Hello all,
The question may sound weird, but here is my situation:
I have a (Linux) PBX (FreePBX) that I want to protect with an OpenBSD firewall
since I am not familiar with Linux' builtin firewall and also I would like to
separate things.
I also would like to avoid routing / NAT on the firewall, which leads me to
using a transparent filtering bridge.
When experimenting with such a setup on my rented VMWare ESXi host, I
immediately got an abuse email from my hoster, complaining the use of
unauthorised MAC addresses.
The reason is:
When I order an additional IP address for my PBX VM, I am provided a defined
MAC address which I have to configure on the VM. I am not allowed to use any
other MAC.
My setup:
+--------------------------+ +--------------------------+
+----------------+
| PBX (using provided MAC) |----| OpenBSD filtering bridge |---| hoster's
router|
+--------------------------+ +--------------------------+
+----------------+
| |
| |
VMX1 VMX0 with 'alien' MAC
address
The challenge: How do I prevent my firewall's VMX0 interface from sending any
packet using any other than the provided MAC address.
Things that I already considered:
- When acting as a bridge, packets from PBX should be forwarded with original
MAC
- IP forwarding is disabled, net.inet.ip.forwarding=0
- VMX0 and VMX1 are only configured as UP (no IP address)
- The bridge is configured as:
up
add vmx0
add vmx1
blocknonip vmx0
blocknonip vmx1
-autoedge vmx0
-autoedge vmx1
-edge vmx0
-edge vmx1
- /etc/pf.conf:
set skip on lo
block drop out quick log on vmx0 from self to any
block drop in quick log on vmx0 from any to self
block drop log
pass # No filtering done ATM
Anything else that needs to be considered?
PS: If you consider this whole setup insane, I am open for better solutions :-)
Thanks for any help,
Heinrich