either:

pass in log (all) on $int_if inet proto udp from $admin_pc to !$int_if \
 port 33433 >< 33626 keep state tag mytracert

pass out log on $ext_if inet proto udp from $ext_if to any \
 port 33433 >< 33626 keep state tagged mytracert

or:

pass in log (all) on $int_if inet proto udp from $admin_pc to !$int_if \
 port 33433 >< 33626 keep state

pass out log on $ext_if inet proto udp from $ext_if to any \
 port 33433 >< 33626 keep state tagged mytracert received-on $int_if

there are some other ways too, but i like these the most.

dlg

On 20/01/2011, at 6:17 PM, Indunil Jayasooriya wrote:

> Hi list,
> 
> 
> I have an question. I want my pc (i.e admin_pc)  to be able to traceroute
> which is behind a OpenBSD 4.8 pf firewall ( Doing NAT). So , I have added
> below rules in pf.conf file.
> 
> 
> match out on $ext_if from $lan_net nat-to ($ext_if)
> 
> pass in log (all) on $int_if inet proto udp from $admin_pc to !$int_if \
>  port 33433 >< 33626 keep state
> 
> pass out log on $ext_if inet proto udp from $ext_if to any \
>  port 33433 >< 33626 keep state
> 
> 
> due to the above rules, my PC can traceroute. It works fine. *But*, in
> addition to that, Firewall also can traceroute because of the above *pass
> out* rule. I *do NOT* want firewall to be able to traceroute.
> 
> my question is that How can I exclude my firewall from being able to doing
> it ?
> 
> 
> 
> 
> 
> 
> 
> -- 
> Thank you
> Indunil Jayasooriya

Reply via email to