Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 9 Mar 2015 14:46:36 +0000
From:      krad <kraduk@gmail.com>
To:        Monah Baki <monahbaki@gmail.com>
Cc:        FreeBSD Questions <freebsd-questions@freebsd.org>
Subject:   Re: FreeBSD PF question
Message-ID:  <CALfReydf2pnVm-URsNDf2SVSwcpHH9xEb-qXtC5LGOOtJ-O-8w@mail.gmail.com>
In-Reply-To: <CALP3=x8x1RsRTCZvHNtrdtBXU6KVWXiXnJq=GF%2BCsqqDNe5OJw@mail.gmail.com>
References:  <CALP3=x9851YUUu5rsMhc=tAYEZ4ma3xJZJUQFG8FqOhbJ%2BT_sQ@mail.gmail.com> <CALfReyfqr-%2B4OxJ9BSUU6y-o9MaYs%2BJiSMQv7EWAGPTYqiuAcQ@mail.gmail.com> <CALP3=x8x1RsRTCZvHNtrdtBXU6KVWXiXnJq=GF%2BCsqqDNe5OJw@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
yes the squid box needs to be whitelisted for no redirection

On 9 March 2015 at 14:27, Monah Baki <monahbaki@gmail.com> wrote:

> Should I do this on the cisco itself?
>
> On Mon, Mar 9, 2015 at 10:24 AM, krad <kraduk@gmail.com> wrote:
>
>> It sounds like your cisco isnt letting the squid web traffic out and
>> redirecting it back to itself. You need to exclude the squid proxyies
>> address from redirection
>>
>> On 9 March 2015 at 14:03, Monah Baki <monahbaki@gmail.com> wrote:
>>
>>> Hi All,
>>>
>>> I have a freebsd 10.1 server with a single interface (bge0) running squid
>>> in intercept mode. There is a Cisco device doing the policy routing.
>>>
>>> interface GigabitEthernet0/0/1.1
>>>
>>> encapsulation dot1Q 1 native
>>>
>>> ip address 10.0.0.9 255.255.255.0
>>>
>>> no ip redirects
>>>
>>> no ip unreachables
>>>
>>> ip nat inside
>>>
>>> standby 1 ip 10.0.0.10
>>>
>>> standby 1 priority 120
>>>
>>> standby 1 preempt
>>>
>>> standby 1 name HSRP
>>>
>>> ip policy route-map CFLOW
>>>
>>>
>>>
>>> ip access-list extended REDIRECT
>>>
>>> deny   tcp host 10.0.0.24 any eq www
>>>
>>> permit tcp host 10.0.0.23 any eq www
>>>
>>>
>>>
>>> route-map CFLOW permit 10
>>>
>>> match ip address REDIRECT
>>> set ip next-hop 10.0.0.24
>>>
>>> My squid.conf has the following:
>>> http_port 3128
>>> http_port 3129 intercept
>>>
>>>
>>>
>>> My pf.conf has the following:
>>>
>>> rdr on bge0 inet proto tcp from 10.0.0.0/8 to any port 80 -> 10.0.0.24
>>> port
>>> 3129
>>> # block in
>>> pass in log quick on bge0
>>> pass out log quick on bge0
>>> pass out keep state
>>>
>>>
>>>
>>> User gets an access denied on browsing, and in my cache.log file, I see:
>>> WARNING: Forwarding loop detected for:
>>>
>>>
>>>
>>> Any help/guidance is appreciated.
>>>
>>>
>>> Thanks
>>> _______________________________________________
>>> freebsd-questions@freebsd.org mailing list
>>> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
>>> To unsubscribe, send any mail to "
>>> freebsd-questions-unsubscribe@freebsd.org"
>>>
>>
>>
>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CALfReydf2pnVm-URsNDf2SVSwcpHH9xEb-qXtC5LGOOtJ-O-8w>