On Thu, Jan 20, 2011 at 2:57 PM, Ryan McBride <[email protected]> wrote:

> On Thu, Jan 20, 2011 at 01:47:20PM +0530, Indunil Jayasooriya wrote:
> > my question is that How can I exclude my firewall from being able to
> doing
> > it ?
>
> I'm really not sure why you don't want the firewall to be able to
> traceroute. (hint: if you can't trust the users on your firewall to
> behave responsibly with basic troubleshooting tools, you're Doing It
> Wrong (tm)).


 I thought in this way. If I want to traceroute only from my PC, Why should
I open it from firewall?
That's why I asked such question.

I would like to give another example.... suppose, My PC behind the firewall
only wants to access a port outside. Let's say tcp port 10000 ( webmin runs
on ), then, from my PC I can do administration since it is web based... So I
think that firewall does NOT need access to it since I am Not going to
access it from my firewall. In this way, I selectively wanted to filter
traffics.

 so,  I achieved it. I realized how to do it as well. I gained the knowledge
due to your below rules. Thanks a LOT. This list is also very useful. Thanks
once again.

>
>    match out on $ext_if from $lan_net nat-to ($ext_if)
>
>    pass in log (all) on $int_if inet proto udp from $admin_pc to !$int_if \
>         port 33433 >< 33626 tag ADMIN
>
>    pass out log on $ext_if inet proto udp from $ext_if to any \
>        port 33433 >< 33626 tagged ADMIN
>
> Tested. worked.

>
> Note I've removed the 'keep state', it's not necessary to specify that
> anymore.
>

yes, I know. Thanks a lot for the extra effort you performed. I appreciate a
lot.

Reply via email to