On Mon, 19 Mar 2018 16:11:05 -0700 (PDT)
"Rodney W. Grimes" <freebsd-...@pdx.rh.cn85.dnsmgr.net> wrote:

> Are you running with "firewall_type="simple""?
> If so it is set to block all 224/4 packets, see this part
> of /etc/rc.firewall:
>         # And stop draft-manning-dsua-03.txt (1 May 2000) nets
> (includes RESERVED-1, # DHCP auto-configuration, NET-TEST, MULTICAST
> (class D), and class E) # on the outside interface
>         ${fwcmd} table ${BAD_ADDR_TBL} add 0.0.0.0/8
>         ${fwcmd} table ${BAD_ADDR_TBL} add 169.254.0.0/16
>         ${fwcmd} table ${BAD_ADDR_TBL} add 192.0.2.0/24
>         ${fwcmd} table ${BAD_ADDR_TBL} add 224.0.0.0/4
>         ${fwcmd} table ${BAD_ADDR_TBL} add 240.0.0.0/4
> 
>       ${fwcmd} add deny all from any to "table($BAD_ADDR_TBL)" via
> ${oif}
> 
> Your route effected this as your packets are no longer trying to
> use an all interfaces path, but a specific interface, and that is
> probably not ${oif} of your firewall.
> 

One more fw tip: pf by default drops all IP packets with options, so IGMP does 
not work.
_______________________________________________
freebsd-net@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"

Reply via email to