ipfw - accessing DMZ from LAN , pipes
Marek Salwerowicz
marek_sal at wp.pl
Tue Nov 29 00:34:32 UTC 2011
W dniu 2011-11-28 23:49, Freddie Cash pisze:
> This is something I've never really received a satisfactory answer to. I
> believe you have to put your pipe/queue rules in place of your final allow
> rules. IOW, the pipe/queue rules are the final rule that a packet touches
> in the ruleset.
>
> For example, for outgoing HTTP traffic, you would allow the packet coming
> in on the internal interface. Then you NAT the packet as it goes out the
> external interface. And, finally, you send the NAT'd packet to the
> pipe/queue, instead of allowing the NAT'd packet out the external interface.
Yes! You're right ;) Thanks for suggesting me that
I've made like this:
$cmd add 4006 pipe 1 ip from $DMZHOST1PUB to any out xmit $PUBLICIF
#$cmd add 4010 allow ip from $DMZHOST1PUB to any out xmit $PUBLICIF
#commented - used pipe above
$cmd add 4016 pipe 2 ip from any to $DMZHOST1 in recv $PUBLICIF
#$cmd add 4020 allow ip from any to $DMZHOST1 in recv $PUBLICIF
#commented - used pipe above
And it worked ;)
And at the beginnig of Firewall I put the configs:
#pipe for DMZ hosts - pipe 1 upload limit
$cmd pipe 1 config bw 200Kbit/s
#pipe for DMZ hosts = pipe 2 download limit
$cmd pipe 2 config bw 1536Kbit/s
>
> All of the examples in the man page, handbook, and online show the 'add
> pipe' rules first, then the 'pipe config' rules. But that seems backward to
> me. So I always do my 'pipe config' rules first. Afterlife, how do you send
> a packet to a pipe that doesn't exist yet? :)
>
;) it makes sense to config at first and then attach traffic to pipe -
for me it works
regards,
--
Marek Salwerowicz
More information about the freebsd-net
mailing list