summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorHenning Brauer <henning@cvs.openbsd.org>2002-06-17 08:07:59 +0000
committerHenning Brauer <henning@cvs.openbsd.org>2002-06-17 08:07:59 +0000
commit5d681d40220f58cbcd19bf1e99767d7262243003 (patch)
treedc7df3b2d4bd896bf502b3f47f41adf03c2ff8e8
parent6ec82f85aac7740de7204cf0a8657458249c7b9f (diff)
merge nat.conf here as well
add more simple filter rule examples "commit it" deraadt@
-rw-r--r--etc/pf.conf29
1 files changed, 27 insertions, 2 deletions
diff --git a/etc/pf.conf b/etc/pf.conf
index 2982cb5230c..c2ee2416a77 100644
--- a/etc/pf.conf
+++ b/etc/pf.conf
@@ -1,7 +1,32 @@
-# $OpenBSD: pf.conf,v 1.3 2001/11/16 22:53:24 dhartmei Exp $
+# $OpenBSD: pf.conf,v 1.4 2002/06/17 08:07:58 henning Exp $
#
# See pf.conf(5) for syntax and examples
+#
+# replace ext0 with external interface name, 10.0.0.0/8 with internal network
+# and 192.168.1.1 with external address
+#
+# nat: packets going out through ext0 with source address 10.0.0.0/8 will get
+# translated as coming from 192.168.1.1. a state is created for such packets,
+# and incoming packets will be redirected to the internal address.
+
+# nat on ext0 from 10.0.0.0/8 to any -> 192.168.1.1
+
+# rdr: packets coming in through ext0 with destination 192.168.1.1:1234 will
+# be redirected to 10.1.1.1:5678. a state is created for such packets, and
+# outgoing packets will be translated as coming from the external address.
-# pass all packets in and out (these are the implicit first two rules)
+# rdr on ext0 proto tcp from any to 192.168.1.1/32 port 1234 -> 10.1.1.1 port 5678
+
+# filter rules
+# the implicit first two rules are
# pass in all
# pass out all
+
+# block all incoming packets but allow ssh, pass all outgoing tcp and udp
+# connections and keep state
+# log blocked pakets
+
+# block in log all
+# pass in on ext0 proto tcp from any to ext0 port 22 keep state
+# pass out on ext0 proto { tcp, udp } all keep state
+