----- Original Message ----- 
From: "John" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Thursday, February 05, 2004 2:45 PM
Subject: IPFW and NAT - blocking RFC 1918 ("unregistered") network
thatmatches my own


> I am up and running with ipfw 2 and natd, but not all is quite well.
>
> I can't figure out how to block "spoofed" packets from the outside
> that use the same RFC 1918 network as the one I'm translating to.
> When I try to put that rule on the exterior interface, it ends up
> blocking the packets after they are translated.
>
> Specifically, the network I am using falls in the 192.168.0.0/16 range.
> (I won't publish exactly which one: you only have 254 to try...)
> If, however, I put in
>     ${fwcmd} add deny ip from any to 192.168.0.0/16 via ${oif}
> then I cut off my interior network entirely, due, presumably, to
> the pass through the rules after translation.
>
> I suspect that I need some combination of "in" or "recv," but I
> would like to actually UNDERSTAND what I'm doing instead of just
> trying combinations 'til it works.  On the other hand, there are
> sysctl kernel parameters that might affect this behavior, or maybe
> other natd parameters - so maybe that's not even the ticket.

Your best resource is /etc/rc.firewall.  Look at the "simple" configuration.
It has rules for RFC1918 nets both before and after the divert rule, and
explains why.

--
Matt Emmerton

_______________________________________________
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to