Date: Tue, 22 Mar 2005 13:49:36 +0100 From: peter@bgnett.no (Peter N. M. Hansteen) To: "Eugene M. Minkovskii" <emin@mccme.ru> Cc: freebsd-questions@freebsd.org Subject: Re: OpenBSD's pf and traffic Message-ID: <86d5tr6e1r.fsf@amidala.datadok.no> In-Reply-To: <20050322124220.GB3137@mccme.ru> (Eugene M. Minkovskii's message of "Tue, 22 Mar 2005 15:42:20 %2B0300") References: <20050320093159.GA3213@mccme.ru> <861xaamf9t.fsf@amidala.datadok.no> <20050321071227.GA29429@mccme.ru> <86eke9fn7o.fsf@amidala.datadok.no> <20050322120451.GA3137@mccme.ru> <86hdj36fho.fsf@amidala.datadok.no> <20050322124220.GB3137@mccme.ru>
next in thread | previous in thread | raw e-mail | index | archive | help
"Eugene M. Minkovskii" <emin@mccme.ru> writes: > Just a moment, does it mean that your last rule allow any > incoming connections from world to clients if thay matched by > client2_inports, ANY, not only connections opened by clients? That rule would let new connections from anywhere pass on the allowed ports to the clients. This might be useful mainly if your firewall is between the world and one or more servers, though. > Moreover, I read in documentation, that state table reads BEFORE > rules, and connections that opened by clients in first rule: > > pass out on $ext_if from $client1 to any proto tcp $allowed_out \ > label client2 keep state > > whill not marked by label client2-in because thay don't pass to > this rule. Am I right? In a word, yes. The 'keep state' in these examples, would AFAIK mean that the counters would keep track of all traffic for a connection, so traffic initiated from the inside would match the pass out rule's counters, while connections opened from the outside would count on the pass in rules. -- Peter N. M. Hansteen, member of the first RFC 1149 implementation team http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/ "First, we kill all the spammers" The Usenet Bard, "Twice-forwarded tales"
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?86d5tr6e1r.fsf>