diff options
author | Ian Darwin <ian@cvs.openbsd.org> | 2002-11-16 12:55:23 +0000 |
---|---|---|
committer | Ian Darwin <ian@cvs.openbsd.org> | 2002-11-16 12:55:23 +0000 |
commit | 7e7607b0d62b7e9618af616a7ffd11c8ad50231c (patch) | |
tree | b90e6ef510a1df59b900dd58a6dfcdb533a192bc /etc | |
parent | fb10843cb7781dd2874b20970e2ff485359f06fa (diff) |
Use macros in sample file, ok dhartmei@
Diffstat (limited to 'etc')
-rw-r--r-- | etc/pf.conf | 26 |
1 files changed, 14 insertions, 12 deletions
diff --git a/etc/pf.conf b/etc/pf.conf index f0e9883f1db..3d90c3d31c3 100644 --- a/etc/pf.conf +++ b/etc/pf.conf @@ -1,25 +1,27 @@ -# $OpenBSD: pf.conf,v 1.6 2002/06/27 07:00:43 fgsch Exp $ +# $OpenBSD: pf.conf,v 1.7 2002/11/16 12:55:22 ian Exp $ # # See pf.conf(5) for syntax and examples +# General order: options, scrub rules, NAT/rdr, and filter rules. +# Note that NAT is first match while packet filters are last match, # -# replace ext0 with external interface name, 10.0.0.0/8 with internal network -# and 192.168.1.1 with external address +ext_if=ext0 # replace with actual external interface name i.e., dc0 +internal_net=10.1.1.1/8 +external_addr=192.168.1.1 # Normalize: reassemble fragments and resolve or reduce traffic ambiguities - # scrub in all -# nat: packets going out through ext0 with source address 10.0.0.0/8 will get -# translated as coming from 192.168.1.1. a state is created for such packets, +# nat: packets going out through $ext_if with source address $internal_net will get +# translated as coming from $external_addr, a state is created for such packets, # and incoming packets will be redirected to the internal address. -# nat on ext0 from 10.0.0.0/8 to any -> 192.168.1.1 +# nat on $ext_if from $internal_net to any -> $external_addr -# rdr: packets coming in through ext0 with destination 192.168.1.1:1234 will -# be redirected to 10.1.1.1:5678. a state is created for such packets, and +# rdr: packets coming in on $ext_if with destination $external_addr:1234 will +# be redirected to 10.1.1.1:5678. A state is created for such packets, and # outgoing packets will be translated as coming from the external address. -# rdr on ext0 proto tcp from any to 192.168.1.1/32 port 1234 -> 10.1.1.1 port 5678 +# rdr on $ext_if proto tcp from any to $external_addr/32 port 1234 -> 10.1.1.1 port 5678 # filter rules # the implicit first two rules are @@ -31,5 +33,5 @@ # log blocked packets # block in log all -# pass in on ext0 proto tcp from any to ext0 port 22 keep state -# pass out on ext0 proto { tcp, udp } all keep state +# pass in on $ext_if proto tcp from any to $ext_if port 22 keep state +# pass out on $ext_if proto { tcp, udp } all keep state |