Nikos Vassiliadis wrote:
> >>
> >>>I have a configuration with 2 inside interfaces, 1 outside and 1 dmz
> >>>interface. The traffic should be able to flow
> >>>
> >>>1) from inside1 to any (and back)
> >>>2) from inside2 to any (and back)
> >>>3) from dmz to outside only (and back).
> >>>
> >>>I need no details, just a general hint how to setup such security
> >>>levels, preferably independent of actual IP addressses behind the
> >>>interfaces (a :network macro is not always sufficient).
> >>
> >>You may use urpf-failed instead :network
> >>urpf-failed: Any source address that fails a unicast reverse path
> >>forwarding (URPF) check, i.e. packets coming in on an interface other
> >>than that which holds the route back to the packet's source address.
> >
> >Excuse me, I do not see how this is relevant to my question (allowing
> >traffic to be initiated from a more secure interface to a less secure
> >interface and not vice versa).
> >
> 
> What if you combine macros and lists?
> The ruleset below seems "scalable" to any number of interfaces.
> 
> inside1 = em1
> inside2 = em2
> dmz = em0
> insides = "{" $inside1:network $inside2:network "}"

The problem is, there could be several routed networks behind the
inside interfaces. Not all inside networks are directly connected, and
the :network macro works only for directly connected interfaces,
right?

-- 
Victor Sudakov,  VAS4-RIPE, VAS47-RIPN
sip:suda...@sibptus.tomsk.ru
_______________________________________________
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "freebsd-questions-unsubscr...@freebsd.org"

Reply via email to