I've got a problem where I have a couple of OpenBSD firewalls 
running in a redundant configuration using carp, and have found 
that CentOS 5.5 (Linux) boxes running on a protected network, if
they have avahi-daemon running, will cause the OpenBSD kernels to lock
up hard.  This is very reproducable.

While I can avoid the problem by not running avahi-daemon on the
Linux machines, I'd really prefer to find the source of the problem
on the OpenBSD side and fix it.  From my perspective, there is nothing
that a remote host should be able to do that should lock up a
an OpenBSD kernel. (And lest anyone be offended by my calling it a
problem on the OpenBSD side, I'm quite willing to believe that there
is bad ju-ju in my config and am not necessarily blaming OpenBSD per se.)

If anyone has suggestions on how I can proceed to diagnose the problem,
I would appreciate it.

Details follow.

======================================================================

Okay, the short version is that I noticed the problem weeks back that
whenever I booted or shut down a new CentOS 5.5 box, it would cause one
of the two redundant firewalls to lock up.  The firewalls are Soekris
net5501-70 machines, with the hardware watchdog enabled. So eventually
the watchdog would kick the firewall and it would come back.

Over a period of time I worked on elimination of various potential 
problem areas, such as doing memory checks, checking for bad power, 
power overloads, etc.  Without going into the details, I was able to
narrow it down to the point that the lockup was reproducable *every*
time avahi-daemon on the Linux box was started or stopped, *and* both
firewalls in the carp cluster were running.  If avahi-daemon is 
disabled or if the secondary firewall is shut down, there is no problem.

There is no kernel panic on the OpenBSD side; it just locks up hard.
There are no interesting diagnostics in either the OpenBSD or Linux
logs.  Running tcpdump shows that the avahi multicast traffic is the
last thing that occurs on the DMZ before the kernel locks up.

Most of the time, shutting down the CentOS host will kill the firewall
that is normally the backup, and starting up the CentOS host will kill
the firewall that is normally the primary, however I've seen the shutdown
kill the primary on occasion although I cannot definitively say that
the nominal primary was in fact the current master on the carp devices
on these occasions.

I have verified that this occurs with a bare-bones 64 bit CentOS
installation; although the original machine that triggered this is
a xen server, I've verified that it can happen with a non-xen server.

Interestingly, though, not all CentOS boxes will trigger this behavior;
there are CentOS 5.5 machines on both the DMZ and the internal network
that can be rebooted without affecting the firewall, and I've verified
that they also have avahi-daemon running.

I provide more details on the topology and environment below.

I *could* simplify my topology to see if that eliminates the problem,
but wanted to see if anyone has any ideas first in case a config change
causes the problem to go away without knowing why; I'd rather fix the
problem than avoid it.

I've attached various config files below, sanitized by running them
through perl (so the substitutions are at least self-consistent).  If someone
is willing to look at this in depth and needs the raw configs, contact me
directly.

Description of Environment
==========================

The topology is too ugly for ascii art, so I'll just describe it.  Both
soekris boxes use the following config:

    vr0:  switch to dmz
    vr1:  switch to upstream 1 demarc
    vr2:  switch to upstream 2 demarc
    vr3:  switch to guest network
    fxp0: switch to internal network

Until I get a two-port lan card, pfsync is occuring via vr0 (the dmz link).

All switches are consumer grade non-managed DLink DGS-1005G or DGS-1008G
10/100/1000 Mb switches.  I've tried other non-managed switches and the 
problem persists.

I have seen the problem with "clean install" CentOS 5.5 servers in
the DMZ, both 64 bit, with slightly different hardware.  One has a
Intel Pro/1000 NIC, the other uses an RTL8168b/8111b.  However, I also
have other CentOS 5.5 machines both in the DMZ and on the internal 
net which do *not* trigger the problem.  These others are mix of 32 and
64 bit machines.

Both upstreams use static IPs.  Upstream 1 has been in operation for
a few years with an older single-host non-Soekris OpenBSD firewall,
and everything including the DMZ used NAT (with RFC-1918 IPs).
With the introduction of upstream 2, the DMZ will be moved to routable
IPs.  Currently the DMZ is mixed, with most hosts being private IPs 
and one (not yet production) host having a routable address.  The CentOS
boxes that trigger the problem are both using routable addresses (I
don't know if that's relevant). The pf config is such that
traffic for the routable IPs will be via upstream 2 and traffic for the
NAT'd IPs will be via upstream 1.

The DMZ host and the firewalls are on separate UPSes (three in total).
The switches in question are distributed between the two firewall UPSes.

The firewalls are OpenBSD 4.7 (GENERIC) with patches 001 through 006
applied.

Temps on the Soekris boxes are warm but not hot.  The primary's are:

   hw.sensors.nsclpcsio0.temp0=87.00 degC (Remote)
   hw.sensors.nsclpcsio0.temp1=127.00 degC (Remote)
   hw.sensors.nsclpcsio0.temp2=69.00 degC (Local)

The backup's are:

   hw.sensors.nsclpcsio0.temp0=88.00 degC (Remote)
   hw.sensors.nsclpcsio0.temp1=127.00 degC (Remote)
   hw.sensors.nsclpcsio0.temp2=65.00 degC (Local)

primary /etc/hostname.vr0:
        inet alias CCC.CCC.CCC.2 255.255.255.0
        inet alias 192.168.FFF.2 255.255.255.0

primary /etc/hostname.vr1:
        inet BBB.BBB.BBB.FW1 255.255.255.248
        !/sbin/route -qn add -host -mpath default BBB.BBB.BBB.GW

primary /etc/hostname.vr2:
        up

primary /etc/hostname.vr3:
        inet 192.168.EEE.2 255.255.255.0

primary /etc/hostname.fxp0:
        inet 192.168.DDD.2 255.255.255.0

primary /etc/hostname.carp0:
        inet CCC.CCC.CCC.1 255.255.255.0 NONE vhid 1 pass PASSWORD1
        inet alias 192.168.FFF.1 255.255.255.0

primary /etc/hostname.carp1:
        inet BBB.BBB.BBB.CRP 255.255.255.248 NONE vhid 2 pass PASSWORD2

primary /etc/hostname.carp2:
        inet AAA.AAA.AAA.C1 255.255.252.0 NONE vhid 3 pass PASSWORD5 carpdev vr2
        inet alias AAA.AAA.AAA.C2 255.255.252.0
        !/sbin/route -qn add -host -mpath default AAA.AAA.AAA.GW

primary /etc/hostname.carp3:
        inet 192.168.EEE.1 255.255.255.0 NONE vhid 4 pass PASSWORD3

primary /etc/hostname.carp4:
        inet 192.168.DDD.1 255.255.255.0 NONE vhid 5 pass PASSWORD4

primary sysctl.conf (stripped of comments):
        net.inet.ip.forwarding=1
        net.inet6.ip6.forwarding=1
        net.inet.carp.preempt=1
        ddb.panic=0
        kern.watchdog.period=32
        kern.watchdog.auto=1

primary /etc/rc.conf.local:
        ntpd_flags=-s
        watchdogd_flags=
        ftpproxy_flags="-r -A -p 8022 -R 192.168.FFF.12"
        dhcpd_flags="-y CCC.CCC.CCC.2 -Y CCC.CCC.CCC.3 vr0 vr3 fxp0"
        spamd_flags="-v"
        spamd_black=YES
        named_flags=""

secondary /etc/hostname.vr0:
        inet alias CCC.CCC.CCC.3 255.255.255.0
        inet alias 192.168.FFF.3 255.255.255.0

secondary /etc/hostname.vr1:
        inet BBB.BBB.BBB.FW2 255.255.255.248
        !/sbin/route -qn add -host -mpath default BBB.BBB.BBB.GW

secondary /etc/hostname.vr2:
        up

secondary /etc/hostname.vr3:
        192.168.EEE.3 255.255.255.0

secondary /etc/hostname.fxp0:
        inet 192.168.DDD.3 255.255.255.0

secondary /etc/hostname.carp0:
        inet CCC.CCC.CCC.1 255.255.255.0 NONE vhid 1 pass PASSWORD1 advskew 100
        inet alias 192.168.FFF.1 255.255.255.0

secondary /etc/hostname.carp1:
        inet BBB.BBB.BBB.CRP 255.255.255.248 NONE vhid 2 pass PASSWORD2 advskew 
100

secondary /etc/hostname.carp2:
        inet AAA.AAA.AAA.C1 255.255.252.0 NONE vhid 3 pass PASSWORD5 advskew 
100 carpdev vr2
        inet alias AAA.AAA.AAA.C2 255.255.252.0
        !/sbin/route -qn add -host -mpath default AAA.AAA.AAA.GW

secondary /etc/hostname.carp3:
        inet 192.168.EEE.1 255.255.255.0 NONE vhid 4 pass PASSWORD3 advskew 100

secondary /etc/hostname.carp4:
        inet 192.168.DDD.1 255.255.255.0 NONE vhid 5 pass PASSWORD4 advskew 100

secondary sysctl.conf (stripped of comments):
        net.inet.ip.forwarding=1
        net.inet6.ip6.forwarding=1
        net.inet.carp.preempt=1
        ddb.panic=0
        kern.watchdog.period=32
        kern.watchdog.auto=1

secondary /etc/rc.conf.local:
        ntpd_flags=-s           # enabled during install
        watchdogd_flags=
        ftpproxy_flags="-r -A -p 8022 -R 192.168.FFF.12"
        dhcpd_flags="-y CCC.CCC.CCC.3 -Y CCC.CCC.CCC.2 vr0 vr3 fxp0"
        spamd_flags="-v"
        spamd_black=YES

/etc/pf.conf (primary and secondary) is at the end of the email

primary dmesg:

, rev. 3: OUI 0x004063, model 0x0034
vr1 at pci0 dev 7 function 0 "VIA VT6105M RhineIII" rev 0x96: irq 5, address 
00:00:24:cb:a8:cd
ukphy1 at vr1 phy 1: Generic IEEE 802.3u media interface, rev. 3: OUI 0x004063, 
model 0x0034
vr2 at pci0 dev 8 function 0 "VIA VT6105M RhineIII" rev 0x96: irq 9, address 
00:00:24:cb:a8:ce
ukphy2 at vr2 phy 1: Generic IEEE 802.3u media interface, rev. 3: OUI 0x004063, 
model 0x0034
vr3 at pci0 dev 9 function 0 "VIA VT6105M RhineIII" rev 0x96: irq 12, address 
00:00:24:cb:a8:cf
ukphy3 at vr3 phy 1: Generic IEEE 802.3u media interface, rev. 3: OUI 0x004063, 
model 0x0034
fxp0 at pci0 dev 14 function 0 "Intel 8255x" rev 0x10, i82551: irq 10, address 
00:07:e9:08:8c:ec
inphy0 at fxp0 phy 1: i82555 10/100 PHY, rev. 4
glxpcib0 at pci0 dev 20 function 0 "AMD CS5536 ISA" rev 0x03: rev 3, 32-bit 
3579545Hz timer, watchdog, gpio
gpio0 at glxpcib0: 32 pins
pciide0 at pci0 dev 20 function 2 "AMD CS5536 IDE" rev 0x01: DMA, channel 0 
wired to compatibility, channel 1 wired to compatibility
wd0 at pciide0 channel 0 drive 1: <Crucial CT32GBFAB0>
wd0: 1-sector PIO, LBA48, 31472MB, 64454656 sectors
wd0(pciide0:0:1): using PIO mode 4, Ultra-DMA mode 2
pciide0: channel 1 ignored (disabled)
ohci0 at pci0 dev 21 function 0 "AMD CS5536 USB" rev 0x02: irq 15, version 1.0, 
legacy support
ehci0 at pci0 dev 21 function 1 "AMD CS5536 USB" rev 0x02: irq 15
usb0 at ehci0: USB revision 2.0
uhub0 at usb0 "AMD EHCI root hub" rev 2.00/1.00 addr 1
isa0 at glxpcib0
isadma0 at isa0
com0 at isa0 port 0x3f8/8 irq 4: ns16550a, 16 byte fifo
com0: console
com1 at isa0 port 0x2f8/8 irq 3: ns16550a, 16 byte fifo
pckbc0 at isa0 port 0x60/5
pcppi0 at isa0 port 0x61
midi0 at pcppi0: <PC speaker>
spkr0 at pcppi0
nsclpcsio0 at isa0 port 0x2e/2: NSC PC87366 rev 9: GPIO VLM TMS
gpio1 at nsclpcsio0: 29 pins
npx0 at isa0 port 0xf0/16: reported by CPUID; using exception 16
usb1 at ohci0: USB revision 1.0
uhub1 at usb1 "AMD OHCI root hub" rev 1.00/1.00 addr 1
biomask e1c7 netmask ffe7 ttymask ffff
mtrr: K6-family MTRR support (2 registers)
vscsi0 at root
scsibus0 at vscsi0: 256 targets
softraid0 at root
root on wd0a swap on wd0b dump on wd0b
WARNING: / was not properly unmounted
carp0: state transition: BACKUP -> MASTER
carp1: state transition: BACKUP -> MASTER
carp2: state transition: BACKUP -> MASTER
carp3: state transition: BACKUP -> MASTER
carp4: state transition: BACKUP -> MASTER
OpenBSD 4.7 (GENERIC) #1: Thu Jul  8 21:36:29 MDT 2010
    r...@fw1.example.com:/usr/src/sys/arch/i386/compile/GENERIC
cpu0: Geode(TM) Integrated Processor by AMD PCS ("AuthenticAMD" 586-class) 500 
MHz
cpu0: FPU,DE,PSE,TSC,MSR,CX8,SEP,PGE,CMOV,CFLUSH,MMX
real mem  = 536440832 (511MB)
avail mem = 511062016 (487MB)
mainbus0 at root
bios0 at mainbus0: AT/286+ BIOS, date 20/70/03, BIOS32 rev. 0 @ 0xfac40
pcibios0 at bios0: rev 2.0 @ 0xf0000/0x10000
pcibios0: pcibios_get_intr_routing - function not supported
pcibios0: PCI IRQ Routing information unavailable.
pcibios0: PCI bus #0 is the last bus
bios0: ROM list: 0xc8000/0xa800
cpu0 at mainbus0: (uniprocessor)
amdmsr0 at mainbus0
pci0 at mainbus0 bus 0: configuration mode 1 (bios)
io address conflict 0x6100/0x100
io address conflict 0x6200/0x200
pchb0 at pci0 dev 1 function 0 "AMD Geode LX" rev 0x33
glxsb0 at pci0 dev 1 function 2 "AMD Geode LX Crypto" rev 0x00: RNG AES
vr0 at pci0 dev 6 function 0 "VIA VT6105M RhineIII" rev 0x96: irq 11, address 
00:00:24:cb:a8:cc
ukphy0 at vr0 phy 1: Generic IEEE 802.3u media interface, rev. 3: OUI 0x004063, 
model 0x0034
vr1 at pci0 dev 7 function 0 "VIA VT6105M RhineIII" rev 0x96: irq 5, address 
00:00:24:cb:a8:cd
ukphy1 at vr1 phy 1: Generic IEEE 802.3u media interface, rev. 3: OUI 0x004063, 
model 0x0034
vr2 at pci0 dev 8 function 0 "VIA VT6105M RhineIII" rev 0x96: irq 9, address 
00:00:24:cb:a8:ce
ukphy2 at vr2 phy 1: Generic IEEE 802.3u media interface, rev. 3: OUI 0x004063, 
model 0x0034
vr3 at pci0 dev 9 function 0 "VIA VT6105M RhineIII" rev 0x96: irq 12, address 
00:00:24:cb:a8:cf
ukphy3 at vr3 phy 1: Generic IEEE 802.3u media interface, rev. 3: OUI 0x004063, 
model 0x0034
fxp0 at pci0 dev 14 function 0 "Intel 8255x" rev 0x10, i82551: irq 10, address 
00:07:e9:08:8c:ec
inphy0 at fxp0 phy 1: i82555 10/100 PHY, rev. 4
glxpcib0 at pci0 dev 20 function 0 "AMD CS5536 ISA" rev 0x03: rev 3, 32-bit 
3579545Hz timer, watchdog, gpio
gpio0 at glxpcib0: 32 pins
pciide0 at pci0 dev 20 function 2 "AMD CS5536 IDE" rev 0x01: DMA, channel 0 
wired to compatibility, channel 1 wired to compatibility
wd0 at pciide0 channel 0 drive 1: <Crucial CT32GBFAB0>
wd0: 1-sector PIO, LBA48, 31472MB, 64454656 sectors
wd0(pciide0:0:1): using PIO mode 4, Ultra-DMA mode 2
pciide0: channel 1 ignored (disabled)
ohci0 at pci0 dev 21 function 0 "AMD CS5536 USB" rev 0x02: irq 15, version 1.0, 
legacy support
ehci0 at pci0 dev 21 function 1 "AMD CS5536 USB" rev 0x02: irq 15
usb0 at ehci0: USB revision 2.0
uhub0 at usb0 "AMD EHCI root hub" rev 2.00/1.00 addr 1
isa0 at glxpcib0
isadma0 at isa0
com0 at isa0 port 0x3f8/8 irq 4: ns16550a, 16 byte fifo
com0: console
com1 at isa0 port 0x2f8/8 irq 3: ns16550a, 16 byte fifo
pckbc0 at isa0 port 0x60/5
pcppi0 at isa0 port 0x61
midi0 at pcppi0: <PC speaker>
spkr0 at pcppi0
nsclpcsio0 at isa0 port 0x2e/2: NSC PC87366 rev 9: GPIO VLM TMS
gpio1 at nsclpcsio0: 29 pins
npx0 at isa0 port 0xf0/16: reported by CPUID; using exception 16
usb1 at ohci0: USB revision 1.0
uhub1 at usb1 "AMD OHCI root hub" rev 1.00/1.00 addr 1
biomask e1c7 netmask ffe7 ttymask ffff
mtrr: K6-family MTRR support (2 registers)
vscsi0 at root
scsibus0 at vscsi0: 256 targets
softraid0 at root
root on wd0a swap on wd0b dump on wd0b
WARNING: / was not properly unmounted
carp0: state transition: BACKUP -> MASTER
carp1: state transition: BACKUP -> MASTER
carp2: state transition: BACKUP -> MASTER
carp3: state transition: BACKUP -> MASTER
carp4: state transition: BACKUP -> MASTER
OpenBSD 4.7 (GENERIC) #1: Thu Jul  8 21:36:29 MDT 2010
    r...@fw1.example.com:/usr/src/sys/arch/i386/compile/GENERIC
cpu0: Geode(TM) Integrated Processor by AMD PCS ("AuthenticAMD" 586-class) 500 
MHz
cpu0: FPU,DE,PSE,TSC,MSR,CX8,SEP,PGE,CMOV,CFLUSH,MMX
real mem  = 536440832 (511MB)
avail mem = 511062016 (487MB)
mainbus0 at root
bios0 at mainbus0: AT/286+ BIOS, date 20/70/03, BIOS32 rev. 0 @ 0xfac40
pcibios0 at bios0: rev 2.0 @ 0xf0000/0x10000
pcibios0: pcibios_get_intr_routing - function not supported
pcibios0: PCI IRQ Routing information unavailable.
pcibios0: PCI bus #0 is the last bus
bios0: ROM list: 0xc8000/0xa800
cpu0 at mainbus0: (uniprocessor)
amdmsr0 at mainbus0
pci0 at mainbus0 bus 0: configuration mode 1 (bios)
io address conflict 0x6100/0x100
io address conflict 0x6200/0x200
pchb0 at pci0 dev 1 function 0 "AMD Geode LX" rev 0x33
glxsb0 at pci0 dev 1 function 2 "AMD Geode LX Crypto" rev 0x00: RNG AES
vr0 at pci0 dev 6 function 0 "VIA VT6105M RhineIII" rev 0x96: irq 11, address 
00:00:24:cb:a8:cc
ukphy0 at vr0 phy 1: Generic IEEE 802.3u media interface, rev. 3: OUI 0x004063, 
model 0x0034
vr1 at pci0 dev 7 function 0 "VIA VT6105M RhineIII" rev 0x96: irq 5, address 
00:00:24:cb:a8:cd
ukphy1 at vr1 phy 1: Generic IEEE 802.3u media interface, rev. 3: OUI 0x004063, 
model 0x0034
vr2 at pci0 dev 8 function 0 "VIA VT6105M RhineIII" rev 0x96: irq 9, address 
00:00:24:cb:a8:ce
ukphy2 at vr2 phy 1: Generic IEEE 802.3u media interface, rev. 3: OUI 0x004063, 
model 0x0034
vr3 at pci0 dev 9 function 0 "VIA VT6105M RhineIII" rev 0x96: irq 12, address 
00:00:24:cb:a8:cf
ukphy3 at vr3 phy 1: Generic IEEE 802.3u media interface, rev. 3: OUI 0x004063, 
model 0x0034
fxp0 at pci0 dev 14 function 0 "Intel 8255x" rev 0x10, i82551: irq 10, address 
00:07:e9:08:8c:ec
inphy0 at fxp0 phy 1: i82555 10/100 PHY, rev. 4
glxpcib0 at pci0 dev 20 function 0 "AMD CS5536 ISA" rev 0x03: rev 3, 32-bit 
3579545Hz timer, watchdog, gpio
gpio0 at glxpcib0: 32 pins
pciide0 at pci0 dev 20 function 2 "AMD CS5536 IDE" rev 0x01: DMA, channel 0 
wired to compatibility, channel 1 wired to compatibility
wd0 at pciide0 channel 0 drive 1: <Crucial CT32GBFAB0>
wd0: 1-sector PIO, LBA48, 31472MB, 64454656 sectors
wd0(pciide0:0:1): using PIO mode 4, Ultra-DMA mode 2
pciide0: channel 1 ignored (disabled)
ohci0 at pci0 dev 21 function 0 "AMD CS5536 USB" rev 0x02: irq 15, version 1.0, 
legacy support
ehci0 at pci0 dev 21 function 1 "AMD CS5536 USB" rev 0x02: irq 15
usb0 at ehci0: USB revision 2.0
uhub0 at usb0 "AMD EHCI root hub" rev 2.00/1.00 addr 1
isa0 at glxpcib0
isadma0 at isa0
com0 at isa0 port 0x3f8/8 irq 4: ns16550a, 16 byte fifo
com0: console
com1 at isa0 port 0x2f8/8 irq 3: ns16550a, 16 byte fifo
pckbc0 at isa0 port 0x60/5
pcppi0 at isa0 port 0x61
midi0 at pcppi0: <PC speaker>
spkr0 at pcppi0
nsclpcsio0 at isa0 port 0x2e/2: NSC PC87366 rev 9: GPIO VLM TMS
gpio1 at nsclpcsio0: 29 pins
npx0 at isa0 port 0xf0/16: reported by CPUID; using exception 16
usb1 at ohci0: USB revision 1.0
uhub1 at usb1 "AMD OHCI root hub" rev 1.00/1.00 addr 1
biomask e1c7 netmask ffe7 ttymask ffff
mtrr: K6-family MTRR support (2 registers)
vscsi0 at root
scsibus0 at vscsi0: 256 targets
softraid0 at root
root on wd0a swap on wd0b dump on wd0b
WARNING: / was not properly unmounted
carp0: state transition: BACKUP -> MASTER
carp1: state transition: BACKUP -> MASTER
carp2: state transition: BACKUP -> MASTER
carp3: state transition: BACKUP -> MASTER
carp4: state transition: BACKUP -> MASTER
OpenBSD 4.7 (GENERIC) #1: Thu Jul  8 21:36:29 MDT 2010
    r...@fw1.example.com:/usr/src/sys/arch/i386/compile/GENERIC
cpu0: Geode(TM) Integrated Processor by AMD PCS ("AuthenticAMD" 586-class) 500 
MHz
cpu0: FPU,DE,PSE,TSC,MSR,CX8,SEP,PGE,CMOV,CFLUSH,MMX
real mem  = 536440832 (511MB)
avail mem = 511062016 (487MB)
mainbus0 at root
bios0 at mainbus0: AT/286+ BIOS, date 20/70/03, BIOS32 rev. 0 @ 0xfac40
pcibios0 at bios0: rev 2.0 @ 0xf0000/0x10000
pcibios0: pcibios_get_intr_routing - function not supported
pcibios0: PCI IRQ Routing information unavailable.
pcibios0: PCI bus #0 is the last bus
bios0: ROM list: 0xc8000/0xa800
cpu0 at mainbus0: (uniprocessor)
amdmsr0 at mainbus0
pci0 at mainbus0 bus 0: configuration mode 1 (bios)
io address conflict 0x6100/0x100
io address conflict 0x6200/0x200
pchb0 at pci0 dev 1 function 0 "AMD Geode LX" rev 0x33
glxsb0 at pci0 dev 1 function 2 "AMD Geode LX Crypto" rev 0x00: RNG AES
vr0 at pci0 dev 6 function 0 "VIA VT6105M RhineIII" rev 0x96: irq 11, address 
00:00:24:cb:a8:cc
ukphy0 at vr0 phy 1: Generic IEEE 802.3u media interface, rev. 3: OUI 0x004063, 
model 0x0034
vr1 at pci0 dev 7 function 0 "VIA VT6105M RhineIII" rev 0x96: irq 5, address 
00:00:24:cb:a8:cd
ukphy1 at vr1 phy 1: Generic IEEE 802.3u media interface, rev. 3: OUI 0x004063, 
model 0x0034
vr2 at pci0 dev 8 function 0 "VIA VT6105M RhineIII" rev 0x96: irq 9, address 
00:00:24:cb:a8:ce
ukphy2 at vr2 phy 1: Generic IEEE 802.3u media interface, rev. 3: OUI 0x004063, 
model 0x0034
vr3 at pci0 dev 9 function 0 "VIA VT6105M RhineIII" rev 0x96: irq 12, address 
00:00:24:cb:a8:cf
ukphy3 at vr3 phy 1: Generic IEEE 802.3u media interface, rev. 3: OUI 0x004063, 
model 0x0034
fxp0 at pci0 dev 14 function 0 "Intel 8255x" rev 0x10, i82551: irq 10, address 
00:07:e9:08:8c:ec
inphy0 at fxp0 phy 1: i82555 10/100 PHY, rev. 4
glxpcib0 at pci0 dev 20 function 0 "AMD CS5536 ISA" rev 0x03: rev 3, 32-bit 
3579545Hz timer, watchdog, gpio
gpio0 at glxpcib0: 32 pins
pciide0 at pci0 dev 20 function 2 "AMD CS5536 IDE" rev 0x01: DMA, channel 0 
wired to compatibility, channel 1 wired to compatibility
wd0 at pciide0 channel 0 drive 1: <Crucial CT32GBFAB0>
wd0: 1-sector PIO, LBA48, 31472MB, 64454656 sectors
wd0(pciide0:0:1): using PIO mode 4, Ultra-DMA mode 2
pciide0: channel 1 ignored (disabled)
ohci0 at pci0 dev 21 function 0 "AMD CS5536 USB" rev 0x02: irq 15, version 1.0, 
legacy support
ehci0 at pci0 dev 21 function 1 "AMD CS5536 USB" rev 0x02: irq 15
usb0 at ehci0: USB revision 2.0
uhub0 at usb0 "AMD EHCI root hub" rev 2.00/1.00 addr 1
isa0 at glxpcib0
isadma0 at isa0
com0 at isa0 port 0x3f8/8 irq 4: ns16550a, 16 byte fifo
com0: console
com1 at isa0 port 0x2f8/8 irq 3: ns16550a, 16 byte fifo
pckbc0 at isa0 port 0x60/5
pcppi0 at isa0 port 0x61
midi0 at pcppi0: <PC speaker>
spkr0 at pcppi0
nsclpcsio0 at isa0 port 0x2e/2: NSC PC87366 rev 9: GPIO VLM TMS
gpio1 at nsclpcsio0: 29 pins
npx0 at isa0 port 0xf0/16: reported by CPUID; using exception 16
usb1 at ohci0: USB revision 1.0
uhub1 at usb1 "AMD OHCI root hub" rev 1.00/1.00 addr 1
biomask e1c7 netmask ffe7 ttymask ffff
mtrr: K6-family MTRR support (2 registers)
vscsi0 at root
scsibus0 at vscsi0: 256 targets
softraid0 at root
root on wd0a swap on wd0b dump on wd0b
WARNING: / was not properly unmounted
carp0: state transition: BACKUP -> MASTER
carp1: state transition: BACKUP -> MASTER
carp2: state transition: BACKUP -> MASTER
carp3: state transition: BACKUP -> MASTER
carp4: state transition: BACKUP -> MASTER
syncing disks... done
OpenBSD 4.7 (GENERIC) #1: Thu Jul  8 21:36:29 MDT 2010
    r...@fw1.example.com:/usr/src/sys/arch/i386/compile/GENERIC
cpu0: Geode(TM) Integrated Processor by AMD PCS ("AuthenticAMD" 586-class) 500 
MHz
cpu0: FPU,DE,PSE,TSC,MSR,CX8,SEP,PGE,CMOV,CFLUSH,MMX
real mem  = 536440832 (511MB)
avail mem = 511062016 (487MB)
mainbus0 at root
bios0 at mainbus0: AT/286+ BIOS, date 20/70/03, BIOS32 rev. 0 @ 0xfac40
pcibios0 at bios0: rev 2.0 @ 0xf0000/0x10000
pcibios0: pcibios_get_intr_routing - function not supported
pcibios0: PCI IRQ Routing information unavailable.
pcibios0: PCI bus #0 is the last bus
bios0: ROM list: 0xc8000/0xa800
cpu0 at mainbus0: (uniprocessor)
amdmsr0 at mainbus0
pci0 at mainbus0 bus 0: configuration mode 1 (bios)
io address conflict 0x6100/0x100
io address conflict 0x6200/0x200
pchb0 at pci0 dev 1 function 0 "AMD Geode LX" rev 0x33
glxsb0 at pci0 dev 1 function 2 "AMD Geode LX Crypto" rev 0x00: RNG AES
vr0 at pci0 dev 6 function 0 "VIA VT6105M RhineIII" rev 0x96: irq 11, address 
00:00:24:cb:a8:cc
ukphy0 at vr0 phy 1: Generic IEEE 802.3u media interface, rev. 3: OUI 0x004063, 
model 0x0034
vr1 at pci0 dev 7 function 0 "VIA VT6105M RhineIII" rev 0x96: irq 5, address 
00:00:24:cb:a8:cd
ukphy1 at vr1 phy 1: Generic IEEE 802.3u media interface, rev. 3: OUI 0x004063, 
model 0x0034
vr2 at pci0 dev 8 function 0 "VIA VT6105M RhineIII" rev 0x96: irq 9, address 
00:00:24:cb:a8:ce
ukphy2 at vr2 phy 1: Generic IEEE 802.3u media interface, rev. 3: OUI 0x004063, 
model 0x0034
vr3 at pci0 dev 9 function 0 "VIA VT6105M RhineIII" rev 0x96: irq 12, address 
00:00:24:cb:a8:cf
ukphy3 at vr3 phy 1: Generic IEEE 802.3u media interface, rev. 3: OUI 0x004063, 
model 0x0034
fxp0 at pci0 dev 14 function 0 "Intel 8255x" rev 0x10, i82551: irq 10, address 
00:07:e9:08:8c:ec
inphy0 at fxp0 phy 1: i82555 10/100 PHY, rev. 4
glxpcib0 at pci0 dev 20 function 0 "AMD CS5536 ISA" rev 0x03: rev 3, 32-bit 
3579545Hz timer, watchdog, gpio
gpio0 at glxpcib0: 32 pins
pciide0 at pci0 dev 20 function 2 "AMD CS5536 IDE" rev 0x01: DMA, channel 0 
wired to compatibility, channel 1 wired to compatibility
wd0 at pciide0 channel 0 drive 1: <Crucial CT32GBFAB0>
wd0: 1-sector PIO, LBA48, 31472MB, 64454656 sectors
wd0(pciide0:0:1): using PIO mode 4, Ultra-DMA mode 2
pciide0: channel 1 ignored (disabled)
ohci0 at pci0 dev 21 function 0 "AMD CS5536 USB" rev 0x02: irq 15, version 1.0, 
legacy support
ehci0 at pci0 dev 21 function 1 "AMD CS5536 USB" rev 0x02: irq 15
usb0 at ehci0: USB revision 2.0
uhub0 at usb0 "AMD EHCI root hub" rev 2.00/1.00 addr 1
isa0 at glxpcib0
isadma0 at isa0
com0 at isa0 port 0x3f8/8 irq 4: ns16550a, 16 byte fifo
com0: console
com1 at isa0 port 0x2f8/8 irq 3: ns16550a, 16 byte fifo
pckbc0 at isa0 port 0x60/5
pcppi0 at isa0 port 0x61
midi0 at pcppi0: <PC speaker>
spkr0 at pcppi0
nsclpcsio0 at isa0 port 0x2e/2: NSC PC87366 rev 9: GPIO VLM TMS
gpio1 at nsclpcsio0: 29 pins
npx0 at isa0 port 0xf0/16: reported by CPUID; using exception 16
usb1 at ohci0: USB revision 1.0
uhub1 at usb1 "AMD OHCI root hub" rev 1.00/1.00 addr 1
biomask e1c7 netmask ffe7 ttymask ffff
mtrr: K6-family MTRR support (2 registers)
vscsi0 at root
scsibus0 at vscsi0: 256 targets
softraid0 at root
root on wd0a swap on wd0b dump on wd0b
carp0: state transition: BACKUP -> MASTER
carp1: state transition: BACKUP -> MASTER
carp2: state transition: BACKUP -> MASTER
carp3: state transition: BACKUP -> MASTER
carp4: state transition: BACKUP -> MASTER


Finally, /etc/pf.conf:

#       $OpenBSD: pf.conf,v 1.3 2010/09/03 04:40:53 root Exp $
#
# See pf.conf(5) for syntax and examples.
# Remember to set net.inet.ip.forwarding=1 and/or net.inet6.ip6.forwarding=1
# in /etc/sysctl.conf if packets are to be forwarded between interfaces.

set require-order yes
set block-policy return
set skip on lo
set limit table-entries 200000

dsl_gw="BBB.BBB.BBB.GW/32"
cable_gw="AAA.AAA.AAA.GW/32"

dmz_if="vr0"
dsl_if="vr1"
cable_if="vr2"
guest_if="vr3"
int_if="fxp0"

# for pfsync; change this to a dedicated link once we get a dual NIC
syncdev="vr0"

cable_ip1="AAA.AAA.AAA.C1/32"
cable_ip2="AAA.AAA.AAA.C2/32"
int_ip="192.168.DDD.1/32"
guest_ip="192.168.EEE.1/32"
# dmz_ip="192.168.FFF.1/32"

int_net="192.168.DDD.0/24"
guest_net="192.168.EEE.0/24"
dmzR_net="CCC.CCC.CCC.0/24"
dmzN_net="192.168.FFF.0/24"
dmz_nets="{ CCC.CCC.CCC.0/24, 192.168.FFF.0/24 }"

hosta_ip="192.168.FFF.14/32"
backup_srv_ip="192.168.FFF.14/32"        # hosta
hostb_ip="192.168.FFF.10/32"
hostc_ip="192.168.FFF.12/32"
ldap_ip="192.168.FFF.10/32"
hostd_ip="CCC.CCC.CCC.15/32"
webapp1_ip="192.168.FFF.40/32"
hostg_ip="192.168.FFF.13/32"
hoste_ip="192.168.FFF.81/32"
hostf_ip="192.168.DDD.4/32"

# IPs of fw1 and fw2 on the DMZ network
table <fw_dmz_ips> const { CCC.CCC.CCC.1/32, CCC.CCC.CCC.2/32, \
                           CCC.CCC.CCC.3/32 }
table <fw_ips> const { \
        $cable_ip1, $cable_ip2, \
        CCC.CCC.CCC.1/32, CCC.CCC.CCC.2/32, CCC.CCC.CCC.3/32, \
        192.168.DDD.1/32, 192.168.DDD.2/32, 192.168.DDD.3/32, \
        192.168.EEE.1/32, 192.168.EEE.2/32, 192.168.EEE.3/32, \
        192.168.FFF.1/32, 192.168.FFF.2/32, 192.168.FFF.3/32, \
        BBB.BBB.BBB.CRP/32, BBB.BBB.BBB.FW1/32, BBB.BBB.BBB.FW2/32 \
        }

table <martians> const { 127.0.0.0/8, 192.168.0.0/16, 172.16.0.0/12, \
                         10.0.0.0/8,  169.254.0.0/16, 192.0.2.0/24, \
                         0.0.0.0/8, 240.0.0.0/4 }

table <cable_ips> { $cable_ip1, $cable_ip2 }
table <internal_nets> { $int_net, $dmzR_net, $dmzN_net, $guest_net }
table <ldap_ips> { 192.168.FFF.12/32, 192.168.FFF.10/32 }
table <mail_ips> { 192.168.FFF.12/32, 192.168.FFF.10/32 }
table <hp_printers> { 192.168.DDD.10/32 }
table <backup_monitors> { $hostf_ip }
table <time_servers> { $hosta_ip, $hostd_ip }

# Various external networks and hosts that are allowed to get the named-related
# rsync data
table <secondary_servers> { GGG.GGG.GGG.GGG/32, HHH.HHH.HHH.HHH/32, 
III.III.III.III/24 }

table <bruteforce> persist
table <spamd> persist
table <spamd-white> persist
table <blackhole> persist { 192.24.28.2 }


# Crap Microshit ports that we want to block without logging:
#       135     pop-ups used by spammers to attack windoze systems
#       137     netbios
#       138     netbios
#       139     netbios
#       445     netbios
#       1433    MS-SQL
#       1434    MS-SQL
#       4899    radmin (remote admin)
#       17300   kuang2
#       27374   (?)
#
ms_ports="{ 135, 137, 138, 139, 445, 1433, 1434, 4899, 17300, 27374 }"

# filter rules and anchor for ftp-proxy(8)
#anchor "ftp-proxy/*"
#pass in quick proto tcp to port ftp rdr-to 127.0.0.1 port 8021

# anchor for relayd(8)
#anchor "relayd/*"

set loginterface $cable_if
set loginterface $dmz_if

#anchor "ftp-proxy/*"

# scrub and NAT; don't use <internal_nets> here
match in all scrub (no-df random-id max-mss 1440)
match out on $cable_if from { $int_net, $dmzN_net, $guest_net } nat-to 
$cable_ip1

# general "pass out" rule
pass out all keep state

# except that we don't want to egress certain things
block out on { $dsl_if, $cable_if } proto udp from any to 255.255.255.255/32 \
        port 3483
block out on { $dsl_if, $cable_if } proto udp from any to 239.255.255.250 \
        port 1900

# route packets from any IPs on $dsl_if to $cable_gw and the same
# for $cable_if and $dsl_gw
pass out quick on $dsl_if from <cable_ips> route-to ($cable_if $cable_gw) \
        keep state
pass out quick on $cable_if from $dsl_if route-to ($dsl_if $dsl_gw) \
        keep state

#antispoof log quick for { lo0, $dmz_if, $int_if, $guest_if }
block in log quick from <bruteforce>

# carp traffic (password protected) & pfsync traffic
pass quick proto carp keep state
pass quick on $syncdev proto pfsync

# no egress/ingress for reserved blocks
block quick on { $cable_if, $dsl_if } from <martians> to any

# hack attempts
block in quick from <blackhole> to any

# log most things that are blocked, but make some exceptions
block in log all
block in proto {tcp, udp} from any to any port $ms_ports
block in quick on {$cable_if, $dsl_if} proto udp \
        from any to 255.255.255.255/32 port 68
#block in proto udp from any to 255.255.255.255/32 port 3483
#block in proto udp from any to 239.255.255.250 port 1900

# block but don't log ident, however *do* return an answer so that we
# get a quick timeout
block return-rst in on { $cable_if, $dsl_if } proto tcp \
        from any to any port auth

# FTP.  We have two ftp-proxy processes.  Inbound on the cable connection
# goes through a reverse proxy listening on 127.0.0.1:8022.  Connections going
# from our internal networks elsewhere go through a forward proxy 
# listening on 127.0.0.1:8021.

# TODO: This is ugly enough that we may just have to avoid the proxy.

#pass in quick proto tcp to port ftp rdr-to 127.0.0.1 port 8021
pass in quick on { $dmz_if, $int_if, $guest_if } proto tcp to port ftp \
        rdr-to 127.0.0.1 port 8021

pass in quick on $cable_if proto tcp to $cable_ip1 port ftp \
        rdr-to 127.0.0.1 port 8022 \
        keep state reply-to ($cable_if $cable_gw)

#pass           # to establish keep-state

# rules for spamd(8)
#table <spamd-white> persist
#table <nospamd> persist file "/etc/mail/nospamd"
#pass in on egress proto tcp from any to any port smtp \
#    rdr-to 127.0.0.1 port spamd
#pass in on egress proto tcp from <nospamd> to any port smtp
#pass in log on egress proto tcp from <spamd-white> to any port smtp
#pass out log on egress proto tcp to any port smtp


#block in quick from urpf-failed to any # use with care

# By default, do not permit remote connections to X11
block in on ! lo0 proto tcp to port 6000:6010

# let the DMZ have arbitrary outbound access, but not to internal
pass in on $dmz_if proto tcp from $dmz_nets to { $dmz_nets, $guest_net } \
        flags S/SAFR modulate state
pass in on $dmz_if proto tcp from $dmzR_net to ! <internal_nets> \
        flags S/SAFR modulate state route-to ($dsl_if $dsl_gw)
pass in on $dmz_if proto tcp from $dmzN_net to ! <internal_nets> \
        flags S/SAFR modulate state route-to ($cable_if $cable_gw)
pass in on $dmz_if proto { udp, esp } from $dmz_nets \
        to { $guest_net, $dmz_nets } keep state
pass in on $dmz_if proto { udp, esp } from $dmzR_net to ! <internal_nets> \
        keep state route-to ($dsl_if $dsl_gw)
pass in on $dmz_if proto { udp, esp } from $dmzN_net to ! <internal_nets> \
        keep state route-to ($cable_if $cable_gw)

# Let the internal network have arbitrary outbound access, but not to the
# DMZ unless otherwise specified.
pass in on $int_if proto tcp from $int_net to { $int_net, $guest_net } \
        flags S/SAFR modulate state
pass in on $int_if proto tcp from $int_net to ! <internal_nets> \
        flags S/SAFR modulate state route-to ($cable_if $cable_gw)
pass in on $int_if proto { udp, esp } from $int_net \
        to { $int_net, $guest_net } keep state
pass in on $int_if proto { udp, esp } from $int_net to ! <internal_nets> \
        keep state route-to ($cable_if $cable_gw)

# let guest_net have arbitrary outbound access, but not to the DMZ or 
# int_net unless otherwise specified
pass in on $guest_if proto tcp from $guest_net to $guest_net \
        flags S/SAFR modulate state
pass in on $guest_if proto tcp from $guest_net to ! <internal_nets> \
        flags S/SAFR modulate state route-to ($cable_if $cable_gw)
pass in on $guest_if proto { udp, esp } from $guest_net \
        to $guest_net keep state
pass in on $guest_if proto { udp, esp } from $guest_net to ! <internal_nets> \
        keep state route-to ($cable_if $cable_gw)

anchor "ftp-proxy/*"

#
# DNS to the firewall
#
pass in on $cable_if proto tcp from any to <cable_ips> port domain \
        flags S/SAFR modulate state reply-to ($cable_if $cable_gw)
pass in on $cable_if proto udp from any to <cable_ips> port domain \
        keep state reply-to ($cable_if $cable_gw)
pass in on { $dmz_if, $int_if, $guest_if } proto tcp from any \
        to <fw_ips> port domain flags S/SAFR keep state 
pass in on { $dmz_if, $int_if, $guest_if } proto udp from any \
        to <fw_ips> port domain keep state 

# DHCP *sync* protocol
pass in on $dmz_if proto udp from any to $dmz_if port dhcpd-sync keep state
pass out on $dmz_if proto udp from any to any port dhcpd-sync keep state

# DHCP
#       - permit clients on internal, guest, and DMZ nets to get IPs
block in log proto udp from any port 68 to any port 67
pass in on { $int_if, $dmz_if, $guest_if } proto udp from 0.0.0.0/32 port 68 \
        to 255.255.255.255/32 port 67 keep state
pass in on $int_if proto udp from $int_net port 68 \
        to $int_if port 67 keep state
pass in on $dmz_if proto udp from $dmz_nets port 68 \
        to $dmz_if port 67 keep state
pass in on $guest_if proto udp from $guest_net port 68 \
        to $guest_if port 67 keep state

#
# NTP
#
pass in on { $int_if, $dmz_if, $guest_if } proto udp from any to \
        <time_servers> port ntp keep state
pass in on { $int_if, $dmz_if, $guest_if } proto tcp from any to \
        <time_servers> port ntp flags S/SAFR modulate state

#
# Inbound services to the firewall itself:
#    SSH (any external IP on DSL side)
#    SSH (the canonical DMZ IP)
#    SSH (first external IP only on cable side)
#               (NOT CURRENTLY ACTIVE; SEE hostc SSH RULE)
#
#pass in on $dsl_if proto tcp from any to { $dsl_if, <fw_dmz_ips> } \
#       port { ssh } \
#       flags S/SAFR keep state \
#       (max-src-conn 50, max-src-conn-rate 15/5, overload <bruteforce> flush 
global) \
#       reply-to ($dsl_if $dsl_gw)

# if we're the standby router, then packets to us from the outside world
# may come via internal interfaces
pass in proto tcp from !<internal_nets> to { $dsl_if, <fw_dmz_ips> } \
        port { ssh } \
        flags S/SAFR keep state \
        (max-src-conn 50, max-src-conn-rate 15/5, overload <bruteforce> flush 
global) \
        reply-to ($dsl_if $dsl_gw)

#
# We currently don't allow inbound SSH to gwc via cable
#pass in on $cable_if proto tcp from any to $cable_ip1 \
#       port { ssh } \
#       flags S/SAFR modulate state \
#       (max-src-conn 50, max-src-conn-rate 15/5, overload <bruteforce> flush 
global) \
#       reply-to ($cable_if $cable_gw)

# rsync to firewall from selected servers
pass in on $cable_if proto tcp from <secondary_servers> to $cable_ip2 \
        port { rsync } \
        flags S/SAFR modulate state \
        reply-to ($cable_if $cable_gw)

#
# SMTP:
# If the originator is on the spamd blacklist, then redirect to spamd.
# Otherwise, redirect to the mail server.
pass in on $cable_if proto tcp from <spamd> to <cable_ips> \
        port smtp rdr-to 127.0.0.1 port spamd \
        flags S/SAFR modulate state reply-to ($cable_if $cable_gw)
pass in on $dsl_if proto tcp from <spamd> to any \
        port smtp rdr-to 127.0.0.1 port spamd \
        flags S/SAFR modulate state reply-to ($dsl_if $dsl_gw)
pass in on $cable_if proto tcp from ! <spamd> to <cable_ips> \
        port smtp rdr-to $hostc_ip \
        flags S/SAFR modulate state reply-to ($cable_if $cable_gw)

#
# Inbound services to hostc
#
# cable IP1: SSH, IMAPS, HTTP, HTTPS, RSYNC
#           (smtp is handled above, separately)
pass in on $cable_if proto tcp from any to $cable_ip1 \
        port {ssh, imaps, http, https, rsync } \
        rdr-to $hostc_ip \
        flags S/SAFR modulate state reply-to ($cable_if $cable_gw)
# cable IP2: GnuDIP (3495/tcp)
pass in on $cable_if proto tcp from any to $cable_ip2 \
        port {3495} \
        rdr-to $hostc_ip \
        flags S/SAFR modulate state reply-to ($cable_if $cable_gw)
# Non-NAT networks get the union of the above, plus:
#     ftp (21 and 50000-60000)
pass in on { $int_if, $guest_if, $dmz_if } \
        proto tcp from any to $hostc_ip \
        port { ssh, imaps, http, https, rsync, smtp, 3495 \
        ftp, 50000:60000 } \
        flags S/SAFR modulate state
pass in on $dmz_if proto tcp from $hostc_ip port ftp-data to any \
        flags S/SAFR modulate state

# traffic to hostd:
#       ssh
pass in on { $int_if, $dmz_if } proto tcp from any to $hostd_ip \
        port { ssh } \
        flags S/SAFR modulate state

# traffic to webapp1:
#       ssh, tomcat (8080)
pass in on { $int_if, $dmz_if } proto tcp from { $hostf_ip } to $webapp1_ip \
        port { ssh, 8080 } \
        flags S/SAFR modulate state

# traffic to hostg:
#       ssh, http, https
pass in on { $int_if, $dmz_if } proto tcp from { $hostf_ip } to $hostg_ip \
        port { ssh, http, https } \
        flags S/SAFR modulate state

# music server
pass in on { $int_if, $guest_if } proto tcp from any to $hosta_ip \
        port { 3483, 9000 } flags S/SAFR modulate state
pass in on { $int_if, $guest_if } proto udp from any to $hosta_ip \
        port 3483 keep state

# database for hosth
pass in on $int_if proto tcp from $hostf_ip to $hoste_ip \
        port 3306 flags S/SAFR modulate state

# permit netfff machines access to the printer
#       9100 - jetdirect
#       161 - snmp
#       2207 - hpssd
#       2208 - hpiod
pass in on $dmz_if proto tcp from $dmz_nets to <hp_printers> \
        port { 9100, 2207, 2208, 161 } flags S/SAFR modulate state
pass in on $dmz_if proto udp from $dmz_nets to <hp_printers> \
        port { 9100, 2207, 2208, 161 } keep state

#
# traceroute:  allow internal networks to traceroute anywhere
#             base+nhops*nqueries-1 = 33434+64*3-1
#
pass in on $int_if inet proto udp from $int_net to any \
        port 33433 >< 33626 keep state route-to ($cable_if $cable_gw)
pass in on $int_if inet proto udp from $int_net to <internal_nets> \
        port 33433 >< 33626 keep state

pass in on $dmz_if inet proto udp from $dmzR_net to any \
        port 33433 >< 33626 keep state route-to ($dsl_if $dsl_gw)
pass in on $dmz_if inet proto udp from $dmzN_net to any \
        port 33433 >< 33626 keep state route-to ($cable_if $cable_gw)
pass in on $dmz_if inet proto udp from $dmz_nets to <internal_nets> \
        port 33433 >< 33626 keep state

pass in on $guest_if inet proto udp from $guest_net to any \
        port 33433 >< 33626 keep state route-to ($cable_if $cable_gw)
pass in on $guest_if inet proto udp from $guest_net to <internal_nets> \
        port 33433 >< 33626 keep state

#
# pings:
#       - permit pings to our external interfaces from anywhere
#       - permit pings to the public IP DMZ net from anywhere via the dsl if
#       - permit internal net to ping anywhere
#       - permit dmz and guest nets to ping only the outside world
#
block in log quick on $guest_if inet proto icmp from any \
        to { $int_net, $dmz_nets } icmp-type echoreq
block in log quick on $dmz_if inet proto icmp from any \
        to { $int_if, $guest_if }  icmp-type echoreq

pass in quick on $dmz_if inet proto icmp from any \
        to { <internal_nets>, $cable_ip1, $cable_ip2, $dsl_if } \
        icmp-type echoreq keep state

pass in on $cable_if inet proto icmp from any to { $cable_ip1, $cable_ip2 } \
        icmp-type echoreq keep state reply-to ($cable_if $cable_gw)
pass in on $dsl_if inet proto icmp from any to { $dsl_if, $dmzR_net } \
        icmp-type echoreq keep state reply-to ($dsl_if $dsl_gw)

pass in on $dmz_if inet proto icmp from $dmzR_net to ! <internal_nets> \
        icmp-type echoreq keep state route-to ($dsl_if $dsl_gw)
pass in on $dmz_if inet proto icmp from $dmzN_net to ! <internal_nets> \
        icmp-type echoreq keep state route-to ($cable_if $cable_gw)
pass in on $dmz_if inet proto icmp from {$dmzR_net, $dmzN_net} \
         to <internal_nets> icmp-type echoreq keep state

pass in on { $int_if, $guest_if } inet proto icmp all \
        icmp-type echoreq keep state route-to ($cable_if $cable_gw)
pass in on { $int_if, $guest_if } inet proto icmp from any to <internal_nets> \
        icmp-type echoreq keep state



Devin
-- 
Friends may come and go, but enemies just accumulate.

Reply via email to