Hi all,

I have 2 OpenBSD firewalls protecting my LAN from 2 internet connections

1) a cable modem connection for which the Internet IP address is
obtained by "dhcp"

2) a DSL connection with a Static IP assigned to the $ext_if of the
second firewall

Now I am trying to firewall these two Internet connections with one computer.

So my new firewall has 3 interfaces.

1) $int_if - Internal Interface connected to the LAN 

2) $ext_ifcm - External Interface connected to the Cable Modem.

3) $ext_ifdsl - External Interface connected to the DSL router.

I have a table called <dslusers> which contains the IP address of the
hosts that are permitted to use the DSL connection to connect to the
internet. All other hosts should use the cable modem connection.

So I let the dhcp connection configure the default gateway and the
Gateway for the DSL connection is provided in the filter rule using
"route-to"

Presently I use the rule

pass in log-all on $int_if route-to $ext_ifdsl:xxx.xxx.xxx.xxx ptoto
tcp from <dslusers> to any keep state

I got a syntax error from pfctl when I used the rule for a specific
port number as shown below.

pass in log-all on $int_if route-to $ext_ifdsl:xxx.xxx.xxx.xxx ptoto
tcp from <dslusers> to any port ssh keep state

May I know whether it is possible to configure "route-to" in such a
way that only traffic comming into "ssh" port of $int_if from
<dslusers> will be routed to the DSL Interface "$ext_ifdsl" and all
other traffic comming from the <dslusers> to the $int_if  will use the
cable connection through the $ext_ifcm.

Since the gateway of the cable modem is got by "dhcp" I hope all the
other traffic will default to the $ext_ifcm and I DO NOT have to
introduce "route-to $ext_ifcm" in the filtering rules for Internal
interface??? am I right ????


If there is no such option in "route-to" could some one please point
out a method to accomplish this?? a work around or something???

Thankyou so much

Kind Regards

Siju

Reply via email to