On 7/31/05, Giovanni P. Tirloni <[EMAIL PROTECTED]> wrote:
> Abu Khaled wrote:
> > On 7/30/05, Giovanni P. Tirloni <[EMAIL PROTECTED]> wrote:
> >
> >>Giovanni P. Tirloni wrote:
> >>
> >>>Max Laier wrote:
> >>>
nd port 3128). Otherwise ipfw well drop 'pf rdr
traffic'.
# ipfw add allow tcp from $lan_net to 127.0.0.1 3128
# ipfw add allow tcp from 127.0.0.1 3128 to $lan_net
Put the rules before any anti spoofing rules in ipfw.
--
Regards.
Abu Khaled
___
freebsd-pf@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-pf
To unsubscribe, send any mail to "[EMAIL PROTECTED]"
fw 200 allow tcp from 127.0.0.1 3128 to $internal_net
for example:
ipfw add 100 pass all from any to any via lo0
ipfw add 200 allow tcp from $internal_net to 127.0.0.1 3128
ipfw add 300 allow tcp from 127.0.0.1 3128 to $internal_net
ipfw add 400 deny all from any to 127.0.0.0/8
ipfw add 500 deny ip
queue 20Kbytes mask dst-ip 0x
Or is there a better way to do it.
--
Kind regards
Abu Khaled
___
freebsd-pf@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-pf
To unsubscribe, send any mail to "[EMAIL PROTECTED]"