In an attempt to use relayd as an outbound http "proxy", which is just needed to do URL filtering rather then content caching, I'm finding that the outbound connections are being sourced from the IP of the external interface of the firewall rather then the carp interface that the pf NAT rules are using for other traffic.
For example if the following IP scheme is used/pf rules are in place: ext_if="1.1.1.1" carp_if="1.1.1.2" int_if="172.31.1.1" match out on $ext_if inet from $int_if:network to any nat-to 1.1.1.2 label "NAT [OUT] - Desktop" pass in log quick on $int_if proto tcp from $int_if:network to any port http divert-to 127.0.0.1 port 8080 /etc/relayd.conf: http protocol httpfilter { return error label "URL filtered!" request url filter "www.example.com/" } relay httpproxy { listen on 127.0.0.1 port 8080 forward to destination } When the divert line in /etc/pf.conf is commented out then the traffic on the WAN/external interface is sourced from 1.1.1.2, however when the traffic is diverted to relayd then the traffic is sourced from 1.1.1.1. Ideally I'd like the traffic to source from the typical NAT interface, as when the carp interface is failed over to the peer firewall those sessions in the state table are preserved. With squid I found that this can be accomplished by using the tcp_outgoing_address attribute to force the traffic to be sourced from a given address. Any help/advice would be appreciated. Regards, Matt