the "teach a man to fish" response here is:  change your 'block all'
line to 'block log all' and then 'tcpdump -n -e -ttt -i pflog0' and see
what's getting blocked.

the "give a man a fish" response would involve something along the lines
of (possibly amongst other things):

  pass in on $sec_if from $wi_net tag WI_INET keep state

as an unrelated tip, you could also exploit the super-handy
'$if:network' syntax to avoid creating macros for your networks...

HTH...

-j

On Fri, 2004-07-02 at 22:15, RZR wrote:
> Following the directions from 
> http://openbsd.sfobug.org/faq/pf/tagging.html, plus a little tweaking to 
> include access for ipsec laptops on $wi_if (isakmpd on firewall), I came 
> up with this.
> However, ALL access becomes blocked; namely
> -access from the firewall out
> -access to the firewall from the ipsec laptops
> -access to DMZ boxes from the ipsec laptops.
> 
> I know I'm missing something (hopefully small).
> 
> Any help would be much appreciated.
> -RZR
> 
> pf.conf ->
> # macros
> int_if = "fxp0"
> wi_if = "fxp1"
> dmz_if = "sk0"
> sec_if = "enc0"
> ext_if = "tun0"
> int_net = "192.168.1.0/24"
> wi_net = "192.168.2.0/24"
> dmz_net = "172.16.1.0/24"
> www_server = "172.16.1.2"
> mail_server = "172.16.1.3"
> 
> table <spamd> persist file "/etc/spammers"
> set loginterface $ext_if
> 
> ### AltQueue
> altq on $ext_if priq bandwidth 100Kb queue { q_pri, q_def }
> queue q_pri priority 7
> queue q_def priority 1 priq(default)
> 
> ##################################################################
> # classification -- classify packets based on the defined firewall
> # policy.
> #rdr on $ext_if proto tcp from <spamd> to port smtp \
> #       tag SPAMD -> 127.0.0.1 port 8025
> rdr on $int_if proto tcp from any to any port 21 -> 127.0.0.1 port 8021
> rdr on $sec_if proto tcp from any to any port 21 -> 127.0.0.1 port 8021
> #rdr on $DMZ_if proto tcp from any to any port 21 -> 127.0.0.1 port 8021
> rdr on $ext_if proto tcp from any to $ext_if port 22 \
>          -> $mail_server port 22
> rdr on $ext_if proto tcp from any to $ext_if port 25 \
>          -> $mail_server port 25
> rdr on $ext_if proto tcp from any to $ext_if port 80 \
>          -> $www_server port 80
> rdr on $ext_if proto tcp from any to $ext_if port 443 \
>          -> $www_server port 443
> nat on $ext_if inet from ! ($ext_if) to any -> ($ext_if)
> 
> block all
> pass in on $int_if from $int_net tag LAN_INET keep state
> pass in on $wi_if from $wi_net tag WI_INET keep state
> pass in on $int_if from $int_net to $dmz_net tag LAN_DMZ keep state
> pass in on $wi_if from $wi_net to $dmz_net tag WI_DMZ keep state
> pass in on $ext_if proto tcp to $www_server port {www, https} \
>          tag INET_DMZ keep state
> pass in on $ext_if proto tcp to $mail_server port {ssh, smtp} \
>          tag INET_DMZ keep state
> 
> ########################################################################
> # policy enforcement -- pass/block based on the defined firewall policy.
> pass in  quick on $ext_if tagged SPAMD keep state
> pass out quick on $ext_if tagged LAN_INET keep state queue(q_def, q_pri)
> pass out quick on $ext_if tagged WI_INET keep state queue(q_def, q_pri)
> pass out quick on $dmz_if tagged LAN_DMZ keep state
> pass out quick on $dmz_if tagged WI_DMZ keep state
> pass out quick on $dmz_if tagged INET_DMZ synproxy state queue(q_def, 
> q_pri) label "$dstaddr:$dstport" queue(q_def, q_pri)
> ############################################################################

-- 
Jason Opperisano <[EMAIL PROTECTED]>

Reply via email to