The build of IP Filter gaurantees if no rule exists to pass traffic it will
be blocked - see your output from ipf -v
ipf: IP Filter: v4.1.8 (416)
Kernel: IP Filter: v4.1.8
Running: yes
Log Flags: 0 = none set
Default: block all, Logging: available
----- Original Message -----
From: "Trevor Osatchuk" <[EMAIL PROTECTED]>
To: "Michael Grant" <[EMAIL PROTECTED]>
Cc: <[email protected]>
Sent: Friday, June 09, 2006 3:12 PM
Subject: Re: Problems with Azureus
Yeah, all of the 50505 traffic from my internal ip is shown as
blocked. I looked at my rules, and I don't see where they are being
blocked. There is no specific block for that port. Here are my
rules:
ipfstat -iohn might be more helpful in identifying where the problem may be.
#################################################################
# No restrictions on Inside Lan Interface for private network
# Not needed unless you have Lan
#################################################################
pass out quick on rl0 all
pass in quick on rl0 all
Perhaps some rules with keep-state might help!
# Block and log only the first occurrence of everything
# else that's trying to get out.
# This rule enforces the block all by default logic.
block out log first quick on vr0 all
# Block all inbound traffic from non-routable or reserved address spaces
block in quick on vr0 from 192.168.0.0/16 to any #RFC 1918 private IP
block in quick on vr0 from 172.16.0.0/12 to any #RFC 1918 private IP
block in quick on vr0 from 10.0.0.0/8 to any #RFC 1918 private IP
block in quick on vr0 from 127.0.0.0/8 to any #loopback
block in quick on vr0 from 0.0.0.0/8 to any #loopback
block in quick on vr0 from 169.254.0.0/16 to any #DHCP auto-config
block in quick on vr0 from 192.0.2.0/24 to any #reserved for doc's
block in quick on vr0 from 204.152.64.0/23 to any #Sun cluster
interconnect
block in quick on vr0 from 224.0.0.0/3 to any #Class D & E multicast
# Block frags
block in quick on vr0 all with frags
Perhaps the above could be commented out to rule out if it is contributing.
# Block and log only first occurrence of all remaining traffic
# coming into the firewall. The logging of only the first
# occurrence stops an 'denial of service' attack targeted
# at filling up your log file space.
# This rule enforces the block all by default logic.
block in log first quick on vr0 all
Is the above neccessary when IP Filters default operation is to block?