TheSG wrote:

I have been struggling with this issue for a few days now. I have a Citrix server (customer site) that I cannot connect to through my OpenBSD 3.7 pf firewall. I am able to reach this Citrix server if I go direct (no firewall). I know the Citrix server is open to everyone on the Internet. However, something is happening when my Windows client passes through the OpenBSD pf firewall - I do not receive any packets back from the Citrix server. I have tcpdump running on the outside and inside of the firewall and I see the match rules that allow out from the Inside interface then out the outside interface but I never see any traffic back from the Citrix server.

My rules are simple. I have actually done a pass in log all keep state & pass out log all keep state in my rules with nothing else (no block or pass) and it still fails. I see the traffic go through the pf box but never see anything from the Citrix server.

I do know this Citrix server is being firewalled by a Check Point NG firewall. I do not believe they are running any IDS or anything else that would block my connection attempts.

Has anyone got this to work? If so, what does the rule(s) look like? Thanks.





copy of my rules (didn't include in previous message):
ext_if="xl0"
int_if="fxp0"
lan_net = "192.168.11.0/24"
nattwo = "192.168.11.50"
citrix = "xxx.xxxx.xxx.xxx"


#set block-policy return
set loginterface $ext_if

scrub in log

nat on $ext_if from !($ext_if) -> ($ext_if:0)
rdr pass on $int_if proto tcp to port ftp -> 127.0.0.1 port 8021
# rdr on $ext_if proto udp from any to any port 1604 -> $nattwo


block all
block in log all
#pass in log all keep state
#pass out log all keep state

pass in quick log on { lo $int_if }

pass in log on $ext_if proto tcp to ($ext_if) port ssh keep state
pass in log on $ext_if proto udp to ($ext_if) port 1494
pass out log on $int_if from any to $lan_net
pass out log on $ext_if proto tcp all modulate state flags S/SA
pass out log on $ext_if proto { udp, icmp } all keep state

Reply via email to