Okay, I did that but apparently I spoke too soon as a tcpdump reveals packets are still being blocked. Here is an example from a tcpdump on the pflog0 interface:
Apr 11 14:57:43.943764 rule 1/(match) block in on tun0: 172.16.254.2 > 10.40.60.1: icmp: echo request (gre encap) I guess I need to specifically allow GRE traffic? Thanks, Matt On 04/11/11 23:34, Matt S wrote: > Hello Everyone: > > I am using 4.8 RELEASE. Given the following pf.conf, would anyone be able to > tell me why gre0 is not being skipped? > > set skip on lo > set skip on gre0 > set skip on enc0 You need to combine them, or they override each other. set skip on { lo0, gre0, enc0 } /Alexander > > anchor "ftp-proxy/*" > > block in all > pass out all > > antispoof for tun0 > table <bruteforce> persist > table <trustednets> {10.40.60.0/24, 10.40.65.0/24} > > match out on tun0 from 10.40.60.0/24 to any nat-to (tun0) > > > block log quick from <bruteforce> > pass in quick proto tcp to port ftp rdr-to 127.0.0.1 port 8021 > pass in quick proto tcp from localhost to any port {http,https} rdr-to >127.0.0.1 > > port 3128 > pass inet proto icmp all icmp-type {echoreq, unreach} > pass in on tun0 inet proto tcp from any to any port ssh keep state >(max-src-conn > > 6, max-src-conn-rate 3/1, overload <bruteforce> flush global) rdr-to 10.40.60.1 > pass on em0 from {trustednets} to any > > > In order for in-bound packets from 10.40.65.1 not to be dropped, I have to > ping > > it 10.40.64.1 from 10.40.60.1 to set a state. Any help that you can provide > would be appreciated. > > Thanks, > Matt