Hi
 I have some suggestion below.

--- Chris Willis <[EMAIL PROTECTED]> wrote:

>  
> 
> -----Original Message-----
> From: Chris Willis 
> Sent: Sunday, March 12, 2006 10:23 AM
> To: 'Melameth, Daniel D.'
> Subject: RE: Solution Request: I need to initiate outbound PPTP
> requests
> thru FreeBSD firewall
> 
> This is what fwbuilder is creating.
> 
> 
> set limit { frags 5000, states 10000 }
> set timeout adaptive.start 8000
> set timeout adaptive.end 10000
> set optimization Normal
> 
> #
> # Scrub rules
> #
> scrub in all fragment reassemble
> scrub out all random-id 
> 
> #
> # Rule  0 (NAT)
> # force mail server to NAT using same IP as incoming mail # nat on
> fxp0
> proto {tcp udp icmp} from 192.168.254.253 to any -> 64.62.37.227 # #

Rule 0
 nat on fxp0 from 192.168.254.253 to any -> 64.62.37.22

> Rule  1 (NAT) # force outbound vpn traffic to source port 500 # nat
> on
> fxp0 proto {tcp,udp} from 192.168.0.0/16 to any port 500 ->
> 64.62.37.226
> port 500 # # Rule  2 (NAT) # NAT all 1928 LAN clients to an IP
> address
> on the external NIC # nat on fxp0 proto {tcp udp icmp} from
> 192.168.0.0/16 to any -> 64.62.37.226 # 
 nat on fxp0 from 192.168.0.0/16 to any -> 64.62.37.22

 that enough for pptp & nat

pass in quick on $int_if proto gre from any to any keep state
pass in quick on $int_if inet proto tcp from any to any port = 1723
flags S/SA keep state

pass out quick on $ext_if proto gre from any to any keep state

I'm using OpenBSD 3.8 and above 3 rules are enough.By the way 3.8 do
not need to pass in/out gre proto.
Also check >sysctl net.inet.gre.allow

Rules are very hard to read.Try pf.conf with minimal ruleset.FWbuilder
seem to me have bug.

Best regards
Tihomir

># Rule  3 (NAT) # Port
> Forward
> services to DC1 # rdr on fxp0 proto tcp from any to 64.62.37.226 port
> 3389 -> 192.168.254.254 port 3389 

>rdr on fxp0 proto tcp from any to
> 64.62.37.226 port 1723 -> 192.168.254.254 port 1723 

>rdr on fxp0 proto
> udp from any to 64.62.37.226 port 500 -> 192.168.254.254 port 500 rdr
> on
> fxp0 proto 47 from any to 64.62.37.226 -> 192.168.254.254 rdr on fxp0
> proto 51 from any to 64.62.37.226 -> 192.168.254.254 rdr on fxp0
> proto
> 50 from any to 64.62.37.226 -> 192.168.254.254 rdr on fxp0 proto tcp
> from any to 64.62.37.226 port 22 -> 192.168.254.254 port 22 # # Rule 
> 4
> (NAT) # Port Forward Services to MAIL1 # rdr on fxp0 proto tcp from
> any
> to 64.62.37.227 port 110 -> 192.168.254.253 port 110 rdr on fxp0
> proto
> tcp from any to 64.62.37.227 port 443 -> 192.168.254.253 port 443 rdr
> on
> fxp0 proto tcp from any to 64.62.37.227 port 3389 -> 192.168.254.253
> port 3389 rdr on fxp0 proto tcp from any to 64.62.37.227 port 80 ->
> 192.168.254.253 port 80 # # Rule  5 (NAT) # port forward to the store
> camera # rdr on fxp0 proto tcp from any to 64.62.37.228 port 80 ->
> 192.168.202.96 port 80 # # Rule  6 (NAT) # # rdr on fxp0 proto tcp
> from
> any to 64.62.37.226 port 23 -> 192.168.200.11 port 23 # # Rule  7
> (NAT)
> # # rdr on fxp0 proto tcp from any to 64.62.37.229 port 11001 ->
> 192.168.200.38 port 11001 rdr on fxp0 proto udp from any to
> 64.62.37.229
> port 11001 -> 192.168.200.38 port 11001 # # Rule  8 (NAT) # # rdr on
> fxp0 proto tcp from any to 64.62.37.229 port 11002 -> 192.168.202.19
> port 21 # # Rule  9 (NAT) # # rdr on fxp0 proto tcp from any to
> 64.62.37.230 port 3389 -> 192.168.254.255 port 3389 
> 
> 
> # Tables: (3)
> table <id4411F6F4.1> { 224.0.0.0/4 , 169.254.0.0/16 , 127.0.0.0/8 ,
> 10.0.0.0/8 , 192.168.0.0/12 , 192.0.2.0/24 , 0.0.0.0/8 } table
> <id4411F73B.2> { 64.62.37.226 , 64.62.37.227 , 64.62.37.228 ,
> 64.62.37.229 , 64.62.37.230 , 192.168.200.89 , 192.168.200.40 } table
> <id4411FCBC.1> { 192.168.0.0/16 , 66.134.48.170 } 
> 
> #
> # Rule  0 (fxp0)
> # anti-spoof rule for external interfaces # 
> block in   log  quick on fxp0 inet  from <id4411F6F4.1>  to any 
> label
> "RULE 0 -- DROP "  
> #
> # Rule  0 (lo0)
> # allow loopback to all - required to log onto box # 
> pass in   log  quick on lo0 inet  from any  to any keep state  label
> "RULE 0 -- ACCEPT "  
> pass out  log  quick on lo0 inet  from any  to any keep state  label
> "RULE 0 -- ACCEPT "  
> #
> # Rule  0 (global)
> # deny bad combinations of TCP flags
> # 
> block in   log  quick inet proto tcp  from any  to any flags U/UA 
> label
> "RULE 0 -- DROP "  
> block in   log  quick inet proto tcp  from any  to any flags RF/RF
> label "RULE 0 -- DROP "  
> block in   log  quick inet proto tcp  from any  to any flags RS/RS
> label "RULE 0 -- DROP "  
> block in   log  quick inet proto tcp  from any  to any flags SF/SF
> label "RULE 0 -- DROP "  
> block in   log  quick inet proto tcp  from any  to any flags
> UAPRSF/UAPRSF  label "RULE 0 -- DROP "  
> block in   log  quick inet proto tcp  from any  to any flags /UAPRSF
> label "RULE 0 -- DROP "  
> block in   log  quick inet proto tcp  from any  to any flags
> UPF/UAPRSF
> label "RULE 0 -- DROP "  
> block in   log  quick inet proto tcp  from any  to any flags
> UPSF/UAPRSF
> label "RULE 0 -- DROP "  
> block in   log  quick inet proto tcp  from any  to any flags
> UARSF/UAPRSF  label "RULE 0 -- DROP "  
> block out  log  quick inet proto tcp  from any  to any flags U/UA 
> label
> "RULE 0 -- DROP "  
> block out  log  quick inet proto tcp  from any  to any flags RF/RF
> label "RULE 0 -- DROP "  
> block out  log  quick inet proto tcp  from any  to any flags RS/RS
> label "RULE 0 -- DROP "  
> block out  log  quick inet proto tcp  from any  to any flags SF/SF
> label "RULE 0 -- DROP "  
> block out  log  quick inet proto tcp  from any  to any flags
> UAPRSF/UAPRSF  label "RULE 0 -- DROP "  
> block out  log  quick inet proto tcp  from any  to any flags /UAPRSF
> label "RULE 0 -- DROP "  
> block out  log  quick inet proto tcp  from any  to any flags
> UPF/UAPRSF
> label "RULE 0 -- DROP "  
> block out  log  quick inet proto tcp  from any  to any flags
> UPSF/UAPRSF
> label "RULE 0 -- DROP "  
> block out  log  quick inet proto tcp  from any  to any flags
> UARSF/UAPRSF  label "RULE 0 -- DROP "  
> #
> # Rule  1 (global)
> # email goes to postfix on firewall first # 
> pass in   quick inet proto tcp  from any port >= 1024  to
> <id4411F73B.2>
> port 25 flags S/S modulate state  label "RULE 1 -- ACCEPT "  
> #
> # Rule  2 (global)
> # doug added ssh to dc1
> # 
> pass in   quick inet proto tcp  from 64.241.74.206  to
> 192.168.254.254
> port 22 modulate state  label "RULE 2 -- ACCEPT "  
> pass out  quick inet proto tcp  from 64.241.74.206  to
> 192.168.254.254
> port 22 modulate state  label "RULE 2 -- ACCEPT "  
> #
> # Rule  3 (global)
> # allow remote admin & VPN traffic to DC1 # 
> pass in   quick inet proto tcp  from any port >= 1024  to
> 192.168.254.254 port 3389 flags S/S modulate state  label "RULE 3 --
> ACCEPT "  
> pass in   quick inet proto tcp  from any port >= 1024  to
> 192.168.254.254 port 1723 modulate state  label "RULE 3 -- ACCEPT "  
> pass in   quick inet proto udp  from any  to 192.168.254.254 port 500
> keep state  label "RULE 3 -- ACCEPT "  
> pass in   quick inet proto 47  from any  to 192.168.254.254 keep
> state
> label "RULE 3 -- ACCEPT "  
> pass in   quick inet proto 50  from any  to 192.168.254.254 keep
> state
> label "RULE 3 -- ACCEPT "  
> pass in   quick inet proto 51  from any  to 192.168.254.254 keep
> state
> label "RULE 3 -- ACCEPT "  
> pass out  quick inet proto tcp  from any port >= 1024  to
> 192.168.254.254 port 3389 flags S/S modulate state  label "RULE 3 --
> ACCEPT "  
> pass out  quick inet proto tcp  from any port >= 1024  to
> 192.168.254.254 port 1723 modulate state  label "RULE 3 -- ACCEPT "  
> pass out  quick inet proto udp  from any  to 192.168.254.254 port 500
> keep state  label "RULE 3 -- ACCEPT "  
> pass out  quick inet proto 47  from any  to 192.168.254.254 keep
> state
> label "RULE 3 -- ACCEPT "  
> pass out  quick inet proto 50  from any  to 192.168.254.254 keep
> state
> label "RULE 3 -- ACCEPT "  
> pass out  quick inet proto 51  from any  to 192.168.254.254 keep
> state
> label "RULE 3 -- ACCEPT "  
> #
> # Rule  4 (global)
> # allow mail, OWA and POP3 to MAIL1
> # 
> pass in   quick inet proto tcp  from any port >= 1024  to
> 192.168.254.253 port 3389 flags S/S modulate state  label "RULE 4 --
> ACCEPT "  
> pass in   quick inet proto tcp  from any  to 192.168.254.253 port {
> 443,
> 110, 80, 25 } modulate state  label "RULE 4 -- ACCEPT "  
> pass out  quick inet proto tcp  from any port >= 1024  to
> 192.168.254.253 port 3389 flags S/S modulate state  label "RULE 4 --
> 
=== message truncated ===

www.BetStrikes.com - futbolni prognozi Ôóòáîëíè ïðîãíîçè

Reply via email to