>'Lo.

>On 2016-06-26T02:32:04 +0000
>James Lodge <ja...@lodge.me.uk> wrote:
>
> If you clone lo1, give it a 192.168.x.x/32 IP and then use the following 
> pf.conf
> Do you need to bridge the interfaces? You may need to add 
> gateway_enable="YES" to rc.conf
>
> Not sure if that's what you're trying to do?
>
> James
>
>
> IP_PUB="Your Public IP Address Here"
> IP_JAIL="192.168.0.2"
> NET_JAIL="192.168.0.0/24"
> PORT_JAIL="{80,443,2020}"
>
> scrub in all
> nat pass on em0 from $NET_JAIL to any -> $IP_PUB
> rdr pass on em0 proto tcp from any to $IP_PUB port $PORT_WWW -> $IP_JAIL

>Interesting!

>Writing the filtering rules as "nat pass" statements does at least
>allow basic outbound filtering, as specifying a rule along with the nat
>statement allows you to talk about individual specific jails.

>Thanks, I will try using this if vnet jails don't work out.

>M
>_______________________________________________
f>reebsd-...@freebsd.org mailing list
>https://lists.freebsd.org/mailman/listinfo/freebsd-net
>To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"


I'm doing something every similar to you in a Digital Ocean droplet with a 
single public IP., though I don't filter outbound. I reverse proxy HTTP(s) via 
nginx with SNI support mostly. It works very well for me, I just wish (though I 
know its being look at and possible coming soon) I had ZFS.
_______________________________________________
freebsd-net@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"

Reply via email to