-- 
 James E. Housley                            PGP:   1024/03983B4D
 System Supply, Inc.                         2C 3F 3A 0D A8 D8 C3 13
 Pager: page...@notepage.com                 7C F0 B5 BF 27 8B 92 FE 

"The box said 'Requires Windows 95, NT, or better,' so I installed
FreeBSD"
--- Begin Message ---
konstantinos.dryllera...@dg21.cec.be wrote:
> 
> Dear all,
> 
> 
> It seems to me that outgoing packets through the outer interface should first 
> be run (somehow) through the firewall and if succesfull pass through natd 
> (without a further re-injection to the firewall ruleset) whereas incoming 
> packets should pass first from natd and then pass through the firewall rules 
> (the existing operation). [ It is clear that only "deny" rules can be added 
> before the "divert" rule to control the outgoing packets of internal machines 
> and this can prove very tricky and tedious ].
> 
Lets assume the out0 it the interface to the internet and in0 is you
internal interface.  And that 192.168.0.x is your internal network.  If
that is true you should be able to do:

allow all from 192.168.0.0/24 to 192.168.0.0/24 # allow all internal to 
                                                # talk to each other
allow tcp from 192.169.0.0/24 to any 25  # Every has mail
allow udp from 192.168.0.0/25 to any 53  # DNS lookup
allow all from boss to any               # boss has full reign
deny tcp from secretary to any 80        # no web for secretary
divert 8668 ip from any to any via out0
deny tcp from any to any 137-139 in via out0 # Block netbios
deny udp from any to any 53 in via out0      # Allow DNS in
.....

the other program to look at is ipfilter.

-- 
 James E. Housley                            PGP:   1024/03983B4D
 System Supply, Inc.                         2C 3F 3A 0D A8 D8 C3 13
 Pager: page...@notepage.com                 7C F0 B5 BF 27 8B 92 FE 

"The box said 'Requires Windows 95, NT, or better,' so I installed
FreeBSD"

--- End Message ---

Reply via email to