Hi Claudio,

This makes sense in terms of protecting the firewall hosts and is useful:

> If not I would normally use something like:
> set block-policy drop
> 
> pass no state
> block all to <self>
> pass in proto tcp from <allowed> to <self> port { bgp ssh }
> # more rules using to <self> here
> # locally initiated connections should establish state
> pass out ! received-on any

..however you don't explain how you would do VLANs behind these hosts.

With ICMP, it can be allowed, so I can use `no state`. However, with TCP/UDP, 
then some state tracking is required to allow replies. This is what i'm 
struggling with, the best way to achieve that.


> pfsync(4) is at best eventually consistant and it is not fast enough to
> handle asymetric routing. Sure there is the option to defer packets until
> after a state has been synced but that is a bandaid introducing additional
> delays in all connections.

Yes... this is something i'm now starting to hit.

When I first set up pfsync, it all seemed fine. I am using defer and there was 
a pause while it created/sync'd the state and it seemed to work as intended.

However, now I am seeing things like the first few packets missing on some 
pings etc, which is not ideal.

Thanks,

Ian

Reply via email to