Hi.

on Mon, 5 Aug 2024 12:34:18 +0200
Marko Cupać <marko.cu...@mimar.rs> wrote: 

> Having only one network interface, I assume this firewall protects
> machine it resides on (a server), not network behind it (a router /
> firewall), which rules out the need for net.inet.ip.forwarding sysctl.

I see.

A lot of the material out there includes talk of nat/napt and
I don't think there was any mention of how to protect one host.
I will take into account what you taught me in the email you sent me and try to 
re-configure it.


> My general rule of the thumb is to log all blocked packets, at least
> until I get functionality I want. I have busy firewalls which block and
> log ~300 packets per second, pf handles it really well.
> 
> Try something like:
> 
> (temporarily remove `antispoof quick` until rest works, keep it above)
> block log all
> pass in  on vio0 (what you want to pass to the server)
> pass out on vio0 (what you want the server to be able to reach)
> 
> Check with `pfctl -(vv)sr` if loaded ruleset corresponds to what you
> intend.
> 
> Check `tcpdump -neqtttr /var/log/pflog` for history of blocked packets
> and `tcpdump -neqttti pflog0` for real-time log.

We will reply to you with the results,
together with replies to other users.
Thank you very much.

Best regards,

---
WATANABE, Takeo
t...@kasaneiro.jp

Reply via email to