From owner-freebsd-questions@FreeBSD.ORG Thu Apr 21 12:20:12 2005 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id C47A016A4CF for ; Thu, 21 Apr 2005 12:20:12 +0000 (GMT) Received: from vs2.bgnett.no (vs02.bgnett.no [194.54.96.190]) by mx1.FreeBSD.org (Postfix) with ESMTP id 180D543D31 for ; Thu, 21 Apr 2005 12:20:12 +0000 (GMT) (envelope-from peter@bgnett.no) Received: from amidala.datadok.no.bgnett.no (amidala.datadok.no [194.54.103.98]) by vs2.bgnett.no (8.12.9p2/8.12.9) with ESMTP id j3LCK6Kf040953 for ; Thu, 21 Apr 2005 14:20:07 +0200 (CEST) (envelope-from peter@bgnett.no) To: freebsd-questions@freebsd.org References: <20050421094712.E50BE4BEAD@ws1-1.us4.outblaze.com> From: peter@bgnett.no (Peter N. M. Hansteen) Date: Thu, 21 Apr 2005 14:17:17 +0200 In-Reply-To: <20050421094712.E50BE4BEAD@ws1-1.us4.outblaze.com> (Fafa Diliha Romanova's message of "Thu, 21 Apr 2005 04:47:12 -0500") Message-ID: <86pswol3xu.fsf@amidala.datadok.no> User-Agent: Gnus/5.1006 (Gnus v5.10.6) XEmacs/21.4 (Jumbo Shrimp, berkeley-unix) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-bgnett.no-virusscanner: Found to be clean X-Envelope-To: freebsd-questions@freebsd.org Subject: Re: PF: Blocks my workstation on boot X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 21 Apr 2005 12:20:12 -0000 "Fafa Diliha Romanova" writes: > I have to write this command on my server after every reboot to allow > my workstation to access the Internet through it: Ok, so the server here is the gateway. > # pfctl -F a ; pfctl -Nf /etc/pf.conf ; pfctl -sr and you essentially turn off everything except the NAT rules. I think the problem is that your rule set does not have any rules that let packets from your local net (I assume $int_if:network) pass IN via the firewall's lan-facing network interface. I think a rule like pass in on $int_if from $int_if:network to any port $allowedports keep state or even pass from $int_if:network to any port $allowedports keep state (if you can do without the extra per interface housekeeping) would make things a bit easier. -- Peter N. M. Hansteen, member of the first RFC 1149 implementation team http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/ "First, we kill all the spammers" The Usenet Bard, "Twice-forwarded tales"