You haven't really supplied enough information, the full pf.conf and
firewall ip addresses would have been better. This is a slight guess at
whats wrong.

You say the request is from access point to radius server I would expect
to see a rule like this in your pf.conf

pass in on $xxxx proto udp from 10.50.3.11 to 172.30.30.5 port 1812

The pass rules keeps the state, allowing the return udp traffic. What
your seeing is blocked return udp traffic, because the udp state is
established in the opposite direction, the pass is ignored. Looks like
you have the rule on the wrong interface also. The other interfaces are
missing as full pf.conf not supplied. You might have to pass port 1813
also replacing 1812 by { 1812, 1813 }.

Regards

Nigel Taylor

[EMAIL PROTECTED] wrote:
> I have a Domain Controller in a DMZ which is handling radius requests from
> my access point.  I'm having problems passing the radius information
> successfully  through pf.  The pf box is a soekris running 4.1.
> 
> Mar 09 09:58:56.467664 rule 3/(match) block in on sis4: 172.30.30.5.1812 >
> 10.50.3.11.2055: Axs! id:1 [1477] [|radius] (frag 25868:[EMAIL PROTECTED])
> Mar 09 09:58:56.467745 rule 3/(match) block in on sis4: 172.30.30.5 >
> 10.50.3.11: (frag 25868:[EMAIL PROTECTED])
> 
> # more /etc/pf.conf | grep pix_if
> pix_if = "sis4"
> pass  quick log  on $pix_if from  any to 10.50.3.11
> block in log on $pix_if
> pass out on $pix_if
> 
> In this case, 172.30.30.5 is my radius server, and 10.50.3.11 is my access
> point.  Even though I am logging the pass rule, I do not seeing getting
> hit through tcpdump.  If I take out the block in log on $pix_if, radius
> information flows ok.
> 
> Thanks,
> 
> runelind at runelind dot net

Reply via email to