Same problem as reported a few hours ago.   Try the vpn.inc that I
asked the other person to try.

On 8/12/05, Wesley Joyce <[EMAIL PROTECTED]> wrote:
>  
>  
> 
> After disabling the default LAN rule I immediately got this notice.   
> 
>   
> 
> System log from web gui 
> 
> Aug 12 12:13:41 php: There were error(s) loading the rules:
> /tmp/rules.debug:108: syntax error /tmp/rules.debug:109: syntax error
> /tmp/rules.debug:110: syntax error /tmp/rules.debug:111: syntax error
> /tmp/rules.debug:112: syntax error /tmp/rules.debug:113: syntax error
> /tmp/rules.debug:114: syntax error pfctl: Syntax error in config file: pf
> rules not loaded - The line in question reads [108]: pass quick on xl1 proto
> esp from 146.226.152.86 to keep state label "IPSEC: esp proto" 
> 
>   
> 
>   
> 
> pfSense# cat notices 
> 
> a:2:{i:1123863221;a:5:{s:2:"id";s:11:"filter_load";s:6:"notice";s:462:"There
> were error(s) loading the rules: /tmp/rules.debug:108: syntax error 
> 
> /tmp/rules.debug:109: syntax error 
> 
> /tmp/rules.debug:110: syntax error 
> 
> /tmp/rules.debug:111: syntax error 
> 
> /tmp/rules.debug:112: syntax error 
> 
> /tmp/rules.debug:113: syntax error 
> 
> /tmp/rules.debug:114: syntax error 
> 
> pfctl: Syntax error in config file: pf rules not loaded The line in question
> reads [108]: pass quick on xl1 proto esp from 192.168.152.86 to  keep state
> label "IPSEC:  esp
> proto"";s:3:"url";s:0:"";s:8:"category";s:13:"Filter
> Reload";s:8:"priority";i:1;}i:1123863257;a:5:{s:2:"id";s:11:"filter_load";s:6:"notice";s:462:"There
> were error(s) loading the rules: /tmp/rules.debug:108: syntax error 
> 
> /tmp/rules.debug:109: syntax error 
> 
> /tmp/rules.debug:110: syntax error 
> 
> /tmp/rules.debug:111: syntax error 
> 
> /tmp/rules.debug:112: syntax error 
> 
> /tmp/rules.debug:113: syntax error 
> 
> /tmp/rules.debug:114: syntax error 
> 
> pfctl: Syntax error in config file: pf rules not loaded The line in question
> reads [108]: pass quick on xl1 proto esp from 192.168.152.86 to  keep state
> label "IPSEC:  esp
> proto"";s:3:"url";s:0:"";s:8:"category";s:13:"Filter
> Reload";s:8:"priority";i:1;}}pfSense# 
> 
>   
> 
>   
> 
> pfSense# cat rules.debug 
> 
> # System Aliases 
> 
> lan = "{ xl0  }" 
> 
> wan = "{ xl1  }" 
> 
> pptp = "{ ng1 ng2 ng3 ng4 ng5 ng6 ng7 ng8 ng9 ng10 ng11 ng12 ng13 ng14 }" 
> 
> pppoe = "{ ng1 ng2 ng3 ng4 ng5 ng6 ng7 ng8 ng9 ng10 ng11 ng12 ng13 ng14 }" 
> 
> # User Aliases 
> 
>   
> 
> set loginterface xl1 
> 
> set loginterface xl0 
> 
> set optimization normal 
> 
>   
> 
> scrub on xl1 all 
> 
>   
> 
>   
> 
> nat-anchor "pftpx/*" 
> 
> nat-anchor "natearly/*" 
> 
> nat-anchor "natrules/*" 
> 
> nat on xl1 from 192.168.9.0/24 port 500 to any -> (xl1) port 500 
> 
> nat on xl1 from 192.168.9.0/24 to any -> (xl1) 
> 
> #SSH Lockout Table 
> 
> table <sshlockout> persist 
> 
>   
> 
>   
> 
> # spam table 
> 
> table <spamd> persist 
> 
>   
> 
>   
> 
> # Load balancing anchor - slbd updates 
> 
> rdr-anchor "slb" 
> 
> # FTP proxy 
> 
> rdr-anchor "pftpx/*" 
> 
> rdr on xl0 proto tcp from any to any port 21 -> 127.00.1 port 8021 
> 
>   
> 
>   
> 
>   
> 
> anchor "firewallrules" 
> 
>   
> 
> # loopback 
> 
> anchor "loopback" 
> 
> pass in quick on lo0 all label "pass loopback" 
> 
> pass out quick on lo0 all label "pass loopback" 
> 
>   
> 
> # package manager early specific hook 
> 
> anchor "packageearly" 
> 
>   
> 
>   
> 
> # carp 
> 
> anchor "carp" 
> 
>   
> 
> # enable ftp-proxy 
> 
> anchor "ftpproxy" 
> 
> anchor "pftpx/*" 
> 
> pass in quick on xl1 inet proto tcp from port 20 to (xl1) port > 49000 user
> proxy flags S/SA keep state label "FTP PROXY: PASV mode data connection" 
> 
>   
> 
> # allow access to DHCP server on LAN 
> 
> anchor "dhcpserverlan" 
> 
> pass in quick on xl0 proto udp from any port = 68 to 255.255.255.255 port =
> 67 label "allow access to DHCP server on LAN" 
> 
> pass in quick on xl0 proto udp from any port = 68 to 192.168.9.1 port = 67
> label "allow access to DHCP server on LAN" 
> 
> pass out quick on xl0 proto udp from 192.168.9.1 port = 67 to any port = 68
> label "allow access to DHCP server on LAN" 
> 
>   
> 
> # WAN spoof check 
> 
> anchor "wanspoof" 
> 
> block in log quick on xl1 from 192.168.9.0/24 to any label "WAN spoof check"
> 
>   
> 
> # allow our DHCP client out to the WAN 
> 
> # XXX - should be more restrictive 
> 
> # (not possible at the moment - need 'me' like in ipfw) 
> 
> anchor "wandhcp" 
> 
> pass out quick on xl1 proto udp from any port = 68 to any port = 67 label
> "allow dhcp client out wan" 
> 
> block in log quick on xl1 proto udp from any port = 67 to 192.168.9.0/24
> port = 68 label "allow dhcp client out wan" 
> 
> pass in quick on xl1 proto udp from any port = 67 to any port = 68 label
> "allow dhcp client out wan" 
> 
>   
> 
> # LAN/OPT spoof check (needs to be after DHCP because of broadcast
> addresses) 
> 
> antispoof for xl0 
> 
>   
> 
>   
> 
> # block anything from private networks on WAN interface 
> 
> anchor "spoofing" 
> 
> block in log quick on xl1 from 10.0.0.0/8 to any label "block private
> networks from wan block 10/8" 
> 
> block in log quick on xl1 from 127.0.0.0/8 to any label "block private
> networks from wan block 127/8" 
> 
> block in log quick on xl1 from 172.16.0.0/12 to any label "block private
> networks from wan block 172.16/12" 
> 
> block in log quick on xl1 from 192.168.0.0/16 to any label "block private
> networks from wan block 192.168/16" 
> 
> # Support for allow limiting of TCP connections by establishment rate 
> 
> anchor "limitingesr" 
> 
> table <virusprot> 
> 
>   
> 
> # let out anything from the firewall host itself and decrypted IPsec traffic
> 
> # pass out quick on xl1 all keep state label "let out anything from firewall
> host itself" 
> 
> # pass traffic from firewall -> out 
> 
> anchor "firewallout" 
> 
> pass out quick on xl1 all keep state label "let out anything from firewall
> host itself" 
> 
> pass out quick on xl0 all keep state label "let out anything from firewall
> host itself" 
> 
>   
> 
> # make sure the user cannot lock himself out of the webGUI or SSH 
> 
> anchor "anti-lockout" 
> 
> pass in quick from 192.168.9.0/24 to 192.168.9.1 keep state label
> "anti-lockout web rule" 
> 
>   
> 
> # SSH lockout 
> 
> block in log proto tcp from <sshlockout> to any port 22 label "sshlockout" 
> 
>   
> 
>   
> 
> # User-defined rules follow 
> 
> pass in quick on $wan proto tcp from { 192.168.0.0/16 } to any flags S/SA
> keep state  label "USER_RULE" 
> 
> pass in quick on $lan from 192.168.9.0/24 to any keep state  label
> "USER_RULE: Default LAN -> any" 
> 
>   
> 
> # VPN Rules 
> 
> pass quick on xl1 proto udp from 192.168.152.86 to  port = 500 keep state
> label "IPSEC:  udp" 
> 
> pass quick on xl1 proto udp from  to 192.168.152.86 port = 500 keep state
> label " udp" 
> 
> pass quick on xl1 proto esp from 192.168.152.86 to  keep state label "IPSEC:
>  esp proto" 
> 
> pass quick on xl1 proto esp from  to 192.168.152.86 keep state label "IPSEC:
>  esp proto" 
> 
> pass quick on xl1 proto ah from 192.168.152.86 to  keep state label "IPSEC: 
> ah proto" 
> 
> pass quick on xl1 proto ah from  to 192.168.152.86 keep state label "IPSEC: 
> ah proto" 
> 
> pass quick on xl0 from  to  # error -   keep state label "IPSEC:  " 
> 
> pass quick on xl0 from  # error -   to  keep state label "IPSEC:  " 
> 
>   
> 
> #---------------------------------------------------------------------------
> 
> # default rules (just to be sure) 
> 
> #---------------------------------------------------------------------------
> 
> block in log quick all label "Default block all just to be sure." 
> 
> block out log quick all label "Default block all just to be sure." 
> 
>   
> 
>

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to