From owner-freebsd-hackers Mon Jan 6 13:39:23 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.4/8.8.4) id NAA01062 for hackers-outgoing; Mon, 6 Jan 1997 13:39:23 -0800 (PST) Received: from cold.org (cold.org [206.81.134.103]) by freefall.freebsd.org (8.8.4/8.8.4) with ESMTP id NAA01037; Mon, 6 Jan 1997 13:39:17 -0800 (PST) Received: from localhost (brandon@localhost) by cold.org (8.8.3/8.8.3) with SMTP id OAA23722; Mon, 6 Jan 1997 14:39:20 -0700 (MST) Date: Mon, 6 Jan 1997 14:39:20 -0700 (MST) From: Brandon Gillespie To: security@freebsd.org, hackers@freebsd.org Subject: FreeBSD as a cleanwall Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-hackers@freebsd.org X-Loop: FreeBSD.org Precedence: bulk Does anybody have a configuration for packet filtering through a FreeBSD router to run a cleanwall? Basically to keep all addresses of a specific IP set (say a class C) on the right sides. I.e. only set addresses of that set leave the network and don't allow any addresses of that set onto the network? I'm mulling through the docs now, but figured to look here for any possible pointers, as this seems like it would be a common enough operation.. -Brandon Gillespie