Aaron Stellman <[email protected]> writes: > By commenting out half the ruleset, and doing that recursively until > finding which rule causes it, I found it it be: > > nat on $ext_if from !self to any -> ($ext_if:0)
The perils of doing both ipv4 and ipv6 at the same time, I see. Then again, if you narrow its scope to inet only (not inet6) you can probably put it back in, ie nat on $ext_if inet from !self to any -> ($ext_if:0) -- Peter N. M. Hansteen, member of the first RFC 1149 implementation team http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/ "Remember to set the evil bit on all malicious network traffic" delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.

