Sorry for forgotting the rest, here you are :
ext_if is actlually working, configures to an adsl box using DHCP and
actually lynx displays pages.

int_if is the local network that I want to go through openbsd box to access
to internet so I can filter with pf.

The configuration is a standard nat rule + packet forwarding between the two
interfaces so called em0 and em1 resp ext_if and int_if.

As indicated before, I have pf enables, inet forward lines uncommented in
sysctl.con

Packets are received on int_if but not forwarded to ext_if.

Did I miss something ? Here below pf.conf

2009/5/9 Robert <rob...@openbsd.pap.st>

> On Sat, 9 May 2009 22:52:32 +0200
> Jean-Frangois SIMON <jfsimon1...@gmail.com> wrote:
> # cat /etc/pf.conf
> #       $OpenBSD: pf.conf,v 1.38 2009/02/23 01:18:36 deraadt Exp $
> #
> # See pf.conf(5) for syntax and examples; this sample ruleset uses
> # require-order to permit mixing of NAT/RDR and filter rules.
> # Remember to set net.inet.ip.forwarding=1 and/or
> net.inet6.ip6.forwarding=1
> # in /etc/sysctl.conf if packets are to be forwarded between interfaces.
>
> ext_if="em0"
> int_if="em1"
>
> set loginterface $ext_if
> set require-order no
> set skip on lo
> scrub in all
>
> # NAT/filter rules and anchors for ftp-proxy(8)
> #nat-anchor "ftp-proxy/*"
> #rdr-anchor "ftp-proxy/*"
> nat on $ext_if from ($int_if:network) -> ($ext_if)
> #rdr pass on ! egress proto tcp to port ftp -> 127.0.0.1 port 8021
> #anchor "ftp-proxy/*"
> #pass out proto tcp from $proxy to any port ftp
>
> # NAT/filter rules and anchors for relayd(8)
> #rdr-anchor "relayd/*"
> #anchor "relayd/*"
>
> # NAT rules and anchors for spamd(8)
> #table <spamd-white> persist
> #table <nospamd> persist file "/etc/mail/nospamd"
> #no rdr on egress proto tcp from <nospamd> to any port smtp
> #no rdr on egress proto tcp from <spamd-white> to any port smtp
> #rdr pass on egress proto tcp from any to any port smtp -> 127.0.0.1 port
> spamd
>
> #block in
> pass in
> pass out
>
> #pass in on $int_if proto tcp to any port 80
>
> #block in quick from urpf-failed to any # use with care
>
> # By default, do not permit remote connections to X11
> block in on ! lo0 proto tcp from any to any port 6000
>
> antispoof for ext_if
>
> > Hello,
> > Please can you help me with this :
> >
> > I just installed the 4.5 OpenBSD, set up the inet forwarding for
> > unicast and multicase, include the standard NAT rule in pf.conf such
> > as : nat on $ext_if from ($int_if:network) -> ($ext_if)
> > enable pf
> > check with pfctl -s nat that the correct rule is set.
> >
> > That does not work, with tcpdump i see that packets are not
> > forwarded, i see them on int_if but not on ext_if.
> >
> > Can you give me some help to find out where the problem is ?
> >
> > Thanks.
>
>
> Because you dont have a pass rule they get blocked?
> Guessing only goes so far.
>
> Tell us what you want to do.
> Tell us what you tried to get it working.
> Tell us what is in your relevant configs.
>
> Perhaps then someone can tell you what to do.
>
> - Robert

Reply via email to