of AES128, SHA2, and DH Group 14.
# Please note, you may use these additionally supported IPSec parameters for encryption like AES256 and other DH groups like 2, 5, 14-18, 22, 23, and 24.
# Higher parameters are only available for VPNs of category "VPN," and not for "VPN-Classic".
#
1. Navigate to VPN --> IPsec --> Click on "Show Phase 2 Entries" for the previous created Phase 1 entry and click "Add P2"
General Information:
Description: {$AWS_VPN_ID}-tunnel1-phase2
Mode: Routed (VTI)
Networks
Local Network:
Type: Address
Address: {$AWS_VPN_TUNNEL1_LAST_USABLE_INSIDE_IP} <--- (This value is set to the last usable IP address in the automatically generated inside /30 network that AWS provides for the tunnel)
Remote Network:
Type: Address
Address: {$AWS_VPN_TUNNEL1_FIRST_USABLE_INSIDE_IP} <--- (This value is set to the first usable IP address in the automatically generated inside /30 network that AWS provides for the tunnel)
Phase 2 Proposal (SA/Key Exchange)
Protocol: ESP
Encryption Algorithms: AES128-GCM - 128 bits
PFS key group: 2 (1024 bit)
Expiration and Replacement
Life Time: 3600
2. Click "Save"
3. Click "Apply Changes"
# #3: Border Gateway Protocol (BGP) Configuration
#
# BGP is used within the tunnel to exchange prefixes between the Virtual Private Gateway and your Customer Gateway.
# The Virtual Private Gateway will announce the prefix corresponding to your VPC.
#
#
#
# The local BGP Autonomous System Number (ASN) (65000) is configured as part of your Customer Gateway. If the ASN must be changed,
# the Customer Gateway and VPN Connection will need to be recreated with AWS. This example assumes that your Amazon VPC ASN is 65501.
#
1. Navigate to Services --> FRR BGP --> BGP
BGP Router Options
Enable: Yes
Log Adjacency Changes: Yes
Local AS: 65000
Timers:
Keep Alive Interval: 5
Hold Time: 30
Update Delay: 0
Peer Wait: 7
Graceful Restart / Shutdown
Timers:
Stale Path Time: 2
Restart Time: 5
RIB Stale Time: 2
Network Distribution
Redistribute Local:
Redistribute connected networks: No
Redistribute FRR static routes: No
Redistribute Kernel routing table/pfSense static routes: No
Networks to Distribute:
(Add any network CIDR's that you would like to advertise to AWS from PFsense)
2. Click "Save"
3. Navigate to Services --> FRR Global/Zebra --> Route Maps and Click "Add"
General Options:
Name: ALLOW-ALL-TUNNEL-1
Description: Match any route
Action: Permit
Sequence: 100
4. Click "Save"
5. Navigate to Services --> FRR BGP --> Neighbors and click "Add"
General Options
Name/Address: {$AWS_VPN_TUNNEL1_FIRST_USABLE_INSIDE_IP}
Description: {$AWS_VPN_ID}-tunnel1-BGP
Basic Options
Remote AS: 65501
Peer Filtering
Route Map Filters:
Inbound Route Map Filter: ALLOW-ALL-TUNNEL-1 - Match any route
Outbound Route Map Filter: ALLOW-ALL-TUNNEL-1 - Match any route
6. Click "Save"
#
# --------------------------------------------------------------------------------
# IPSec Tunnel #2
# --------------------------------------------------------------------------------
# #1: Internet Key Exchange (IKE) Configuration
#
# A policy is established for the supported ISAKMP encryption,
# authentication, Diffie-Hellman, lifetime, and key parameters.
# Please note, these sample configurations are for the minimum requirement of AES128, SHA1, and DH Group 2.
# Category "VPN" connections in the GovCloud region have a minimum requirement of AES128, SHA2, and DH Group 14.
# You will need to modify these sample configuration files to take advantage of AES256, SHA256, or other DH groups like 2, 14-18, 22, 23, and 24.
# NOTE: If you customized tunnel options when creating or modifying your VPN connection, you may need to modify these sample configurations to match the custom
# settings for your tunnels.
#
# Higher parameters are only available for VPNs of category "VPN," and not for "VPN-Classic".
# The address of the external interface for your customer gateway must be a static address.
# Your customer gateway may reside behind a device performing network address translation (NAT).
# To ensure that NAT traversal (NAT-T) can function, you must adjust your firewall rules to unblock UDP port 4500.
# If not behind NAT, and you are not using an Accelerated VPN, we recommend disabling NAT-T. If you are using an Accelerated VPN, make sure that NAT-T is enabled.
#
1. Navigate to VPN --> IPsec --> Click "Add P1"
General Information
Description: {$AWS_VPN_ID}-2
IKE Endpoint Configuration
Key Exchange version: IKEv2
Internet Protocol: IPv4
Interface: WAN
Remote Gateway: {$AWS_TUNNEL_2_OUTSIDE_IP}
Phase 1 Proposal (Authentication)
Authentication Method: Mutual PSK
My identifier: IP address --> {$PFSENSE_WAN_INTERFACE_PUBLIC_IP}
Peer identifier: IP address --> {$AWS_TUNNEL_2_OUTSIDE_IP}
Pre-Shared Key: {$AWS_TUNNEL_2_PSK}
Phase 1 Proposal
Encryption Algorithm:
Algorithm: AES128-GCM
Key length: 128 bits
Hash: SHA256
DH Group: 2 (1024 bit)
Expiration and Replacement
Life Time: 28800
Advanced Options:
Child SA Start Action: default
Child SA Close Action: default
NAT Traversal: Auto
MOBIKE: Disable
Dead Peer Detection: enabled
Delay: 10
2. Click "Save"
3. Click "Apply Changes"
# #2: IPSec Configuration
#
# The IPSec transform set defines the encryption, authentication, and IPSec
# mode parameters.
#
# Category "VPN" connections in the GovCloud region have a minimum requirement of AES128, SHA2, and DH Group 14.
# Please note, you may use these additionally supported IPSec parameters for encryption like AES256 and other DH groups like 2, 5, 14-18, 22, 23, and 24.
# Higher parameters are only available for VPNs of category "VPN," and not for "VPN-Classic".
#
1. Navigate to VPN --> IPsec --> Click on "Show Phase 2 Entries" for the previous created Phase 1 entry and click "Add P2"
General Information:
Description: {$AWS_VPN_ID}-tunnel2-phase2
Mode: Routed (VTI)
Networks
Local Network:
Type: Address
Address: {$AWS_VPN_TUNNEL2_LAST_USABLE_INSIDE_IP} <--- (This value is set to the last usable IP address in the automatically generated inside /30 network that AWS provides for the tunnel)
Remote Network:
Type: Address
Address: {$AWS_VPN_TUNNEL2_FIRST_USABLE_INSIDE_IP} <--- (This value is set to the first usable IP address in the automatically generated inside /30 network that AWS provides for the tunnel)
Phase 2 Proposal (SA/Key Exchange)
Protocol: ESP
Encryption Algorithms: AES128-GCM - 128 bits
PFS key group: 2 (1024 bit)
Expiration and Replacement
Life Time: 3600
2. Click "Save"
3. Click "Apply Changes"
# #3: Border Gateway Protocol (BGP) Configuration
#
# BGP is used within the tunnel to exchange prefixes between the Virtual Private Gateway and your Customer Gateway. The Virtual Private Gateway
# will announce the prefix corresponding to your VPC.
#
#
#
# The local BGP Autonomous System Number (ASN) (65000) is configured as part of your Customer Gateway. If the ASN must be changed,
# the Customer Gateway and VPN Connection will need to be recreated with AWS. This example assumes that your Amazon VPC ASN is 65501.
#
1. Navigate to Services --> FRR BGP --> BGP
BGP Router Options
Enable: Yes
Log Adjacency Changes: Yes
Local AS: 65000
Timers:
Keep Alive Interval: 5
Hold Time: 30
Update Delay: 0
Peer Wait: 7
Graceful Restart / Shutdown
Timers:
Stale Path Time: 2
Restart Time: 5
RIB Stale Time: 2
Network Distribution
Redistribute Local:
Redistribute connected networks: No
Redistribute FRR static routes: No
Redistribute Kernel routing table/pfSense static routes: No
Networks to Distribute:
(Add any network CIDR's that you would like to advertise to AWS from PFsense)
2. Click "Save"
3. Navigate to Services --> FRR Global/Zebra --> Route Maps and Click "Add"
General Options:
Name: ALLOW-ALL-TUNNEL-2
Description: Match any route
Action: Permit
Sequence: 100
4. Click "Save"
5. Navigate to Services --> FRR BGP --> Neighbors and click "Add"
General Options
Name/Address: {$AWS_VPN_TUNNEL2_FIRST_USABLE_INSIDE_IP}
Description: {$AWS_VPN_ID}-tunnel2-BGP
Basic Options
Remote AS: 65501
Peer Filtering
Route Map Filters:
Inbound Route Map Filter: ALLOW-ALL-TUNNEL-2 - Match any route
Outbound Route Map Filter: ALLOW-ALL-TUNNEL-2 - Match any route
6. Click "Save"
# To advertise additional prefixes to Amazon VPC, add these prefixes as 'network' statements
# under the BGP IPv4 address family. If you want to advertise 192.168.0.0/16 to Amazon, this
# can be done using the following.
route dynamic bgp
server vrf default
address-family ipv4 unicast
network 192.168.0.0/16
exit
end conf
# Additional Notes and Questions
# - Amazon Virtual Private Cloud Getting Started Guide:
# http://docs.amazonwebservices.com/AmazonVPC/latest/GettingStartedGuide
# - Amazon Virtual Private Cloud Network Administrator Guide:
# http://docs.amazonwebservices.com/AmazonVPC/latest/NetworkAdminGuide

Untitled

Mar 4, 2025AustinLeath

0 likes • 2 views

{
"bindAddress": "",
"bindPort": 2001,
"publicAddress": "",
"publicPort": 2001,
"a2s": {
"address": "172.16.1.80",
"port": 17777
},
"rcon": {
"address": "172.16.1.80",
"port": 19999,
"password": "fobarma1234!",
"permission": "admin",
"blacklist": [],
"whitelist": []
},
"game": {
"name": "[NA1] FOB Arma | Hardcore Rostov Conflict | fobarma.com",
"password": "",
"passwordAdmin": "fobarma1234!",
"admins": [
"76561198054239558",
"76561198097176793",
"76561198968225358",
"76561198073098171"
],
"scenarioId": "{00AFE153F5925E71}Missions/RostovConflict.conf",
"maxPlayers": 128,
"visible": true,
"crossPlatform": true,
"gameProperties": {
"serverMaxViewDistance": 1600,
"serverMinGrassDistance": 100,
"networkViewDistance": 1500,
"disableThirdPerson": true,
"fastValidation": true,
"battlEye": true,
"VONDisableUI": false,
"VONDisableDirectSpeechUI": false,
"VONCanTransmitCrossFaction": false
},
"mods": [
{
"modId": "606B4278950F623C",
"name": "ROSTOV - SCENARIOS",
"version": "1.0.1"
},
{
"modId": "5E172C6CAD10FBFC",
"name": "ROSTOV OBLAST",
"version": "1.0.1"
},
{
"modId": "5AAAC70D754245DD",
"name": "Server Admin Tools",
"version": "1.0.62"
},
{
"modId": "595F2BF2F44836FB",
"name": "RHS - Status Quo",
"version": "0.10.4075"
},
{
"modId": "645468B7696B4959",
"name": "RHStoVanillaArsenals",
"version": "1.0.0"
},
{
"modId": "62E76AB6CC8DFD39",
"name": "RHS Extra Camo Pack",
"version": "1.0.8"
},
{
"modId": "5E389BB9F58B79A6",
"name": "SpaceCore",
"version": "1.2.38"
},
{
"modId": "5F2D346C916B6FCC",
"name": "BLEEDING FROM WHERE DAMNIT",
"version": "1.0.1"
},
{
"modId": "5F0289EB493E9977",
"name": "Team Balancer",
"version": "1.0.0"
},
{
"modId": "606B100247F5C709",
"name": "Bacon Loadout Editor",
"version": "1.2.26"
},
{
"modId": "5964E0B3BB7410CE",
"name": "Game Master Enhanced",
"version": "1.3.2"
},
{
"modId": "5994AD5A9F33BE57",
"name": "Game Master FX",
"version": "1.0.94"
},
{
"modId": "622B1027A8796320",
"name": "GMFX artillery expansion",
"version": "1.0.3"
},
{
"modId": "5F2944B7474F043F",
"name": "Disable Game Master Budgets",
"version": "1.0.1"
},
{
"modId": "5C73156675E11A0F",
"name": "GM Persistent Loadouts",
"version": "1.0.18"
},
{
"modId": "613D4634CBB276B2",
"name": "Disable Arma Vision",
"version": "2.0.0"
},
{
"modId": "62E0B4EB51FCE050",
"name": "Keep Map Markers on Disconnect",
"version": "0.1.0"
},
{
"name": "Player Map Markers",
"version": "1.1.2",
"modId": "5E92F5A4A1B75A75"
},
{
"modId": "5965550F24A0C152",
"name": "Where Am I",
"version": "1.1.0"
},
{
"modId": "6088A3044B7ECBFD",
"name": "Keep Gun When Uncon",
"version": "1.0.1"
},
{
"modId": "62FCEB51DF8527B6",
"name": "Improved Blood Effect",
"version": "1.2.10"
},
{
"name": "Bacon Suppressors",
"version": "1.2.7",
"modId": "5AB301290317994A"
},
{
"name": "RIS Laser Attachments",
"version": "1.0.79",
"modId": "5ABD0CB57F7E9EB1"
},
{
"modId": "60EF191B900214C5",
"name": "Single Slot for primary weapon",
"version": "1.0.1"
},
{
"modId": "60DCBC196B6C9667",
"name": "More Damage",
"version": "1.0.3"
},
{
"modId": "6445046A364DE86D",
"name": "War Tapes 3.0 Everon Clashes",
"version": "1.0.1"
},
{
"modId": "614627BACB991914",
"name": "Prefab Optimizations - Core",
"version": "0.3.1"
},
{
"modId": "611773E9DBCA20AC",
"name": "Prefab Optimizations",
"version": "1.0.1"
},
{
"modId": "6148E5A6D60AA2BA",
"name": "Prefab Optimizations - Glass",
"version": "0.2.6"
},
{
"modId": "5D071A427403AB2C",
"name": "Chat Message Roles",
"version": "1.0.11"
},
{
"modId": "61B503ED3E717226",
"name": "SpawnLoadout_NoArsenal",
"version": "0.1.0"
},
{
"modId": "61AAD18DFE866001",
"name": "Supply Truck Radio",
"version": "1.0.3"
},
{
"modId": "5C9758250C8C56F1",
"name": "Bon Action Animations",
"version": "0.0.36"
},
{
"modId": "64674443E6874E2F",
"name": "SH sound config",
"version": "1.0.7"
},
{
"name": "Change Teams",
"version": "1.0.1",
"modId": "5E2B79A65B0B6362"
},
{
"modId": "646E249764095363",
"name": "T.A.O RHS COMPATIBILITY",
"version": "1.0.1"
},
{
"modId": "61ECB5EFAA346151",
"name": "TacticalAnimationOverhaul TEST",
"version": "2.0.57"
},
{
"modId": "62B0CDBBC9E0D43B",
"name": "Fog of War",
"version": "1.0.0"
},
{
"modId": "613B4DD4A91CA144",
"name": "LM SUPPRESSION",
"version": "1.2.2"
},
{
"modId": "5B0D1E4380971EBD",
"name": "COALITION Squad Interface",
"version": "1.6.13"
},
{
"modId": "5F0913BAAC69ABF5",
"name": "Garbage Collector Patch",
"version": "1.1.2"
},
{
"modId": "620A15433CA8D688",
"name": "WeakerWalls",
"version": "1.0.0"
},
{
"modId": "62113AA293414DB9",
"name": "Bandage Patch",
"version": "1.0.4"
},
{
"modId": "64715AAA95B1297B",
"name": "Enhanced Ammo",
"version": "1.0.2"
},
{
"modId": "60C4CE4888FF4621",
"name": "ACE Core",
"version": "1.2.1"
},
{
"modId": "60C4C12DAE90727B",
"name": "ACE Medical",
"version": "1.2.0"
},
{
"modId": "611CB1D409001EB0",
"name": "ACE Magazine Repack",
"version": "1.2.0"
},
{
"modId": "5DBD560C5148E1DA",
"name": "ACE Carrying",
"version": "1.2.0"
},
{
"modId": "6214CEA5DA92BFF3",
"name": "ACE Medical Prototypes",
"version": "0.1.10"
},
{
"modId": "64677CE8B68C9599",
"name": "ACE Medical Quick Slots",
"version": "0.0.10"
},
{
"modId": "60C53A9372ED3964",
"name": "ACE Compass",
"version": "1.2.0"
},
{
"modId": "648B595F6C72B4CB",
"name": "WCS_Settings",
"version": "1.0.11"
},
{
"modId": "631C3C1AEE9C90BC",
"name": "WCS_Sounds",
"version": "1.0.15"
},
{
"modId": "613A878AD341C163",
"name": "WCS Script Optimizations",
"version": "2.0.36"
},
{
"modId": "63294BA2D9F0339B",
"name": "WCS_ZU-23-2",
"version": "1.0.0"
},
{
"modId": "61C74A8B647617DA",
"name": "WCS_Attachments",
"version": "1.0.12"
},
{
"modId": "615806DC6C57AF02",
"name": "WCS_NATO",
"version": "1.0.39"
},
{
"modId": "62A668F513428630",
"name": "WCS_Scopes",
"version": "1.0.6"
},
{
"modId": "61BA4EB5C886D396",
"name": "WCS_VehicleLock",
"version": "1.0.11"
},
{
"modId": "629B2BA37EFFD577",
"name": "WCS_Armament",
"version": "1.0.80"
},
{
"modId": "64610AFB74AA9842",
"name": "WCS_Core",
"version": "1.0.1"
},
{
"modId": "614D1A3874A23AD9",
"name": "WCS_Interface",
"version": "1.0.21"
},
{
"modId": "628933A0D3A0D700",
"name": "WCS_Mi-24V",
"version": "1.0.43"
},
{
"modId": "615818DA7C0343FD",
"name": "WCS_RU",
"version": "2.0.16"
},
{
"modId": "612F512CD4CB21D5",
"name": "WCS_Earplugs",
"version": "1.0.9"
},
{
"modId": "62CCD69DD17E4F2F",
"name": "AKI CORE",
"version": "1.0.3"
},
{
"modId": "5B383D4CB27E0D54",
"name": "BMP-3 IFV",
"version": "1.0.36"
},
{
"modId": "5D0551624969C92E",
"name": "Zeliks Character",
"version": "1.1.14"
},
{
"modId": "6273146ADFE8241D",
"name": "AH6M",
"version": "1.1.14"
},
{
"modId": "628F720BC527C143",
"name": "RAYZIs OPTICS",
"version": "1.1.10"
},
{
"modId": "6319242B050D1483",
"name": "NSW-D WEAPON PACK",
"version": "1.0.17"
},
{
"modId": "5CF0C3158AB2337E",
"name": "TASK FORCE MATTOCK UNIFORMS",
"version": "1.0.4"
},
{
"modId": "63132835C7B48A57",
"name": "STRIKEWORKS RU SMALL ARMS PACK",
"version": "1.0.43"
},
{
"modId": "618C2492CC62D0D5",
"name": "Gs BTR-90",
"version": "3.0.3"
},
{
"modId": "62DED82740D3DDDB",
"name": "Custom Attachments Slots",
"version": "1.0.1"
},
{
"modId": "62BE25F97D19ED65",
"name": "Mines Remixed",
"version": "0.9.4"
},
{
"modId": "63326E0476294082",
"name": "Body Color Tape",
"version": "0.0.29"
},
{
"modId": "621D3771875C1D3D",
"name": "Car Radio 4 All",
"version": "1.0.2"
},
{
"modId": "5E0AB16BEB16D6A4",
"name": "T-72 Main Battle Tank",
"version": "1.2.10"
},
{
"modId": "60A84677938AF7D8",
"name": "Better Supply Trucks",
"version": "1.0.2"
},
{
"modId": "5E524E4FEECCA92B",
"name": "BMP-1 IFV",
"version": "1.0.16"
},
{
"modId": "5D1880C4AD410C14",
"name": "M1 Abrams",
"version": "2.0.16"
},
{
"modId": "63120AE07E6C0966",
"name": "M2 Bradley Fighting Vehicle",
"version": "1.0.22"
},
{
"name": "ArmaTerrainCore",
"version": "1.1.0",
"modId": "60B524F7A5AE96A8"
},
{
"modId": "60ED3CC6E7E40221",
"name": "Sikorsky MH60 DAP Project",
"version": "0.6.28"
},
{
"modId": "62D15D0025AE021B",
"name": "ZSU-23-4 Shilka",
"version": "1.0.6"
},
{
"modId": "6447378A6C7CB747",
"name": "PKP-B",
"version": "0.0.38"
},
{
"modId": "60620915CACA0ED1",
"name": "MCX LT_ MCX LVAW _ .300BLK",
"version": "1.0.11"
}
]
},
"operating": {
"lobbyPlayerSynchronise": true,
"joinQueue": {
"maxSize": 50
}
}
}

Untitled

Feb 25, 2025AustinLeath

0 likes • 8 views

NOTES
101 B
113 C
107 A C
312 D
324 C
207 A C D
407 C D E
201 C D
213 B
104 D
119 A
313 B
223 C
210 A D
204 A B D
219 A B D
103 C
109 C
112 C
115 A B D E
118 B
118 B
121 B
203 A C D E
206 C
209 A
212 C
215 D
218 ?
221 A B C
225 B, OR A
302 C D
303 C
305 A,B
308 C
311 A B
314 B,D OR B,C
317 C
320 B
322 B
403 C
404 A
406 A C D E
409 C
217 NOT B 172.16.0.0/16 172.17.0.0/16 192.168.50.0/24 192.168.55.0/24 10.9.0.0/16
319 NOT B The traffic selectors do not include the source address.
202 C There is no route for a VPC peering (pcx-xxx) and only a local route in rtb-xxxxxx854
105 C Yes, AWS VPN-2 tunnels will come UP and EC2 can reach only a subset of the 120 unique prefixes.
117 A Peer A will delete the outgoing SA, while processing the Delete request from Peer B
222 B 2 DX PEs are launched and 1 Distinguished Endpoint.
408 C (((m1+m2)/60)*8)/1000000
214 B All of the time
304 MAYBE ONE OF C E - The customer has an ACL not allowing inbound traffic. / The customer has entered the wrong CGW address.
108 NOT A IKE Fragmentation will fragment both IKE_SA_INIT and IKE_AUTH message.
102 NOT C Sends Informational Message encrypted with the IKE SA, Informing the Peer to DELETE active Child SAs.
316 A The TS does not include the source address.
405 A Getafix had a single failed healthcheck to the PE.

Post Statistics

Posts

No Posts Found

It looks like AustinLeath has no public posts

Likes

Please Log In

You must be authenticated to view a user's likes

Shared

Please Log In

You must be authenticated to view a user's shared posts

Profile Privacy

Multi-Factor Authentication

Multi-Factor Authentication (MFA) is an authentication method that requires you to provide two or more verification factors to gain access to your account. In addition to username and password, MFA requires you to verify your email on every login, which decreases the likelihood of someone stealing your account.

Change Password

Forgot Password?

Identity Color

Changes the color of your profile icon and cursor highlight in the live code editor. You and other users will be able to view this change.

Delete Account

Deleting your account is permanent. All data associated with your account will be lost.