> If you don't want any PCs on the LAN to access your server but for udp
> 53 (will mean you can't even SSH into the box) why don't you add
> something like:
>
>   pass in quick on $int_if proto udp from $int_if:network to $int_if \
>     port $int_udp keep state
>   block in quick on $int_if from any to $firewall_internal_ip
>
> Surely that is a better solution?
>
> Andrew


Hello,

Thanks for your reaction!

I guess your solution is more efficient, but that is not the problem. What
I want is the following:

Block all
Pass in on $int_if from $int_if:network to any keep state
Block in on $int_if from $int_if:network to { $int_if:network,
$int_if2_other:network }
Pass in on $int_if proto udp from $int_if:network to $int_if port = domain
keep state

This makes it possible for a package to reach the internet and make
DNS-queries on the internal firewall ip ($int_if). These rules also
provide in blocking traffic to $int_if2_other:network. This works like a
charm.
Now I thought to be clever by using the �not�-modifier (!) so the above
rules would look like:

Block all
Pass in on $int_if from $int_if:network to !{ $int_if:network,
$int_if2_other:network } keep state
Pass in on $int_if proto udp from $int_if:network to $int_if port = domain
keep state

The first rule should provide in passing all traffic except to the server
($int_if) and a secondary range. The second rule opens UDP port 53.
Unfortunately this doesn�t work. It seems as if the �not� modifier does
not do what I believe it should do.

Regards Bj�rn

Reply via email to