-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Senhores, após configurar o pfsense para fazer NAT (apenas outbound)
este , o NAT, funciona. Porém somente em alguns sites.

As regras em anexo.

Entretanto, não acesso o site dos clientes, tão pouco a partir do
próprio servidor.

Alguns exemplos não acessados:

www.uol.com.br
www.yahoo.com.br
gdk.thegamecreators.com

Entre outros.

Alguma luz?

Obrigado

P.S.: Tentando essas regras, o problema persiste.

nat on re0 from any to any -> (re0)
pass quick on re0 all keep state
pass quick on xl0 all keep state

falow
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkoS95gACgkQ35zeJy7JhCgr7wCeLWyX0/qlZAqSL1ddo+D9Xd2v
OtEAn2xG4C4qPXCL36vaf1BLz7Vlsudy
=y043
-----END PGP SIGNATURE-----

   1.
      # pfctl -sa                                                               
                       
   2.
      TRANSLATION RULES:                                                        
                        
   3.
      nat-anchor "pftpx/*" all                                                  
                        
   4.
      nat-anchor "natearly/*" all                                               
                       
   5.
      nat-anchor "natrules/*" all                                               
                       
   6.
      nat on re0 inet from 192.168.0.0/26 port = isakmp to any port = isakmp -> 
(re0) port 500 round-robin
   7.
      nat on re0 inet from 192.168.0.0/26 port = 5060 to any port = 5060 -> 
(re0) port 5060 round-robin  
   8.
      nat on re0 inet from 192.168.0.0/26 to any -> (re0) port 1024:65535 
round-robin                    
   9.
      nat on re0 inet from 10.0.0.0/24 port = isakmp to any port = isakmp -> 
(re0) port 500 round-robin  
  10.
      nat on re0 inet from 10.0.0.0/24 port = 5060 to any port = 5060 -> (re0) 
port 5060 round-robin      
  11.
      nat on re0 inet from 10.0.0.0/24 to any -> (re0) port 1024:65535 
round-robin                        
  12.
      rdr-anchor "pftpx/*" all                                                  
                          
  13.
      rdr-anchor "slb" all                                                      
                          
  14.
      rdr-anchor "imspector" all                                                
                          
  15.
      rdr-anchor "miniupnpd" all
  16.
       
  17.
      FILTER RULES:
  18.
      scrub all random-id fragment reassemble
  19.
      anchor "ftpsesame/*" all              
  20.
      anchor "firewallrules" all            
  21.
      block drop quick proto tcp from any port = 0 to any
  22.
      block drop quick proto tcp from any to any port = 0
  23.
      block drop quick proto udp from any port = 0 to any
  24.
      block drop quick proto udp from any to any port = 0
  25.
      block drop quick from <snort2c> to any label "Block snort2c hosts"
  26.
      block drop quick from any to <snort2c> label "Block snort2c hosts"
  27.
      block drop in quick inet6 all                                    
  28.
      block drop out quick inet6 all                                    
  29.
      anchor "loopback" all                                            
  30.
      pass in quick on lo0 all flags S/SA keep state label "pass loopback"
  31.
      pass out quick on lo0 all flags S/SA keep state label "pass loopback"
  32.
      anchor "packageearly" all                                            
  33.
      anchor "carp" all                                                    
  34.
      pass quick inet proto icmp from 200.XXX.XXX.XXX to any keep state    
  35.
      anchor "dhcpserverlan" all                                          
  36.
      pass in quick on rl0 inet proto udp from any port = bootpc to 
255.255.255.255 port = bootps keep state label "allow access to DHCP server on 
LAN"
  37.
      pass in quick on rl0 inet proto udp from any port = bootpc to 192.168.0.1 
port = bootps keep state label "allow access to DHCP server on LAN"    
  38.
      pass out quick on rl0 inet proto udp from 192.168.0.1 port = bootps to 
any port = bootpc keep state label "allow access to DHCP server on LAN"  
  39.
      anchor "dhcpserverWIFI" all                                               
                                                                       
  40.
      pass in quick on xl0 inet proto udp from any port = bootpc to 
255.255.255.255 port = bootps keep state label "allow access to DHCP server"    
  
  41.
      pass in quick on xl0 inet proto udp from any port = bootpc to 10.0.0.1 
port = bootps keep state label "allow access to DHCP server"              
  42.
      pass out quick on xl0 inet proto udp from 10.0.0.1 port = bootps to any 
port = bootpc keep state label "allow access to DHCP server"            
  43.
      block drop in log quick on re0 inet proto udp from any port = bootps to 
192.168.0.0/26 port = bootpc label "block dhcp client out wan"          
  44.
      block drop in on ! rl0 inet from 192.168.0.0/26 to any                    
                                                                      
  45.
      block drop in inet from 192.168.0.1 to any                                
                                                                      
  46.
      block drop in on ! xl0 inet from 10.0.0.0/24 to any                       
                                                                       
  47.
      block drop in inet from 10.0.0.1 to any                                   
                                                                       
  48.
      block drop in on rl0 inet6 from fe80::2e0:7dff:fe90:b96f to any           
                                                                       
  49.
      block drop in on xl0 inet6 from fe80::210:4bff:fe09:ff78 to any           
                                                                       
  50.
      anchor "spoofing" all                                                     
                                                                       
  51.
      anchor "spoofing" all                                                     
                                                                       
  52.
      block drop in on ! re0 inet from 128.0.0.0/1 to any                       
                                                                       
  53.
      block drop in inet from 200.XXX.XXX.XXX to any                            
                                                                      
  54.
      block drop in on re0 inet6 from fe80::208:54ff:fe2d:28e to any            
                                                                      
  55.
      block drop in log quick on re0 inet from 10.0.0.0/8 to any label "block 
private networks from wan block 10/8"                                    
  56.
      block drop in log quick on re0 inet from 127.0.0.0/8 to any label "block 
private networks from wan block 127/8"                                  
  57.
      block drop in log quick on re0 inet from 172.16.0.0/12 to any label 
"block private networks from wan block 172.16/12"                            
  58.
      block drop in log quick on re0 inet from 192.168.0.0/16 to any label 
"block private networks from wan block 192.168/16"                          
  59.
      anchor "limitingesr" all                                                  
                                                                      
  60.
      block drop in quick from <virusprot> to any label "virusprot overload 
table"                                                                    
  61.
      anchor "wanbogons" all
  62.
      block drop in log quick on re0 from <bogons> to any label "block bogon 
networks from wan"                                                        
  63.
      pass out quick on rl0 proto icmp all keep state label "let out anything 
from firewall host itself"                                              
  64.
      pass out quick on re0 proto icmp all keep state label "let out anything 
from firewall host itself"                                              
  65.
      pass out quick on re0 all flags S/SA keep state (tcp.closed 5) label "let 
out anything from firewall host itself"                                
  66.
      anchor "firewallout" all                                                  
                                                                      
  67.
      pass out quick on re0 all flags S/SA keep state label "let out anything 
from firewall host itself"                                              
  68.
      pass out quick on rl0 all flags S/SA keep state label "let out anything 
from firewall host itself"                                              
  69.
      pass out quick on xl0 all flags S/SA keep state label "let out anything 
from firewall host itself"                                              
  70.
      pass out quick on enc0 all flags S/SA keep state label "IPSEC internal 
host to host"                                                            
  71.
      pass out quick on xl0 proto icmp all keep state (tcp.closed 5) label "let 
out anything from firewall host itself"                                
  72.
      pass out quick on xl0 all flags S/SA keep state (tcp.closed 5) label "let 
out anything from firewall host itself"                                
  73.
      anchor "anti-lockout" all                                                 
                                                                       
  74.
      pass in quick on rl0 inet from any to 192.168.0.1 flags S/SA keep state 
label "anti-lockout web rule"                                            
  75.
      block drop in log quick proto tcp from <sshlockout> to any port = ssh 
label "sshlockout"                                                        
  76.
      anchor "ftpproxy" all                                                     
                                                                       
  77.
      anchor "pftpx/*" all                                                      
                                                                      
  78.
      pass in quick on re0 reply-to (re0 200.XXX.XXX.XXX) inet proto tcp from 
200.XXX.XXX.XXX to 200.XXX.XXX.XXX port = 8181 flags S/SA keep state label 
"USER_RULE: webgui from sakurazuka"                                             
                                                                                
                 
  79.
      pass in quick on re0 reply-to (re0 200.XXX.XXX.XXX) inet proto udp from 
200.XXX.XXX.XXX to 200.XXX.XXX.XXX port = 8181 keep state label "USER_RULE: 
webgui from sakurazuka"                                                         
                                                                                
               
  80.
      pass in log quick on re0 reply-to (re0 200.XXX.XXX.XXX) inet proto tcp 
from 200.XXX.XXX.XXX to 200.XXX.XXX.XXX port = ssh flags S/SA keep state 
label "USER_RULE: ssh from sakurazuka"                                          
                                                                                
                    
  81.
      pass in log quick on re0 reply-to (re0 200.XXX.XXX.XXX) inet proto udp 
from 200.XXX.XXX.XXX to 200.XXX.XXX.XXX port = ssh keep state label 
"USER_RULE: ssh from sakurazuka"                                                
                                                                                
                        
  82.
      pass in log quick on xl0 inet from 10.0.0.0/24 to any flags S/SA keep 
state label "USER_RULE"                                                         
           
  83.
      pass in quick on rl0 inet from 192.168.0.0/26 to any flags S/SA keep 
state label "USER_RULE: Default LAN -> any"                                     
             
  84.
      pass in quick on rl0 inet proto tcp from any to 127.0.0.1 port = 
ftp-proxy flags S/SA keep state label "FTP PROXY: Allow traffic to localhost"   
                 
  85.
      pass in quick on rl0 inet proto tcp from any to 127.0.0.1 port = ftp 
flags S/SA keep state label "FTP PROXY: Allow traffic to localhost"             
             
  86.
      pass in quick on re0 inet proto tcp from any port = ftp-data to (re0) 
port > 49000 flags S/SA keep state label "FTP PROXY: PASV mode data 
connection"            
  87.
      pass in quick on xl0 inet proto tcp from any to 127.0.0.1 port = 8022 
flags S/SA keep state label "FTP PROXY: Allow traffic to localhost"             
           
  88.
      pass in quick on xl0 inet proto tcp from any to 127.0.0.1 port = ftp 
flags S/SA keep state label "FTP PROXY: Allow traffic to localhost"             
             
  89.
      anchor "imspector" all                                                    
                                                                                
        
  90.
      anchor "miniupnpd" all                                                    
                                                                                
        
  91.
      block drop in log quick all label "Default deny rule"                     
                                                                                
       
  92.
      block drop out log quick all label "Default deny rule"                    
                                                                                
        
  93.
      No queue in use
-------------------------
Histórico: http://www.fug.com.br/historico/html/freebsd/
Sair da lista: https://www.fug.com.br/mailman/listinfo/freebsd

Responder a