routing

Miroslav Lachman 000.fbsd at quip.cz
Wed Apr 23 10:45:00 UTC 2008


Nicolas de Bari Embriz Garcia Rojas wrote:
> Thanks, I tried to base my rules on your but still do not have luck.
> 
> I do not know if maybe is because of the IPSEC vpn, also what i would  
> like to do i to access the the end vpn poing from the jails but still  
> havent made that or know how to doit.

I know nothing about IPSec VPN, so I can't help you any further.
You can add keyword "log" in to your block rules in pf.conf, start pflog 
(pflog_enable="YES" in rc.conf and /etc/rc.d/pflog start) and then watch 
with tcpdump which rule blocks your needed traffic and what next should 
be allowed / redirected.
http://www.openbsd.org/faq/pf/logging.html

Or you can ask some network / PF guru in freebsd-pf@ mailinglist.

> On Apr 22, 2008, at 4:09 PM, Miroslav Lachman wrote:
> 
>> Nicolas de Bari Embriz Garcia Rojas wrote:
>>
>>> I have a ipsec/vpn on FreeBSD 6.3 from one master server to  another  
>>> server the one has multiple jails. each jail has is own  public IP 
>>> and  i need to do something like this:
>>> vpn point >----------------------< master server with jails <------- 
>>> >  jail (75.76.78.80)
>>> 64.68.69.79/10.10.10.1         75.76.78.79/10.10.10.2
>>> when doing a telnet to 10.10.10.2 80  from 10.10.10.1 I want that  
>>> the  jail with ip 75.76.78.80 to respond, and also from jail  
>>> 75.76.78.80  been available to telnet the other vpn point 10.10.10.1.
>>> I am trying to route trafic using PF but is not working for  the  
>>> tunel  only for the non encrypted trafic, example:
>>> rdr on em1 proto tcp from any to any port 80 -> 75.76.78.80
>>> but if i use the gif0 interface (the one for the tunnel) insted of  
>>> em1  does not work.
>>
>>
>> I am using slightly different setup. I have lo1 with IPs  
>> 172.16.1.0/24 for jails and public IPs are RDR / NATed from public  
>> interface to local (jails).
>> I have one jail, where I need to connect throught OpenVPN on tap0 to  
>> the MSSQL database server and from the other and (MS Windows Server)  
>> allow connection in to jailed MySQL database server. Apache from  this 
>> jail is publicly accessible on ports 80 and 443.
>>
>> jail_addr_0="172.16.1.2"
>> jail_tcp_0_inports="{ 80, 443 }"
>> vpn_dtc_if="tap0"
>> vpn_dtc_addr_local="10.0.0.29"
>> vpn_dtc_addr_remote="10.0.0.10"
>> vpn_dtc_inports="{ 3306 }"    # let incoming to local mysql
>>
>> # outgoing connections
>> nat on $ext_if from $jail_addr_0 to !$jail_addr_0 -> $ext_addr_3
>> nat pass on $vpn_dtc_if from $jail_addr_0 to $vpn_dtc_addr_remote ->  
>> $vpn_dtc_addr_local
>> # incomming connections
>> rdr on $ext_if proto tcp from any to $ext_addr_3 -> $jail_addr_0
>> rdr pass on $vpn_dtc_if inet proto tcp from any to  
>> $vpn_dtc_addr_local port $vpn_dtc_inports -> $jail_addr_0
>>
>> Miroslav Lachman
> 
> 
> -- 
>  > nbari



More information about the freebsd-jail mailing list