Miroslav Lachman 000.fbsd at
Wed Apr 23 10:45:00 UTC 2008

Nicolas de Bari Embriz Garcia Rojas wrote:
> Thanks, I tried to base my rules on your but still do not have luck.
> I do not know if maybe is because of the IPSEC vpn, also what i would  
> like to do i to access the the end vpn poing from the jails but still  
> havent made that or know how to doit.

I know nothing about IPSec VPN, so I can't help you any further.
You can add keyword "log" in to your block rules in pf.conf, start pflog 
(pflog_enable="YES" in rc.conf and /etc/rc.d/pflog start) and then watch 
with tcpdump which rule blocks your needed traffic and what next should 
be allowed / redirected.

Or you can ask some network / PF guru in freebsd-pf@ mailinglist.

> On Apr 22, 2008, at 4:09 PM, Miroslav Lachman wrote:
>> Nicolas de Bari Embriz Garcia Rojas wrote:
>>> I have a ipsec/vpn on FreeBSD 6.3 from one master server to  another  
>>> server the one has multiple jails. each jail has is own  public IP 
>>> and  i need to do something like this:
>>> vpn point >----------------------< master server with jails <------- 
>>> >  jail (
>>> when doing a telnet to 80  from I want that  
>>> the  jail with ip to respond, and also from jail  
>>>  been available to telnet the other vpn point
>>> I am trying to route trafic using PF but is not working for  the  
>>> tunel  only for the non encrypted trafic, example:
>>> rdr on em1 proto tcp from any to any port 80 ->
>>> but if i use the gif0 interface (the one for the tunnel) insted of  
>>> em1  does not work.
>> I am using slightly different setup. I have lo1 with IPs  
>> for jails and public IPs are RDR / NATed from public  
>> interface to local (jails).
>> I have one jail, where I need to connect throught OpenVPN on tap0 to  
>> the MSSQL database server and from the other and (MS Windows Server)  
>> allow connection in to jailed MySQL database server. Apache from  this 
>> jail is publicly accessible on ports 80 and 443.
>> jail_addr_0=""
>> jail_tcp_0_inports="{ 80, 443 }"
>> vpn_dtc_if="tap0"
>> vpn_dtc_addr_local=""
>> vpn_dtc_addr_remote=""
>> vpn_dtc_inports="{ 3306 }"    # let incoming to local mysql
>> # outgoing connections
>> nat on $ext_if from $jail_addr_0 to !$jail_addr_0 -> $ext_addr_3
>> nat pass on $vpn_dtc_if from $jail_addr_0 to $vpn_dtc_addr_remote ->  
>> $vpn_dtc_addr_local
>> # incomming connections
>> rdr on $ext_if proto tcp from any to $ext_addr_3 -> $jail_addr_0
>> rdr pass on $vpn_dtc_if inet proto tcp from any to  
>> $vpn_dtc_addr_local port $vpn_dtc_inports -> $jail_addr_0
>> Miroslav Lachman
> -- 
>  > nbari

More information about the freebsd-jail mailing list