Sending /tmp/rules.debug may help show the problem.  Sanitize any
personal data before sending (if you don't want your ips shown,etc)


############

# System Aliases
lan = "{ sis0  }"
wan = "{ ng0  }"
pptp = "{ ng1 ng2 ng3 ng4 ng5 ng6 ng7 ng8 ng9 ng10 ng11 ng12 ng13 ng14 }"
pppoe = "{ ng1 ng2 ng3 ng4 ng5 ng6 ng7 ng8 ng9 ng10 ng11 ng12 ng13 ng14 }"
DMZ = "{ sis2 }"
# User Aliases

set loginterface sis1
set loginterface sis0
set loginterface sis2
set optimization normal

scrub on ng0 all max-mss 1452


nat-anchor "pftpx/*"
nat-anchor "natearly/*"
nat-anchor "natrules/*"
nat on ng0 from 192.168.1.0/24 to any port 500  -> (ng0) port 500
nat on ng0 from 192.168.1.0/24 to any  -> (ng0)
#SSH Lockout Table
table <sshlockout> persist


# spam table
table <spamd> persist


# Load balancing anchor - slbd updates
rdr-anchor "slb"
# FTP proxy
rdr-anchor "pftpx/*"
rdr on sis0 proto tcp from any to any port 21 -> 127.0.0.1 port 8021



anchor "firewallrules"

# loopback
anchor "loopback"
pass in quick on lo0 all label "pass loopback"
pass out quick on lo0 all label "pass loopback"

# package manager early specific hook
anchor "packageearly"


# carp
anchor "carp"

# enable ftp-proxy
anchor "ftpproxy"
anchor "pftpx/*"
pass in quick on ng0 inet proto tcp from port 20 to (ng0) port > 49000 user proxy flags S/SA keep state label "FTP PROXY: PASV mode data connection"

# allow access to DHCP server on LAN
anchor "dhcpserverlan"
pass in quick on sis0 proto udp from any port = 68 to 255.255.255.255 port = 67 label "allow access to DHCP server on LAN" pass in quick on sis0 proto udp from any port = 68 to 192.168.1.1 port = 67 label "allow access to DHCP server on LAN" pass out quick on sis0 proto udp from 192.168.1.1 port = 67 to any port = 68 label "allow access to DHCP server on LAN"

# WAN spoof check
anchor "wanspoof"
block in log quick on ng0 from 192.168.1.0/24 to any label "WAN spoof check"

# allow our DHCP client out to the WAN
# XXX - should be more restrictive
# (not possible at the moment - need 'me' like in ipfw)
anchor "wandhcp"
pass out quick on ng0 proto udp from any port = 68 to any port = 67 label "allow dhcp client out wan" block in log quick on ng0 proto udp from any port = 67 to 192.168.1.0/24 port = 68 label "allow dhcp client out wan" pass in quick on ng0 proto udp from any port = 67 to any port = 68 label "allow dhcp client out wan"

# LAN/OPT spoof check (needs to be after DHCP because of broadcast addresses)
antispoof for sis0


# block anything from private networks on WAN interface
anchor "spoofing"
block in log quick on ng0 from 10.0.0.0/8 to any label "block private networks from wan block 10/8" block in log quick on ng0 from 127.0.0.0/8 to any label "block private networks from wan block 127/8" block in log quick on ng0 from 172.16.0.0/12 to any label "block private networks from wan block 172.16/12" block in log quick on ng0 from 192.168.0.0/16 to any label "block private networks from wan block 192.168/16"
# Support for allow limiting of TCP connections by establishment rate
anchor "limitingesr"
table <virusprot>

# block bogon networks
# http://www.cymru.com/Documents/bogon-bn-nonagg.txt
anchor "wanbogons"
table <bogons> persist file "/etc/bogons"
block in log quick on ng0 from <bogons> to any label "block bogon networks from wan"

# let out anything from the firewall host itself and decrypted IPsec traffic
# pass out quick on ng0 all keep state label "let out anything from firewall host itself"
# pass traffic from firewall -> out
anchor "firewallout"
pass out quick on ng0 all keep state label "let out anything from firewall host itself" pass out quick on sis0 all keep state label "let out anything from firewall host itself" pass out quick on ng0 all keep state label "let out anything from firewall host itself pptp" pass out quick on ng0 all keep state label "let out anything from firewall host itself pppoe"

# make sure the user cannot lock himself out of the webGUI or SSH
anchor "anti-lockout"
pass in quick from 192.168.1.0/24 to 192.168.1.1 keep state label "anti-lockout web rule"

# SSH lockout
block in log proto tcp from <sshlockout> to any port 22 label "sshlockout"


# User-defined rules follow
pass in quick on $lan from 192.168.1.0/24 to any keep state label "USER_RULE: Default LAN -> any"

# VPN Rules

#---------------------------------------------------------------------------
# default rules (just to be sure)
#---------------------------------------------------------------------------
block in log quick all label "Default block all just to be sure."
block out log quick all label "Default block all just to be sure."

############


----- Original Message ----- From: "Scott Ullrich" <[EMAIL PROTECTED]>
To: <support@pfsense.com>
Sent: Wednesday, October 26, 2005 2:00 PM
Subject: Re: [pfSense Support] Traffic Shaping, killing my DSL link speed to less than 100k


Sending /tmp/rules.debug may help show the problem.  Sanitize any
personal data before sending (if you don't want your ips shown,etc)



---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to