Mor_gath
December 3rd, 2002, 12:25
this is not really a bsd problem more of a Winxp problem, but I have yet to find an answer to the problem so I thought I would aks here.
I have an Obsd 3.1 NAT server and a 3 nodes behind it, the linux box (which I'm typing on now) works great but the Xp boxes every now and then refuse to ping the Obsd box but can ping other nodes on the network.
I have searched on Google and only thing I could find was something about how XP makes it's rpc calls after updating to service pack1.
1Xp box is sharing an printer so when 2Xp box is started 1Xp will have problem's reaching the net and vice versa.
it's fairly annoying not to be able to reach the net, and my parents arn't to happy sitting on a linux box.
1Xp will have problem reaching the net also if 2Xp is not online, but sometimes if I leave it on for an X ammount of time it will get axx to the net i'm not really a network guy som I'm fairly lost to what to do.
I did check in to disabling rpc service in Xp but almost every service depended on it, so I would have to disable almost every network service Xp has to be able to disable rpc.
nat.conf
[code:1:94f5327336]
wan="dc1"
nat on $wan from 192.168.1.0/24 to any -> $wan
[/code:1:94f5327336]
pf.conf
[code:1:94f5327336]
#last edit 2002-11-29 friday
#to view pflog
#tcpdump -n -e -ttt -r /var/pflog
#to tail pflog
#tcpdump -n -e -ttt -i pflog0
#set up some variabels
ext="dc1"
int="dc0"
protected=" { 192.168.1.2, 192.168.1.3, 192.168.1.4 } "
me=" { 192.168.1.2, 192.168.1.3 } "
windows="192.168.1.2"
linux="192.168.1.3"
st="keep state"
flagrule="flags S/SA"
#if no route exsist we will block right away
block in quick from no-route to any
#default policy so if nothing matches it will be blocked
#block rules
block out on $ext all
block in on $ext all
block out on $ext proto tcp all
block in on $ext proto tcp all
block in on $ext proto udp all
block out on $ext proto udp all
block in quick on $ext proto tcp from any port 22 to $ext port 22
#antispoofing
block in quick on $ext from 127.0.0.1/8 to any
block out quick on $ext from any to 127.0.0.1/8
#dns dhcp
pass in quick on $ext proto { tcp, udp } from 195.54.121.228 to $protected port { 53 }
pass in quick on $ext proto { tcp, udp } from 195.54.122.193 to $protected port { 53 }
pass in quick on $ext proto { tcp, udp } from 195.54.112.136 to $ext port { 52<>56 }
# ICMP let me ping internely
pass out on $int inet proto icmp all $st
pass in on $int inet proto icmp all $st
# UDP
pass out log on $ext proto udp all $flagrule $st
# TCP outbound traffic must always be allowed otherwise we can't have a default policy.
pass out log on $ext proto tcp all $st
# WWW 443 && 8080 == https
pass in log on $ext proto tcp from any port { 80,443,8080 } to $protected port { 80,443,8080 } $flagrule $st
# AUTH
pass in log on $ext proto tcp from any port { 113 } to $me port { 113 } $flagrule $st
# irc
pass in log on $ext proto tcp from any port { 6666<>7001 } to $me port { 6666<>7001 } $flagrule $st
# ICQ
pass in log on $ext proto tcp from 205.188.179.233 port { 5190 } to $me port { 5190 } $flagrule $st
pass out log on $ext proto tcp from $me port 5190 to 205.188.179.233 port 5190 $flagrule $st
#winmx
pass in log on $ext proto tcp from any port 6699 to $windows port 6699 $flagrule $st
#icq filetranfser ports
pass in log on $ext proto tcp from any port { 65500<>65535 } to $linux port { 65500<>65535 } $flagrule $st
[/code:1:94f5327336]
don't know if pf and nat.conf is needed but here they are anyway.
Thnx for any help
I have an Obsd 3.1 NAT server and a 3 nodes behind it, the linux box (which I'm typing on now) works great but the Xp boxes every now and then refuse to ping the Obsd box but can ping other nodes on the network.
I have searched on Google and only thing I could find was something about how XP makes it's rpc calls after updating to service pack1.
1Xp box is sharing an printer so when 2Xp box is started 1Xp will have problem's reaching the net and vice versa.
it's fairly annoying not to be able to reach the net, and my parents arn't to happy sitting on a linux box.
1Xp will have problem reaching the net also if 2Xp is not online, but sometimes if I leave it on for an X ammount of time it will get axx to the net i'm not really a network guy som I'm fairly lost to what to do.
I did check in to disabling rpc service in Xp but almost every service depended on it, so I would have to disable almost every network service Xp has to be able to disable rpc.
nat.conf
[code:1:94f5327336]
wan="dc1"
nat on $wan from 192.168.1.0/24 to any -> $wan
[/code:1:94f5327336]
pf.conf
[code:1:94f5327336]
#last edit 2002-11-29 friday
#to view pflog
#tcpdump -n -e -ttt -r /var/pflog
#to tail pflog
#tcpdump -n -e -ttt -i pflog0
#set up some variabels
ext="dc1"
int="dc0"
protected=" { 192.168.1.2, 192.168.1.3, 192.168.1.4 } "
me=" { 192.168.1.2, 192.168.1.3 } "
windows="192.168.1.2"
linux="192.168.1.3"
st="keep state"
flagrule="flags S/SA"
#if no route exsist we will block right away
block in quick from no-route to any
#default policy so if nothing matches it will be blocked
#block rules
block out on $ext all
block in on $ext all
block out on $ext proto tcp all
block in on $ext proto tcp all
block in on $ext proto udp all
block out on $ext proto udp all
block in quick on $ext proto tcp from any port 22 to $ext port 22
#antispoofing
block in quick on $ext from 127.0.0.1/8 to any
block out quick on $ext from any to 127.0.0.1/8
#dns dhcp
pass in quick on $ext proto { tcp, udp } from 195.54.121.228 to $protected port { 53 }
pass in quick on $ext proto { tcp, udp } from 195.54.122.193 to $protected port { 53 }
pass in quick on $ext proto { tcp, udp } from 195.54.112.136 to $ext port { 52<>56 }
# ICMP let me ping internely
pass out on $int inet proto icmp all $st
pass in on $int inet proto icmp all $st
# UDP
pass out log on $ext proto udp all $flagrule $st
# TCP outbound traffic must always be allowed otherwise we can't have a default policy.
pass out log on $ext proto tcp all $st
# WWW 443 && 8080 == https
pass in log on $ext proto tcp from any port { 80,443,8080 } to $protected port { 80,443,8080 } $flagrule $st
# AUTH
pass in log on $ext proto tcp from any port { 113 } to $me port { 113 } $flagrule $st
# irc
pass in log on $ext proto tcp from any port { 6666<>7001 } to $me port { 6666<>7001 } $flagrule $st
# ICQ
pass in log on $ext proto tcp from 205.188.179.233 port { 5190 } to $me port { 5190 } $flagrule $st
pass out log on $ext proto tcp from $me port 5190 to 205.188.179.233 port 5190 $flagrule $st
#winmx
pass in log on $ext proto tcp from any port 6699 to $windows port 6699 $flagrule $st
#icq filetranfser ports
pass in log on $ext proto tcp from any port { 65500<>65535 } to $linux port { 65500<>65535 } $flagrule $st
[/code:1:94f5327336]
don't know if pf and nat.conf is needed but here they are anyway.
Thnx for any help