The next step might be a tcpdump on the external interface to watch the traffic and see that it's not doing something suprising on some other port or something.
On 11/16/2005 10:20:01 AM, Raphael GRUNDRICH wrote:
Errata : pass in quick on $ext_if \ proto tcp \ from any to 192.168.1.1 port imaps flags S/SA synproxy state
I have seen applications running under Windows 2000 that violate the 2MSL TCP rule, reusing the source ip/port destination ip/port quad too quickly. OpenBSD blocks this traffic as it sees it as a hijacking attempt. I worked around it by not using state. (*Ick*) Not using state might be something to try. Karl <[EMAIL PROTECTED]> Free Software: "You don't pay back, you pay forward." -- Robert A. Heinlein