From owner-freebsd-net@freebsd.org Sat May 19 17:26:38 2018 Return-Path: Delivered-To: freebsd-net@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id EE0C3EDB4DC for ; Sat, 19 May 2018 17:26:37 +0000 (UTC) (envelope-from ml@netfence.it) Received: from soth.netfence.it (net-2-44-121-52.cust.vodafonedsl.it [2.44.121.52]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "mailserver.netfence.it", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 56A8E7768C for ; Sat, 19 May 2018 17:26:36 +0000 (UTC) (envelope-from ml@netfence.it) Received: from alamar.ventu (alamar.local.netfence.it [10.1.2.18]) (authenticated bits=0) by soth.netfence.it (8.15.2/8.15.2) with ESMTPSA id w4JHQOsl077673 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Sat, 19 May 2018 19:26:31 +0200 (CEST) (envelope-from ml@netfence.it) X-Authentication-Warning: soth.netfence.it: Host alamar.local.netfence.it [10.1.2.18] claimed to be alamar.ventu Subject: Re: Proxy a TCP connection To: Eugene Grosbein , freebsd-net@freebsd.org References: <2346bc5f-1ca3-3b6a-ac1a-c496e94eb969@netfence.it> <5AFF7970.2090206@grosbein.net> From: Andrea Venturoli Message-ID: <5a063bba-4d41-40eb-ee50-76849baaed3d@netfence.it> Date: Sat, 19 May 2018 19:26:23 +0200 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: <5AFF7970.2090206@grosbein.net> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.26 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 19 May 2018 17:26:38 -0000 On 05/19/18 03:10, Eugene Grosbein wrote: > You don't need any additional software at all. > Just instruct FreeBSD kernel to do what you need, it will do that just fine. Thanks. In fact I've used ipfw nat in the past, but I'd rather use a userland daemon: doing things at rule level makes it more easy to screw everything up and lock myself out. > Additional advantage of this approach is that > internal hosts will see real public IP address of connecting external host > instead of your own. This is exactly what I don't want, as, unfortunately, we have some devices which will refuse connections unless they come from their own subnet. bye & Thanks av.