On 10-Jul-00 Doug White wrote:
> On Sun, 9 Jul 2000, Colin wrote:
> 
>>      The man page recommends putting the divert rule as close to the
>>      beginning
>> of the rule set as possible, and the default rule sets seem consistent
>> with this.  I noticed, though, that if I didn't put the rule "deny ip from
>> 192.168.0.0/24 to any in recv ed1" before the divert rule nothing from my
>> internal network (which just happens to be 192.168.0.0/24) would get
>> through. I
>> assume the prevent-spoofing rules for private networks rules would have the
>> sam
> 
> This rule would block traffic destined for your own network -- you
> antispoofed yourself!  :)  It *MUST* be before translation takes place,
> and also make sure ed1 is the external interface.
> 
> The 'log' option and 'ipfw show' are handy for firewall debugging.
> 
     I found this rule was the problem using ipfw show (a very useful command
when you're building a ruleset to see what is blocking you) which is why I
moved it.  My concern is that it shouldn't block packets from an external
source (eg www.FreeBSD.org ;) to 192.168.0.0/24.  It should only block packets
from that network incoming on the external interface.  I understood natd would
alter the dest addr on the inbound packet if it was in the table but not touch
the source addr.  Is this not the case?  Or am I missing something obvious in
the operation?

Cheers,
Colin



> Doug White                    |  FreeBSD: The Power to Serve
> [EMAIL PROTECTED]     |  www.FreeBSD.org
> 
> 
> 
> To Unsubscribe: send mail to [EMAIL PROTECTED]
> with "unsubscribe freebsd-stable" in the body of the message


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-stable" in the body of the message

Reply via email to