I have a 3.5 firewall acting as a gateway for 2 networks (DMZ and internal lan) to a single internet provider. To alleviate bandwidth issues, I purchased a second internet connection from a different provider. I would like to route the DMZ through the first provider and the internal lan to the second provider.
I realize the 3.5 firewall is old, but I will upgrade this month. Reading the pf.conf man page, it seems like pf has the capability to do what I want, but I can't figure out how to make it work. Internal lan nat/filter lines from pf.conf: -------------------- block log all nat on $ShawIF from $IntIF:network to any -> ($ShawIF) pass in on $IntIF route-to ($ShawIF $ShawGW) from $IntIF:network to any keep state pass out on $ShawIF proto tcp all modulate state flags S/SA label shaw_tcp_out pass out on $ShawIF proto { udp, icmp } all keep state label shaw_udp_icmp_out -------------------- Using these rules, when I try to ping from the internal lan to the internet, I see the packets (using tcpdump) at the internal lan interface, but I don't see them cross any other interface and I don't see them in the pflog as blocked. Where are the packets going? I also tried the connection pooling example in the pf user guide to route traffic from the internal lan to both internet connections. When pf chose to route traffic out the first internet connection, pings worked, but when pf chose the second internet connection, the ping did not work, and they symptoms I saw were similar to those described above. Can anyone help me understand how to make this work? Cam