Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 25 May 2006 11:50:52 -0300
From:      Gilberto Villani Brito <linux@giboia.org>
To:        gus <gus@clacso.edu.ar>, freebsd-pf@freebsd.org
Subject:   Re: pf configuration de Argentina
Message-ID:  <20060525115052.092990aa@giboia>
In-Reply-To: <4474CE3D.8050702@clacso.edu.ar>
References:  <44723D2C.30801@clacso.edu.ar> <200605230224.27758.max@love2party.net> <44735A60.70709@clacso.edu.ar> <20060523162001.58be6ebe@giboia> <4474CE3D.8050702@clacso.edu.ar>

next in thread | previous in thread | raw e-mail | index | archive | help
Hi,
I tested your rules and it worked correctly.
Maybe you need put:
...
 block all
 pass out on $int_if from any to <lan>
 pass in on $int_if <lan> any to any
 pass out on $ext_if from any to any
 pass in on $ext_if from any to any
 pass in on $int_if from $uext1 to any queue uext1_in
...
All in this order.

PS: Let see the champion.

Abra=E7os
Gilberto


On Wed, 24 May 2006 18:21:01 -0300
gus <gus@clacso.edu.ar> wrote:

> Gilberto Villani Brito wrote:
>=20
> >Gus,
> >I already had this doubt.
> >Try use:
> >pass in on $int_if from $uext1 to any queue uext1_in
> >
> >PS: This cup is owned by Brazil.
> >
> Gilberto
>=20
> Sorry for the win of world cup...(Argentina)
>=20
> but now the problem is  pf....
> I had change the line but , when triet of connect my machine=20
> 168.96.200.196 ...to 6K....
> These not see these band , and so access to 100 K....
>=20
> Any idea!!!!
>=20
> Abracos
> Gus
>=20
> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
>=20
> ext_if=3D"xl0"    # replace with actual external interface name i.e., dc0
> int_if=3D"xl1"    # replace with actual internal interface name i.e., dc1
> internal_net=3D"168.96.200.0/24"
> #external_addr=3D"168.96.200.1"
>=20
> #Tables: similar to macros, but more flexible for many addresses.
> #table <foo> { 10.0.0.0/8, !10.1.0.0/16, 192.168.0.0/24, 192.168.1.18 }
>=20
> # Options: tune the behavior of pf, default values are given.
> #set timeout { interval 10, frag 30 }
> #set timeout { tcp.first 120, tcp.opening 30, tcp.established 86400 }
> #set timeout { tcp.closing 900, tcp.finwait 45, tcp.closed 90 }
> #set timeout { udp.first 60, udp.single 30, udp.multiple 60 }
> #set timeout { icmp.first 20, icmp.error 10 }
> #set timeout { other.first 60, other.single 30, other.multiple 60 }
> #set timeout { adaptive.start 0, adaptive.end 0 }
> #set limit { states 10000, frags 5000 }
> #set loginterface none
> #set optimization normal
> #set block-policy drop
> #set require-order yes
> #set fingerprints "/etc/pf.os"
>=20
> # Normalization: reassemble fragments and resolve or reduce traffic=20
> ambiguities.
> #scrub in all
>=20
> # Queueing: rule-based bandwidth control.
> #altq on $ext_if bandwidth 2Mb cbq queue { dflt, developers, marketing }
> #queue dflt bandwidth 5% cbq(default)
> #queue developers bandwidth 80%
> #queue marketing  bandwidth 15%
>=20
> table <lan> { 168.96.200.87, 168.96.200.8, 168.96.200.55, 168.96.200.196 }
>=20
> set loginterface $int_if
> set fingerprints "/etc/pf.os"
>=20
> altq on $int_if bandwidth 100Mb cbq queue { dflt_in, uext1_in }
> altq on $ext_if bandwidth 600Kb cbq queue { dflt_out }
>=20
> queue dflt_in cbq (default) bandwidth 60%
> queue dflt_out cbq (default)
>=20
> queue uext1_in bandwidth 6Kb
>=20
> uext1=3D"168.96.200.196"
>=20
> nat on $ext_if from <lan> to any -> ($ext_if)
>=20
> pass in on $int_if from $uext1 to any queue uext1_in
>=20
> # Translation: specify how addresses are to be mapped or redirected.
> # nat: packets going out through $ext_if with source address=20
> $internal_net will
> # get translated as coming from the address of $ext_if, a state is=20
> created for
> # such packets, and incoming packets will be redirected to the internal=20
> address.
> #nat on $ext_if from $internal_net to any -> ($ext_if)
>=20
> # rdr: packets coming in on $ext_if with destination $external_addr:1234=
=20
> will
> # be redirected to 10.1.1.1:5678. A state is created for such packets, and
> # outgoing packets will be translated as coming from the external address.
> #rdr on $ext_if proto tcp from any to $external_addr/32 port 1234 ->=20
> 10.1.1.1 port 5678
>=20
> # rdr outgoing FTP requests to the ftp-proxy
> #rdr on $int_if proto tcp from any to any port ftp -> 127.0.0.1 port 8021
>=20
> # spamd-setup puts addresses to be redirected into table <spamd>.
> #table <spamd> persist
> #no rdr on { lo0, lo1 } from any to any
> #rdr inet proto tcp from <spamd> to any port smtp -> 127.0.0.1 port 8025
>=20
> # Filtering: the implicit first two rules are
> #pass in all
> #pass out all
>=20
> # block all incoming packets but allow ssh, pass all outgoing tcp and udp
> # connections and keep state, logging blocked packets.
> #block in log all
> #pass  in  on $ext_if proto tcp from any to $ext_if port 22 keep state
> #pass  out on $ext_if proto { tcp, udp } all keep state
>=20
> # pass incoming packets destined to the addresses given in table <foo>.
> #pass in on $ext_if proto { tcp, udp } from any to <foo> port 80 keep sta=
te
>=20
> # pass incoming ports for ftp-proxy
> #pass in on $ext_if inet proto tcp from any to $ext_if user proxy keep st=
ate
>=20
> # assign packets to a queue.
> #pass out on $ext_if from 192.168.0.0/24 to any keep state queue develope=
rs
> #pass out on $ext_if from 192.168.1.0/24 to any keep state queue marketing
>=20
>=20



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20060525115052.092990aa>