Old Situation
      to internet
  ^
  |
  |
 ADSL Router/Modem(Bridged)
     | 
  V
    ip ext from isp
 BSD router with pf+NAT
    ip 192.168.0.1
  ^
  |
  |
  V
    ip 192.168.0.4
      client PC

New Situation:
      to internet
  ^
  |
  |
    ip ext from isp
 Davolink DV-201AMR (NAT)----->to VOIP telephone
    ip 192.168.1.1
  ^
  |
  | (DMZ 192.168.1.7)
  V
    ip 192.168.1.7
 BSD router with pf
    ip 192.168.0.1
  ^
  |
  |
  V
    ip 192.168.0.4
      client PC

The prefered settings for NAT on the would be like mentioned with a 
DeMilitartized Zone to just let BSD take care
of the secrurity issues. 

It is not possible to set the router to a bridged-setting because:
-first the web-interface doesnot allow this and I found no way to telnet into 
the router for different settings
-second I don't think this will work in combination with the VOIP (the Davolink 
should have the extern ip from the isp)

Further more I have a packet filter installed on the BSD machine, the following 
rule set used to work in the old situation:

 # /etc/pf.conf

 # Macros
 EXT_IF="rl0"
 INT_IF="rl1"
 LOCAL_IF="lo0"
 LAN="192.168.0.0/24"
 NO_ROUTE=" { 127.0.0.0/8, 192.168.0.0/16, 172.16.0.0/12, 10.0.0.0/8 } "

 # Options
 set optimization normal
 set block-policy drop
 set require-order yes

 # Traffic Normalization
 scrub in all

 # Translation

 # General rdr to a port
 #rdr on $EXT_IF inet proto tcp from any to $EXT_IF port $RDR_PORT -> $DEST_IP 
port $DEST_PORT

 # Network Adress Translation
 nat on $EXT_IF inet from $LAN to any -> $EXT_IF

 # Packet Filtering
 block in log all
 block out log all

 antispoof log quick for $LOCAL_IF inet
 pass in on $LOCAL_IF inet all keep state
 pass out on $LOCAL_IF inet all keep state

 antispoof log quick for $INT_IF inet
 pass in on $INT_IF inet all keep state
 pass out on $INT_IF inet all keep state

 antispoof log quick for $EXT_IF inet
 block in log quick on $EXT_IF inet from $NO_ROUTE to $EXT_IF
 block return-rst in log quick on $EXT_IF inet proto tcp from any to $EXT_IF 
port 113
 pass in on $EXT_IF inet proto icmp from any to $EXT_IF icmp-type 8 code 0 keep 
state
 pass in on $EXT_IF inet proto tcp from any to $EXT_IF port 22 flags S/SA 
modulate state
 pass in on $EXT_IF inet proto tcp from any to $EXT_IF port 80 flags S/SA 
modulate state
 pass in on $EXT_IF inet proto tcp from any to $EXT_IF port 25 flags S/SA 
modulate state
 pass in on $EXT_IF inet proto tcp from any to $EXT_IF port 443 flags S/SA 
modulate state

 block out log quick on $EXT_IF inet from $EXT_IF to $NO_ROUTE
 pass out on $EXT_IF inet from $EXT_IF to any keep state

Now I think there is probably a problem in the NO_ROUTE statements because the 
NO_ROUTE 192.168.0.0/16 section
includes the address range 192.168.1.0/24 but since the DMZ forwards all the 
incoming trafic to 192.168.1.7
and if I make a statment allowing incoming trafic from 192.168.1.1 because i 
don't know if this in combination with
the DMZ just by-passes my packetfilter. From the dump beneat I get the 
impression that the DMZ just forwards all trafic
to 192.168.1.7 without NAT (192.168.1.1) but I am not sure.

The strangest things happen at the moment:
-I can connect to the internet from my client PC with a browser but MSN cannot 
make a connection
-I can recieve and send mail from the mail-server on the BSD machine but with a 
subject only no text

To get an impression of what happens here is a dump from the incomming traffic 
on the BSD machine 

  pfTop: Up State 1-5/5, View: default, Order: none, Cache: 10000               
                         09:47:17

  PR   DIR SRC                  DEST                         STATE              
  AGE       EXP     PKTS    BYTES
  tcp  In  192.168.0.4:1374     192.168.0.1:22      ESTABLISHED:ESTABLISHED  
00:09:33  23:59:55     1141   102486
  tcp  In  192.168.0.4:1375     65.54.239.80:1863    FIN_WAIT_2:FIN_WAIT_2   
00:00:25  00:01:06       13      934
  tcp  In  192.168.0.4:1376     207.46.2.124:1863   ESTABLISHED:ESTABLISHED  
00:00:24  23:59:37       10      932
  tcp  In  192.168.0.4:1377     65.54.183.192:443   ESTABLISHED:ESTABLISHED  
00:00:23  23:59:52       16     8903
  tcp  Out 192.168.0.4:1375     65.54.239.80:1863    FIN_WAIT_2:FIN_WAIT_2   
00:00:25  00:01:06       13      934
  tcp  Out 192.168.0.4:1376     207.46.2.124:1863   ESTABLISHED:ESTABLISHED  
00:00:24  23:59:37       10      932
  tcp  Out 192.168.0.4:1377     65.54.183.192:443    STABLISHED:ESTABLISHED  
00:00:23  23:59:52       16     8903
  udp  In  192.168.0.4:1063     192.168.0.1:53         MULTIPLE:MULTIPLE     
00:00:25  00:00:37        4      711
  udp  Out 192.168.1.7:11789    62.4.69.96:53          MULTIPLE:SINGLE       
00:00:25  00:00:05        2      160
  udp  Out 192.168.1.7:11789    65.55.238.126:53       MULTIPLE:SINGLE       
00:00:23  00:00:07        2      201
  udp  Out 192.168.1.7:11789    65.54.240.126:53       MULTIPLE:SINGLE       
00:00:25  00:00:05        2      196
  udp  Out 192.168.1.7:11789    212.187.162.134:53     MULTIPLE:SINGLE       
00:00:23  00:00:07        2      392
  udp  Out 192.168.1.7:11789    213.199.144.151:53     MULTIPLE:SINGLE       
00:00:23  00:00:07       12      972

(ps don't know how the mailinglist works so reply to [EMAIL PROTECTED] please)
_______________________________________________
freebsd-pf@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-pf
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to