There are no rules on this box (except the default
allow LAN > ANY)

$ cat /tmp/rules.debug
# System Aliases 
loopback = "{ lo0 }"
lan = "{ le0  }"
wan = "{ le1  }"
enc0 = "{ enc0 }"
# User Aliases 
NetBIOS = "{ 137 138 139 445 }"
OpenDNS = "{ 208.67.222.222 208.67.220.220 }"
set loginterface le1
set loginterface le0
set optimization aggressive

scrub all random-id  fragment reassemble
nat-anchor "pftpx/*"
nat-anchor "natearly/*"
nat-anchor "natrules/*"
# FTP proxy
rdr-anchor "pftpx/*"

# Outbound NAT rules
nat on $wan from 192.168.2.0/24 port 500 to any
port 500 -> (le1)
port 500
nat on $wan from 192.168.2.0/24 port 5060 to any
port 5060 -> (le1)
port 5060
nat on $wan from 192.168.2.0/24 to any -> (le1)
nat on $wan from 10.2.2.0/24 port 500 to any port
500 -> (le1) port
500
nat on $wan from 10.2.2.0/24 port 5060 to any port
5060 -> (le1) port
5060
nat on $wan from 10.2.2.0/24 to any -> (le1)
nat on $wan from 192.168.10.0/26 port 500 to any
port 500 -> (le1)
port 500
nat on $wan from 192.168.10.0/26 port 5060 to any
port 5060 -> (le1)
port 5060
nat on $wan from 192.168.10.0/26 to any -> (le1)
nat on $wan from 192.168.1.0/24 port 500 to any
port 500 -> (le1)
port 500
nat on $wan from 192.168.1.0/24 port 5060 to any
port 5060 -> (le1)
port 5060
nat on $wan from 192.168.1.0/24 to any -> (le1)

#SSH Lockout Table
table  persist
# Load balancing anchor - slbd updates
rdr-anchor "slb"

# FTP Proxy/helper
table  {   }

# IMSpector rdr anchor
rdr-anchor "imspector"
# UPnPd rdr anchor
rdr-anchor "miniupnpd"
anchor "ftpsesame/*" 
anchor "firewallrules"

# We use the mighty pf, we cannot be fooled.
block quick proto { tcp, udp } from any port = 0
to any
block quick proto { tcp, udp } from any to any
port = 0

# snort2c
table  persist
block quick from  to any label "Block snort2c
hosts"
block quick from any to  label "Block snort2c
hosts"

# loopback
anchor "loopback"
pass in quick on $loopback all label "pass
loopback"
pass out quick on $loopback all label "pass
loopback"

# package manager early specific hook
anchor "packageearly"
# carp
anchor "carp"

# permit wan interface to ping out (ping_hosts.sh)
pass quick proto icmp from x.x.x.132 to any keep
state

# NAT Reflection rules

# allow access to DHCP server on LAN
anchor "dhcpserverlan"
pass in quick on $lan proto udp from any port = 68
to 255.255.255.255
port = 67 label "allow access to DHCP server on
LAN"
pass in quick on $lan proto udp from any port = 68
to 192.168.2.2
port = 67 label "allow access to DHCP server on
LAN"
pass out quick on $lan proto udp from 192.168.2.2
port = 67 to any
port = 68 label "allow access to DHCP server on
LAN"
block in log quick on $wan proto udp from any port
= 67 to
192.168.2.0/24 port = 68 label "block dhcp client
out wan"

# LAN/OPT spoof check (needs to be after DHCP
because of broadcast
addresses)
antispoof for le0

anchor "spoofing"

# block anything from private networks on WAN
interface
anchor "spoofing"
antispoof for $wan
block in log quick on $wan from 10.0.0.0/8 to any
label "block
private networks from wan block 10/8"
block in log quick on $wan from 127.0.0.0/8 to any
label "block
private networks from wan block 127/8"
block in log quick on $wan from 172.16.0.0/12 to
any label "block
private networks from wan block 172.16/12"
block in log quick on $wan from 192.168.0.0/16 to
any label "block
private networks from wan block 192.168/16"
# Support for allow limiting of TCP connections by
establishment rate
anchor "limitingesr"
table 
block in quick from  to any label "virusprot
overload table"

# block bogon networks
#
http://www.cymru.com/Documents/bogon-bn-nonagg.txt
anchor "wanbogons"
table  persist file "/etc/bogons"
block in log quick on $wan from  to any label
"block bogon networks
from wan"

# let out anything from the firewall host itself
and decrypted IPsec
traffic
pass out quick on $lan proto icmp keep state label
"let out anything
from firewall host itself"
pass out quick on $wan proto icmp keep state label
"let out anything
from firewall host itself"

# tcp.closed 5 is a workaround for load balancing,
squid and a few
other issues.
# ticket (FEN-857512) in centipede tracker.
pass out quick on le1 all keep state ( tcp.closed
5 ) label "let out
anything from firewall host itself"
# pass traffic from firewall -> out
anchor "firewallout"
pass out quick on le1 all keep state label "let
out anything from
firewall host itself"
pass out quick on le0 all keep state label "let
out anything from
firewall host itself"
pass out quick on $enc0 keep state label "IPSEC
internal host to
host"
# make sure the user cannot lock himself out of
the webGUI or SSH
anchor "anti-lockout"
pass in quick on le0 from any to 192.168.22.2 keep
state label
"anti-lockout web rule"

# SSH lockout
block in log quick proto tcp from  to any port 22
label "sshlockout"

anchor "ftpproxy"
anchor "pftpx/*"

# User-defined aliases follow

# User-defined rules follow
pass in quick on $lan from 192.168.2.0/24 to any
keep state  label
"USER_RULE: Default LAN -> any"

# VPN Rules

pass in quick on le0 inet proto tcp from any to
$loopback port 8021
keep state label "FTP PROXY: Allow traffic to
localhost"
pass in quick on le0 inet proto tcp from any to
$loopback port 21
keep state label "FTP PROXY: Allow traffic to
localhost"
pass in quick on le1 inet proto tcp from port 20
to (le1) port >
49000 flags S/SA keep state label "FTP PROXY: PASV
mode data
connection"
# enable ftp-proxy

# IMSpector
anchor "imspector"

# uPnPd
anchor "miniupnpd"

#---------------------------------------------------------------------------
# default deny rules
#---------------------------------------------------------------------------
block in log quick all label "Default deny rule"
block out log quick all label "Default deny rule"
--
David L. Strout
Engineering Systems Plus, LLC
----- Original Message -----
SUBJECT: Re: [pfSense Support] Reflective routing
broken in newest
1.2.1-RC2 SNAP
FROM:[EMAIL PROTECTED]
TO:[EMAIL PROTECTED]
DATE: 11-27-2008 11:22 am
On Thu, Nov 27, 2008 at 10:55 AM, DLStrout  wrote:
> I just updated our 1.2.1-RC2 to the newest SNAP:
>
> 1.2.1-RC2
> built on Thu Nov 27 13:35:44 EST 2008
>
> I had been having issues w/ reflective routing
in
> past 1.2.1 SNAPs but it got resolved back a
couple
> weeks ago with a new SNAP.
>
> After this morning update I see that it is
broken
> again.  I preform the same battery of testing on
> all 1.2.1-RC?
>

It's not the same cause then, the rules are
generated correctly in
RC2. Post your entire ruleset.

---------------------------------------------------------------------
To unsubscribe, e-mail:
[EMAIL PROTECTED]
For additional commands, e-mail:
[EMAIL PROTECTED]

Commercial support available -
https://portal.pfsense.org


Reply via email to