-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Senhores, após configurar o pfsense para fazer NAT (apenas outbound)
este , o NAT, funciona. Porém somente em alguns sites.
As regras em anexo.
Entretanto, não acesso o site dos clientes, tão pouco a partir do
próprio servidor.
Alguns exemplos não acessados:
www.uol.com.br
www.yahoo.com.br
gdk.thegamecreators.com
Entre outros.
Alguma luz?
Obrigado
P.S.: Tentando essas regras, o problema persiste.
nat on re0 from any to any -> (re0)
pass quick on re0 all keep state
pass quick on xl0 all keep state
falow
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iEYEARECAAYFAkoS95gACgkQ35zeJy7JhCgr7wCeLWyX0/qlZAqSL1ddo+D9Xd2v
OtEAn2xG4C4qPXCL36vaf1BLz7Vlsudy
=y043
-----END PGP SIGNATURE-----
1.
# pfctl -sa
2.
TRANSLATION RULES:
3.
nat-anchor "pftpx/*" all
4.
nat-anchor "natearly/*" all
5.
nat-anchor "natrules/*" all
6.
nat on re0 inet from 192.168.0.0/26 port = isakmp to any port = isakmp ->
(re0) port 500 round-robin
7.
nat on re0 inet from 192.168.0.0/26 port = 5060 to any port = 5060 ->
(re0) port 5060 round-robin
8.
nat on re0 inet from 192.168.0.0/26 to any -> (re0) port 1024:65535
round-robin
9.
nat on re0 inet from 10.0.0.0/24 port = isakmp to any port = isakmp ->
(re0) port 500 round-robin
10.
nat on re0 inet from 10.0.0.0/24 port = 5060 to any port = 5060 -> (re0)
port 5060 round-robin
11.
nat on re0 inet from 10.0.0.0/24 to any -> (re0) port 1024:65535
round-robin
12.
rdr-anchor "pftpx/*" all
13.
rdr-anchor "slb" all
14.
rdr-anchor "imspector" all
15.
rdr-anchor "miniupnpd" all
16.
17.
FILTER RULES:
18.
scrub all random-id fragment reassemble
19.
anchor "ftpsesame/*" all
20.
anchor "firewallrules" all
21.
block drop quick proto tcp from any port = 0 to any
22.
block drop quick proto tcp from any to any port = 0
23.
block drop quick proto udp from any port = 0 to any
24.
block drop quick proto udp from any to any port = 0
25.
block drop quick from <snort2c> to any label "Block snort2c hosts"
26.
block drop quick from any to <snort2c> label "Block snort2c hosts"
27.
block drop in quick inet6 all
28.
block drop out quick inet6 all
29.
anchor "loopback" all
30.
pass in quick on lo0 all flags S/SA keep state label "pass loopback"
31.
pass out quick on lo0 all flags S/SA keep state label "pass loopback"
32.
anchor "packageearly" all
33.
anchor "carp" all
34.
pass quick inet proto icmp from 200.XXX.XXX.XXX to any keep state
35.
anchor "dhcpserverlan" all
36.
pass in quick on rl0 inet proto udp from any port = bootpc to
255.255.255.255 port = bootps keep state label "allow access to DHCP server on
LAN"
37.
pass in quick on rl0 inet proto udp from any port = bootpc to 192.168.0.1
port = bootps keep state label "allow access to DHCP server on LAN"
38.
pass out quick on rl0 inet proto udp from 192.168.0.1 port = bootps to
any port = bootpc keep state label "allow access to DHCP server on LAN"
39.
anchor "dhcpserverWIFI" all
40.
pass in quick on xl0 inet proto udp from any port = bootpc to
255.255.255.255 port = bootps keep state label "allow access to DHCP server"
41.
pass in quick on xl0 inet proto udp from any port = bootpc to 10.0.0.1
port = bootps keep state label "allow access to DHCP server"
42.
pass out quick on xl0 inet proto udp from 10.0.0.1 port = bootps to any
port = bootpc keep state label "allow access to DHCP server"
43.
block drop in log quick on re0 inet proto udp from any port = bootps to
192.168.0.0/26 port = bootpc label "block dhcp client out wan"
44.
block drop in on ! rl0 inet from 192.168.0.0/26 to any
45.
block drop in inet from 192.168.0.1 to any
46.
block drop in on ! xl0 inet from 10.0.0.0/24 to any
47.
block drop in inet from 10.0.0.1 to any
48.
block drop in on rl0 inet6 from fe80::2e0:7dff:fe90:b96f to any
49.
block drop in on xl0 inet6 from fe80::210:4bff:fe09:ff78 to any
50.
anchor "spoofing" all
51.
anchor "spoofing" all
52.
block drop in on ! re0 inet from 128.0.0.0/1 to any
53.
block drop in inet from 200.XXX.XXX.XXX to any
54.
block drop in on re0 inet6 from fe80::208:54ff:fe2d:28e to any
55.
block drop in log quick on re0 inet from 10.0.0.0/8 to any label "block
private networks from wan block 10/8"
56.
block drop in log quick on re0 inet from 127.0.0.0/8 to any label "block
private networks from wan block 127/8"
57.
block drop in log quick on re0 inet from 172.16.0.0/12 to any label
"block private networks from wan block 172.16/12"
58.
block drop in log quick on re0 inet from 192.168.0.0/16 to any label
"block private networks from wan block 192.168/16"
59.
anchor "limitingesr" all
60.
block drop in quick from <virusprot> to any label "virusprot overload
table"
61.
anchor "wanbogons" all
62.
block drop in log quick on re0 from <bogons> to any label "block bogon
networks from wan"
63.
pass out quick on rl0 proto icmp all keep state label "let out anything
from firewall host itself"
64.
pass out quick on re0 proto icmp all keep state label "let out anything
from firewall host itself"
65.
pass out quick on re0 all flags S/SA keep state (tcp.closed 5) label "let
out anything from firewall host itself"
66.
anchor "firewallout" all
67.
pass out quick on re0 all flags S/SA keep state label "let out anything
from firewall host itself"
68.
pass out quick on rl0 all flags S/SA keep state label "let out anything
from firewall host itself"
69.
pass out quick on xl0 all flags S/SA keep state label "let out anything
from firewall host itself"
70.
pass out quick on enc0 all flags S/SA keep state label "IPSEC internal
host to host"
71.
pass out quick on xl0 proto icmp all keep state (tcp.closed 5) label "let
out anything from firewall host itself"
72.
pass out quick on xl0 all flags S/SA keep state (tcp.closed 5) label "let
out anything from firewall host itself"
73.
anchor "anti-lockout" all
74.
pass in quick on rl0 inet from any to 192.168.0.1 flags S/SA keep state
label "anti-lockout web rule"
75.
block drop in log quick proto tcp from <sshlockout> to any port = ssh
label "sshlockout"
76.
anchor "ftpproxy" all
77.
anchor "pftpx/*" all
78.
pass in quick on re0 reply-to (re0 200.XXX.XXX.XXX) inet proto tcp from
200.XXX.XXX.XXX to 200.XXX.XXX.XXX port = 8181 flags S/SA keep state label
"USER_RULE: webgui from sakurazuka"
79.
pass in quick on re0 reply-to (re0 200.XXX.XXX.XXX) inet proto udp from
200.XXX.XXX.XXX to 200.XXX.XXX.XXX port = 8181 keep state label "USER_RULE:
webgui from sakurazuka"
80.
pass in log quick on re0 reply-to (re0 200.XXX.XXX.XXX) inet proto tcp
from 200.XXX.XXX.XXX to 200.XXX.XXX.XXX port = ssh flags S/SA keep state
label "USER_RULE: ssh from sakurazuka"
81.
pass in log quick on re0 reply-to (re0 200.XXX.XXX.XXX) inet proto udp
from 200.XXX.XXX.XXX to 200.XXX.XXX.XXX port = ssh keep state label
"USER_RULE: ssh from sakurazuka"
82.
pass in log quick on xl0 inet from 10.0.0.0/24 to any flags S/SA keep
state label "USER_RULE"
83.
pass in quick on rl0 inet from 192.168.0.0/26 to any flags S/SA keep
state label "USER_RULE: Default LAN -> any"
84.
pass in quick on rl0 inet proto tcp from any to 127.0.0.1 port =
ftp-proxy flags S/SA keep state label "FTP PROXY: Allow traffic to localhost"
85.
pass in quick on rl0 inet proto tcp from any to 127.0.0.1 port = ftp
flags S/SA keep state label "FTP PROXY: Allow traffic to localhost"
86.
pass in quick on re0 inet proto tcp from any port = ftp-data to (re0)
port > 49000 flags S/SA keep state label "FTP PROXY: PASV mode data
connection"
87.
pass in quick on xl0 inet proto tcp from any to 127.0.0.1 port = 8022
flags S/SA keep state label "FTP PROXY: Allow traffic to localhost"
88.
pass in quick on xl0 inet proto tcp from any to 127.0.0.1 port = ftp
flags S/SA keep state label "FTP PROXY: Allow traffic to localhost"
89.
anchor "imspector" all
90.
anchor "miniupnpd" all
91.
block drop in log quick all label "Default deny rule"
92.
block drop out log quick all label "Default deny rule"
93.
No queue in use
-------------------------
Histórico: http://www.fug.com.br/historico/html/freebsd/
Sair da lista: https://www.fug.com.br/mailman/listinfo/freebsd