My trusted local hosts being blocked stil prohibits me from iplementing
a much-needed IPFilter filrewall.
Test scenario:
1) NIS+ client with IPF firewall - no unexpected blocks reported in
ipmonlog
2) NIS+ replica with IPF firewall, 123.456.70.43, blocks packets
from NIS+ master, 123.456.70.11,
(as shown below) when NIS+ master executes "nisping -Ca" to
syncronize replica.
ipmonlog:
18/07/2007 10:23:17.772529 2x eri0 @0:56 b 123.456.70.11,32772 ->
123.456.70.43,54491 PR tcp len 20 40 -R IN
18/07/2007 10:23:22.564677 eri0 @0:56 b 123.456.70.11,32772 ->
123.456.70.43,54491 PR tcp len 20 40 -R IN
18/07/2007 10:23:32.174862 eri0 @0:56 b 123.456.70.11,32772 ->
123.456.70.43,54491 PR tcp len 20 40 -R IN
Refer to ipstat display below.
The packets are blocked as described above with or w/o statements 46,
47 48. Statements 40-48 were my
attempt to say, "Pass in ANY packet from these trusted hosts,
regardless of the flag being set."
Again, I hope that you will point out what I missing!
Charles
ipfstat -in
@1 block in quick proto udp from any to 123.456.71.255/32 port = 631
@2 block in quick proto udp from any to 123.456.71.255/32 port = 137
@3 block in quick proto udp from any to 123.456.71.255/32 port = 138
@4 block in quick proto udp from any to 123.456.71.255/32 port = 139
@5 block in quick proto udp from any to 255.255.255.255/32
@6 block in quick proto tcp from any to any port = 135
@7 block in quick proto udp from any to any port = 137
@8 block in quick proto udp from any to any port = 138
@9 block in quick proto tcp from any to any port = 139
@10 block in quick proto udp from any to any port = 1026
@11 block in quick proto udp from any to any port = 1027
@12 block in quick proto 2 from any to 224.0.0.1/32
@13 block in quick proto tcp/udp from any to any port = 445
@14 block in quick proto tcp/udp from any to any port = 1433
@15 block in quick proto tcp/udp from any to any port = 1434
@16 block in quick proto tcp/udp from any to any port = 4899
@17 block in quick proto tcp/udp from any to any port = 3306
@18 pass in quick proto tcp from 123.456.68.1/32 to any keep state keep
frags
@19 pass in quick proto udp from 123.456.68.1/32 to any keep state
@20 pass in quick proto tcp from 246.82.1.201/32 to any keep state keep
frags
@21 pass in quick proto udp from 246.82.1.201/32 to any keep state
@22 pass in quick proto tcp from 246.82.1.202/32 to any keep state keep
frags
@23 pass in quick proto udp from 246.82.1.202/32 to any keep state
@24 pass in quick proto tcp from 246.82.1.203/32 to any keep state keep
frags
@25 pass in quick proto udp from 246.82.1.203/32 to any keep state
@26 pass in quick proto tcp from 246.82.1.204/32 to any keep state keep
frags
@27 pass in quick proto udp from 246.82.1.204/32 to any keep state
@28 pass in quick proto tcp from 246.82.161.16/32 to any keep state
keep frags
@29 pass in quick proto udp from 246.82.161.16/32 to any keep state
@30 pass in quick proto tcp from 246.82.247.34/32 to any keep state
keep frags
@31 pass in quick proto udp from 246.82.247.34/32 to any keep state
@32 pass in quick proto tcp from 246.82.247.66/32 to any keep state
keep frags
@33 pass in quick proto udp from 246.82.247.66/32 to any keep state
@34 pass in quick proto tcp from 246.82.247.98/32 to any keep state
keep frags
@35 pass in quick proto udp from 246.82.247.98/32 to any keep state
@36 pass in quick proto tcp from 246.82.162.243/32 to any keep state
keep frags
@37 pass in quick proto udp from 246.82.162.243/32 to any keep state
@38 pass in quick proto tcp from 246.82.162.242/32 to any keep state
keep frags
@39 pass in quick proto udp from 246.82.162.242/32 to any keep state
@40 pass in quick proto tcp from 123.456.70.0/26 to any keep state keep
frags
@41 pass in quick proto udp from 123.456.70.0/26 to any keep state
@42 pass in quick proto tcp from 123.456.70.64/27 to any keep state
keep frags
@43 pass in quick proto udp from 123.456.70.64/27 to any keep state
@44 pass in quick proto tcp from 123.456.70.96/28 to any keep state
keep frags
@45 pass in quick proto udp from 123.456.70.96/28 to any keep state
@46 pass in quick proto tcp from 123.456.70.0/26 to any flags
FSRPAU/FSRPAU keep state keep frags
@47 pass in quick proto tcp from 123.456.70.64/27 to any flags
FSRPAU/FSRPAU keep state keep frags
@48 pass in quick proto tcp from 123.456.70.96/28 to any flags
FSRPAU/FSRPAU keep state keep frags
@49 pass in quick proto tcp from 123.456.0.0/16 to any port = 22 keep
state keep frags
@50 pass in quick proto tcp from 246.82.0.0/16 to any port = 22 keep
state keep frags
@51 pass in quick proto tcp from any port = 22 to any keep state keep
frags
@52 pass in quick proto tcp from 111.200.54.241/32 to any port = 22
keep state keep frags
@53 pass in quick proto tcp from 222.115.209.28/32 to any port = 22
keep state keep frags
@54 pass in quick proto tcp from 333.169.43.83/32 to any port = 22 keep
state keep frags
@55 pass in quick proto icmp from any to any
@56 block in log quick all
________________________________________________________________________
Check Out the new free AIM(R) Mail -- Unlimited storage and
industry-leading spam and email virus protection.