Hi list,

I use ftp-proxy on my firewall as a reverse proxy for a host on the dmz. The
incoming connections come in on one of the the external interfaces, which is
not the default gateway of the firewall. Therefore I use reply-to statements
on the pass in rules to make sure the answer packets are leaving the
firewall via this interface. The packets are redirected to the locally
running ftp-proxy. The control connection works fine for passive and active
ftp, but the data connection leaves the network on the wrong external
interface, following the default route, ignoring the reply-to statement when
they come in.
I doubt that I have a chance to get it running without exchanging the
default route to the interface where the packets are coming in, because the
ftp-proxy terminates the data connections on behalf of the client and
server, and iirc the reply-to/route-to statements are not working for local
connections.

Just another small question, I had tcpdump running on localhost and thought 
I would see the packets which are redirected to the ftp-proxy, but nothing 
showed up there, does pf make some short cuts with these redirected packets?
Do I can filter these packets on the localhost interface, also if they do 
not show up there?

kind regards
Sebastian

Reply via email to