Create a netgraph bridge for jails getting full access to NAT.
This commit is contained in:
@@ -1,5 +1,6 @@
|
||||
ext_if = "{ igb0 igb1 ix0 ix1 wlan0 }"
|
||||
jail_net_v4 = "10.193.223.0/24"
|
||||
full_nat_v4 = "10.213.177.0/24"
|
||||
|
||||
dhcp = "{ bootpc, bootps }"
|
||||
# allow = "{ host_uplink0 }"
|
||||
@@ -14,8 +15,10 @@ set skip on lo
|
||||
|
||||
# redirections
|
||||
nat on $ext_if inet from $jail_net_v4 to { any, !$jail_net_v4 } tag ALLOWED -> (wlan0)
|
||||
nat on $ext_if inet from $full_nat_v4 to { any, !$full_nat_v4 } tag ALLOWED -> (wlan0)
|
||||
|
||||
rdr on host_uplink0 inet proto {tcp, udp} from any to 10.193.223.1 port 53 tag ALLOWED -> 1.1.1.1 port 53
|
||||
rdr on host_uplink1 inet proto {tcp, udp} from any to 10.213.177.1 port 53 tag ALLOWED -> 1.1.1.1 port 53
|
||||
|
||||
# filtering
|
||||
block log all
|
||||
@@ -38,3 +41,4 @@ pass in on $ext_if proto udp to any port $udp_pass_in
|
||||
pass quick on $ext_if proto udp from any port $dhcp to any port $dhcp
|
||||
|
||||
pass in on host_uplink0 proto udp from any to any port { 53 51820 }
|
||||
pass in on host_uplink1
|
||||
|
||||
Reference in New Issue
Block a user