From owner-freebsd-questions Sun Oct 13 0: 4:39 2002 Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id EA56437B401 for ; Sun, 13 Oct 2002 00:04:35 -0700 (PDT) Received: from csts1.csts.org (12-229-161-203.client.attbi.com [12.229.161.203]) by mx1.FreeBSD.org (Postfix) with SMTP id 3150A43E7B for ; Sun, 13 Oct 2002 00:04:35 -0700 (PDT) (envelope-from calvins@csts.org) Received: (qmail 21540 invoked from network); 13 Oct 2002 07:07:58 -0000 Received: from unknown (HELO ces) (192.168.1.151) by 0 with SMTP; 13 Oct 2002 07:07:58 -0000 Message-ID: <000d01c27286$e4e82b40$9701a8c0@home> From: "Calvin Smith" To: Subject: ipnat and Netmeeting Date: Sun, 13 Oct 2002 00:05:20 -0700 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2600.0000 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000 Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG I realize that this question has been hashed over in the past, but in checking the archives and all the information I could find on the h323 proxy, I get the impression that it should now work. 1st, has anyone been able to make this work with FreeBSD 4.6. and 2nd if that is the case can anyone tell me what I am doing wrong. I am able to establish a netmeeting session, but as in most of the past messages in the archives, I can not hear the other party even though they can hear me. I also tried the "openh323proxy" with the same results. Following is my setup. FreeBSD 4.6-RELEASE ipf: IP Filter: v3.4.27 (336) Kernel: IP Filter: v3.4.27 Running: yes Log Flags: 0 = none set Default: block all, Logging: available Active list: 0 Network setup= LAN with 8 PC's 1 FreeBSD running dansguardian, squid and qmail. 1 FreeBSD gateway/firewall. gateway/firewall internal ip 192.168.1.1 proxy/dansguardian ip 192.168.1.10 IP Nat rules: (external ip have been changed to x.x.x.x) rdr xl0 x.x.x.x/32 port 25 -> 192.168.1.10 port 25 rdr xl0 x.x.x.x/32 port 22 -> 192.168.1.10 port 22 map xl0 192.168.1.0/24 -> 0/32 proxy port 1720 h323/tcp map xl0 192.168.1.0/24 -> 0/32 proxy port 21 ftp/tcp map xl0 192.168.1.0/24 -> 0/32 portmap tcp/udp 20000:40000 map xl0 192.168.1.0/24 -> 0/32 IP filter rules # # xl0 = WAN # de0 = LAN # # ############################ # Generic to all interfaces ############################# # block in log quick all with opt lsrr block in log quick all with opt ssrr block in log quick all with ipopts block in log quick proto tcp all with short block in log quick proto icmp all with frag ######################## # Outside Interface ######################## #---------------------- # Allow out all TCP, UDP, and ICMP traffic and keep state on it # so that it's allowed back in. #---------------------- pass out quick on xl0 proto tcp from any to any flags S keep state pass out quick on xl0 proto udp from any to any keep state pass out quick on xl0 proto icmp from any to any keep state block out log quick on xl0 all #----------------------- # Allow bootp traffic in from my ISP's DHCP server only. # and any other needed traffic #----------------------- pass in quick on xl0 proto udp from x.x.x.x/32 to any port = 68 keep state pass in quick on xl0 proto tcp from any to 192.168.1.10 port = 25 flags S keep state keep frags pass in quick on xl0 proto tcp from any to 192.168.1.10 port = 22 flags S keep state keep frags #----------------------- # Block and log all remaining traffic coming into the firewall # - Block TCP with a RST # (to make it appear as if the service isn't listening) # - Block UDP with an ICMP Port Unreachable # (to make it appear as if the service ins't listening) # - Block all remaining traffic #------------------------ block return-rst in log quick on xl0 proto tcp from any to any block return-icmp-as-dest(port-unr) in log quick on xl0 proto udp from any to any block in log quick on xl0 all ############################# # Inside Interface ############################# #--------------------------- # Allow out all TCP, UDP, and ICMP traffic & keep state #--------------------------- pass out quick on de0 proto tcp from any to any keep state pass out quick on de0 proto udp from any to any keep state pass out quick on de0 proto icmp from any to any keep state pass out quick on de0 proto gre from any to any keep state block out log quick on de0 all #-------------------------- # Block in on LAN misc. #-------------------------- block in quick on de0 proto tcp from any to any port = 137 block in quick on de0 proto tcp from any to any port = 138 block in quick on de0 proto tcp from any to any port = 139 block in quick on de0 proto udp from any to any port = 137 block in quick on de0 proto udp from any to any port = 138 block in quick on de0 proto udp from any to any port = 139 block in quick on de0 proto tcp from any port = 137 to any block in quick on de0 proto tcp from any port = 138 to any block in quick on de0 proto tcp from any port = 139 to any block in quick on de0 proto udp from any port = 137 to any block in quick on de0 proto udp from any port = 138 to any block in quick on de0 proto udp from any port = 139 to any #-------------------------- # Allow in TCP, UDP, and ICMP traffic & keep state #-------------------------- pass in quick on de0 proto tcp from any to any port = 22 keep state pass in quick on de0 proto tcp from any to any port = 25 keep state pass in quick on de0 proto tcp from any to any port = 110 keep state pass in quick on de0 proto tcp from any to any port = 1863 flags S keep state keep frags pass in quick on de0 proto tcp from 192.168.1.10 to any keep state pass in quick on de0 proto tcp from 192.168.1.151 to any keep state #this is the pc I do netmeeting from pass in quick on de0 proto udp from any to any keep state pass in quick on de0 proto icmp from any to any keep state pass in quick on de0 proto gre from any to any keep state block in log quick on de0 all ############################## # Loopback Interface ############################## pass in quick on lo0 all pass out quick on lo0 all Thanks for any information Calvin Smith To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message