From owner-freebsd-pf@FreeBSD.ORG Tue Oct 6 13:30:45 2009 Return-Path: Delivered-To: freebsd-pf@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 4EED91065676 for ; Tue, 6 Oct 2009 13:30:45 +0000 (UTC) (envelope-from nico@elico-it.be) Received: from zimbra-mx1.xenco.net (zimbra-mx1.xenco.net [79.132.229.23]) by mx1.freebsd.org (Postfix) with ESMTP id 082AB8FC08 for ; Tue, 6 Oct 2009 13:30:44 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by zimbra-mx1.xenco.net (Postfix) with ESMTP id F13F34784BD for ; Tue, 6 Oct 2009 15:14:58 +0200 (CEST) X-Virus-Scanned: amavisd-new at xenco.net Received: from zimbra-mx1.xenco.net ([127.0.0.1]) by localhost (zimbra-mx1.xenco.net [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sSzKMDHWQqFf for ; Tue, 6 Oct 2009 15:14:54 +0200 (CEST) Received: from zimbra-store.xenco.net (unknown [172.28.70.27]) by zimbra-mx1.xenco.net (Postfix) with ESMTP id E0A6A4783F7 for ; Tue, 6 Oct 2009 15:14:53 +0200 (CEST) Date: Tue, 6 Oct 2009 15:14:53 +0200 (CEST) From: Nico De Dobbeleer To: freebsd-pf@freebsd.org Message-ID: <6422287.58441254834893591.JavaMail.root@zimbra-store> In-Reply-To: <20091006120027.160901065786@hub.freebsd.org> MIME-Version: 1.0 X-Originating-IP: [195.13.1.169] X-Mailer: Zimbra 6.0.0_GA_1802.DEBIAN5 (ZimbraWebClient - [unknown] (Linux)/6.0.0_GA_1802.DEBIAN5) Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-Content-Filtered-By: Mailman/MimeDel 2.1.5 Subject: Re: freebsd-pf Stealth Modus X-BeenThere: freebsd-pf@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Technical discussion and general questions about packet filter \(pf\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 06 Oct 2009 13:30:45 -0000 Hello, I just finished installing FreeBSD 7.x with pf in transparant bridging mode as the servers behind the firewall need to have an public ipaddress. Now is everything working fine and the FW is doing his job as it should be. When I nmap the FW I see the open ports and closed ports. Is there a way the get the FW running in stealth mode so that isn't possible anymore with nmap or any other scanning tool to see the open or closed ports? When I look around I hear roomers that there's something like blackhole that can be added in the sysctl. Anyone an idea? Kind regards, Nico