Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 6 Aug 2005 04:01:39 +0200
From:      Max Laier <max@love2party.net>
To:        freebsd-pf@freebsd.org
Cc:        Michael Dexter <dexter@ambidexter.com>
Subject:   Re: Can rdr rules include flags?
Message-ID:  <200508060401.45433.max@love2party.net>
In-Reply-To: <a06230952bf18c2585759@[192.168.1.102]>
References:  <a06230952bf18c2585759@[192.168.1.102]>

next in thread | previous in thread | raw e-mail | index | archive | help
--nextPart1516606.NgJdkeq6XQ
Content-Type: text/plain;
  charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline

Michael,

On Friday 05 August 2005 09:25, Michael Dexter wrote:
> This a general PF question but I am using it in the FreeBSD environment.
>
> I am using an rdr rule to forward http traffic to a jail.
>
> rdr pass on $ext_if inet proto tcp from any to $ext_if port 8080 ->
> $www_ad port 80
>
>  From what I can tell, an accompanying "pass" entry such as the
> following is not needed and is perhaps ignored.

yes, unless you remove the pass option from the rdr-rule.

> pass in on $ext_if inet proto tcp from any to $ext_if port 80 flags
> S/SA \ modulate state
>
> Is there any way to apply flags to rdr traffic to limit protocols or port=
s?

Just like that.  Don't apply the pass option on the rdr-rule and use statef=
ul=20
pass/block rules to further limit down the redirection.

=2D-=20
/"\  Best regards,                      | mlaier@freebsd.org
\ /  Max Laier                          | ICQ #67774661
 X   http://pf4freebsd.love2party.net/  | mlaier@EFnet
/ \  ASCII Ribbon Campaign              | Against HTML Mail and News

--nextPart1516606.NgJdkeq6XQ
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (FreeBSD)

iD8DBQBC9BoJXyyEoT62BG0RAu/lAJ9zW+mXTcfFPOnwOTyuLIzYlxHnBQCeMpGQ
QpD2f7LuQP9xjQjPoE8v4mg=
=WXsD
-----END PGP SIGNATURE-----

--nextPart1516606.NgJdkeq6XQ--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200508060401.45433.max>