From owner-freebsd-pf@FreeBSD.ORG Sun Apr 18 05:43:37 2010 Return-Path: Delivered-To: freebsd-pf@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 9E9F4106566C for ; Sun, 18 Apr 2010 05:43:37 +0000 (UTC) (envelope-from gaurav@subisu.net.np) Received: from mx-02.subisu.net.np (smtp.subisu.net.np [202.63.240.2]) by mx1.freebsd.org (Postfix) with ESMTP id C0A278FC08 for ; Sun, 18 Apr 2010 05:43:35 +0000 (UTC) Received: from localhost (mx-02.subisu.net.np [127.0.0.1]) by mx-02.subisu.net.np (Postfix) with ESMTP id 69E131C0095 for ; Sun, 18 Apr 2010 11:28:30 +0545 (NPT) X-Virus-Scanned: amavisd-new at subisu.net.np Received: from mx-02.subisu.net.np ([127.0.0.1]) by localhost (mx-02.subisu.net.np [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NgTT0uHN+ly5 for ; Sun, 18 Apr 2010 11:28:22 +0545 (NPT) Received: from [202.63.244.34] (unknown [202.63.244.34]) by mx-02.subisu.net.np (Postfix) with ESMTP id 3F7C61C0085 for ; Sun, 18 Apr 2010 11:28:22 +0545 (NPT) Message-ID: <4BCA9BFA.3020700@subisu.net.np> Date: Sun, 18 Apr 2010 11:28:22 +0545 From: Gaurav Ghimire User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.1.10pre) Gecko/20100416 Shredder/3.0.5pre MIME-Version: 1.0 To: freebsd-pf@freebsd.org References: <4BC84F00.1060700@subisu.net.np> <85262.45908.qm@web38005.mail.mud.yahoo.com> In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Subject: Re: ping sendto: operation not permitted. X-BeenThere: freebsd-pf@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Technical discussion and general questions about packet filter \(pf\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 18 Apr 2010 05:43:37 -0000 Hi Peter/Greg, Thanks for your replies. That indeed helped lot. It was the state table entries. Things seem cool now. Shall update if anything shows up. Regards, Gaurav On 04/16/2010 08:16 PM, Peter Maxwell wrote: > Checking whether there is anything unexpected in the dmesg output and > posting the output of > > pfctl -v -s a > > wouldn't hurt either. > > > > > > On 16 April 2010 14:57, jose ycogo wrote: > > >> >> i think its best if you post your pf.conf >> >> cheers... >> >> >> >> >> ________________________________ >> From: Gaurav Ghimire >> To: freebsd-pf@freebsd.org >> Sent: Friday, April 16, 2010 19:50:24 >> Subject: ping sendto: operation not permitted. >> >> Dear all, >> >> I am lately having problems with my firewall. There had not been any >> changes to the configuration and it had been working very fine. Out of >> nowhere I believe that pf is now acting abnormal and is blocking outgoing >> packets at random. It doesn't occur regular but I am getting the ping >> sendto: operation not permitted error and also its delaying udp queries to >> by dns servers that it generally protects. If I disable pf using 'pfctl -d' >> things go to normal and there isn't any issue. I also see connection breaks >> when the pf itself tries to contact my ldap server for information. >> Disabling pf makes everything go back to normal. Any hint as where I should >> be looking would be highly appreciated. I have been pulling my hairs >> literally lately. >> >> Regards, >> >> -- Gaurav >> >> _______________________________________________ >> freebsd-pf@freebsd.org mailing list >> http://lists.freebsd.org/mailman/listinfo/freebsd-pf >> To unsubscribe, send any mail to "freebsd-pf-unsubscribe@freebsd.org" >> >> >> >> Get your preferred Email name! >> Now you can @ymail.com and @rocketmail.com. >> http://mail.promotions.yahoo.com/newdomains/aa/ >> _______________________________________________ >> freebsd-pf@freebsd.org mailing list >> http://lists.freebsd.org/mailman/listinfo/freebsd-pf >> To unsubscribe, send any mail to "freebsd-pf-unsubscribe@freebsd.org" >> >> > _______________________________________________ > freebsd-pf@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-pf > To unsubscribe, send any mail to "freebsd-pf-unsubscribe@freebsd.org" From owner-freebsd-pf@FreeBSD.ORG Mon Apr 19 01:28:02 2010 Return-Path: Delivered-To: freebsd-pf@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 1681B106564A for ; Mon, 19 Apr 2010 01:28:02 +0000 (UTC) (envelope-from jhellenthal@gmail.com) Received: from mail-qy0-f199.google.com (mail-qy0-f199.google.com [209.85.221.199]) by mx1.freebsd.org (Postfix) with ESMTP id BA1208FC12 for ; Mon, 19 Apr 2010 01:28:01 +0000 (UTC) Received: by qyk37 with SMTP id 37so3846274qyk.8 for ; Sun, 18 Apr 2010 18:28:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:sender:message-id:date:from :user-agent:mime-version:to:cc:subject:references:in-reply-to :x-enigmail-version:content-type:content-transfer-encoding; bh=vFpieZOrdL0t/LByVoYvtpHaL8moxR8JoZHSHE5GhrI=; b=bfe4lLuIdf9W2dd40VDZOljnTTN64v88QQ++s6rUdcebcoMrBYMKeisbyQdgmC38Z8 CRqWCL9OgvyZvT35e6oH5PaSMUdATXx6oJKymdZmm6qhwt5DnUeg5NcM4Gn49LALOC51 9QK3wWsiRTdcbQoyDJl5FsucbkbUz6HfxM1RM= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=sender:message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:x-enigmail-version:content-type :content-transfer-encoding; b=Tqr5nOFIVsAS14EgQ0WwVySSYNYeMAf0vZ61IiCilVezkAGQ5akdwu0IBmCGVkz81K /UChBAOxd+/Gn2+99lIiAr8bVRZv/uOD4YmSjmEECzL6IeEx4yE952/WHrD6l9Emjlq8 jLfqWnQmGcRg3vgUy0YfyHpcHsBIGRbljR3zs= Received: by 10.229.88.193 with SMTP id b1mr5417234qcm.27.1271640480790; Sun, 18 Apr 2010 18:28:00 -0700 (PDT) Received: from centel.dataix.local (c-71-205-129-194.hsd1.mi.comcast.net [71.205.129.194]) by mx.google.com with ESMTPS id 20sm3627002qyk.12.2010.04.18.18.27.58 (version=SSLv3 cipher=RC4-MD5); Sun, 18 Apr 2010 18:27:59 -0700 (PDT) Sender: "J. Hellenthal" Message-ID: <4BCBB19D.7090206@dataix.net> Date: Sun, 18 Apr 2010 21:27:57 -0400 From: jhell User-Agent: Mozilla/5.0 (X11; U; FreeBSD i386; en-US; rv:1.9.1.9) Gecko/20100331 Thunderbird/3.0.4 MIME-Version: 1.0 To: DAve References: <4BBF59E2.80303@pixelhammer.com> In-Reply-To: <4BBF59E2.80303@pixelhammer.com> X-Enigmail-Version: 1.0.1 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Cc: freebsd-pf@freebsd.org Subject: Re: Issues with pf and snmp X-BeenThere: freebsd-pf@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Technical discussion and general questions about packet filter \(pf\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 19 Apr 2010 01:28:02 -0000 On 04/09/2010 12:46, DAve wrote: > Good afternoon. > > I've been working to enable pf on all our servers in preparation for > moving them outside the PIXs we currently use. The first server I > tackled was our ftp server, it currently is only used to support VOIP > phones via ftp, http, and tftp. I used ipfilter extensively but that was > 10? years ago. > > Everything is working at this point except snmp. Cacti connects to the > server to query snmp and gets part of a result, then snmp stops and > takes 80% of the CPU. Cacti is on the network. I am at a > loss to understand what is wrong with my ruleset. > > ### Macros ### > # define common values, so they can be referenced and changed easily. > ext_if="dc0" # replace with actual external interface name i.e., dc0 > int_if="dc1" > loop_if="lo0" > > ### Tables ### > table persist { 127.0.0.0/8, 172.16.0.0/12, 169.254.0.0/16, > 192.0.2.0/24, 0.0.0.0/8, 240.0.0.0/4 } > table persist { 192.168.32.0/24, 10.0.241.0/24 } > table persist > > ### Normalization ### > # reassemble fragments and resolve or reduce traffic ambiguities. > scrub all random-id > > ### Default Filtering ### > block in log all > block out log all > > # Lets make certain localhost and the private network is unrestricted > set skip on $loop_if > set skip on $int_if > > # Now lets start hammering anything obvious > block drop in quick on $ext_if from to any > block drop out quick on $ext_if from any to > block in quick on $ext_if inet proto tcp from to any port 22 > label "ssh bruteforce" > antispoof for $ext_if > > # Lets pass ssh, time and dns, we always need those. Also connections > from the office and monitoring > pass in quick on $ext_if inet proto tcp from any to $ext_if port 22 keep > state > pass out quick on $ext_if inet proto udp from $ext_if to any port 53 > keep state > pass out quick on $ext_if inet proto udp from $ext_if to any port 123 > keep state > pass in quick on $ext_if inet proto { tcp, udp, icmp } from > to $ext_if keep state > > ### Server Specific rules ### > # We gotta support those FTP users, that's why we are here and not a > kiosk in a mall > pass in quick on $ext_if inet proto tcp from any to $ext_if port 21 keep > state > pass in quick on $ext_if inet proto tcp from any to $ext_if port > 65000:65500 keep state > # Yep, Cisco phones still using tftp, we do not understand what internet > they use at Cisco. > pass in quick on $ext_if inet proto udp from any to $ext_if port 69 > # We use www to serve config files as well > pass in quick on $ext_if inet proto tcp from any to $ext_if port 80 keep > state > > I would think the line allowing tcp,udp,icmp would allow snmp to work > from the monitoring server, but snmp is certainly not behaving. here is > the relevant pflog entry. > > 480683 rule 0/0(match): block in on dc0: 10.0.241.28.39107 > > 10.0.241.41.161: C=SECRET GetNextRequest(21) .0.1[|snmp] > > Thanks for any help. > > DAve > Hi DAve, Could you try adding a rule specifically for SNMP traffic? Ports 161,162,1993(cisco-tcp) Also could you possibly try adding "no-df" to your scrub all rule with the random-id and report back if it helped ? Relevant man page section from pf.conf(5) on the "no-df" scrub option: http://tinyurl.com/y242jpa Regards, -- jhell From owner-freebsd-pf@FreeBSD.ORG Mon Apr 19 11:07:05 2010 Return-Path: Delivered-To: freebsd-pf@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 0C2BC106567B for ; Mon, 19 Apr 2010 11:07:05 +0000 (UTC) (envelope-from owner-bugmaster@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:4f8:fff6::28]) by mx1.freebsd.org (Postfix) with ESMTP id EEAF58FC30 for ; Mon, 19 Apr 2010 11:07:04 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.4/8.14.4) with ESMTP id o3JB74iN034177 for ; Mon, 19 Apr 2010 11:07:04 GMT (envelope-from owner-bugmaster@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.4/8.14.4/Submit) id o3JB74O9034175 for freebsd-pf@FreeBSD.org; Mon, 19 Apr 2010 11:07:04 GMT (envelope-from owner-bugmaster@FreeBSD.org) Date: Mon, 19 Apr 2010 11:07:04 GMT Message-Id: <201004191107.o3JB74O9034175@freefall.freebsd.org> X-Authentication-Warning: freefall.freebsd.org: gnats set sender to owner-bugmaster@FreeBSD.org using -f From: FreeBSD bugmaster To: freebsd-pf@FreeBSD.org Cc: Subject: Current problem reports assigned to freebsd-pf@FreeBSD.org X-BeenThere: freebsd-pf@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Technical discussion and general questions about packet filter \(pf\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 19 Apr 2010 11:07:05 -0000 Note: to view an individual PR, use: http://www.freebsd.org/cgi/query-pr.cgi?pr=(number). The following is a listing of current problems submitted by FreeBSD users. These represent problem reports covering all versions including experimental development code and obsolete releases. S Tracker Resp. Description -------------------------------------------------------------------------------- o kern/144311 pf [pf] [icmp] massive ICMP storm on lo0 occurs when usin o kern/143543 pf [pf] [panic] PF route-to causes kernel panic o bin/143504 pf [patch] outgoing states are not killed by authpf(8) o conf/142961 pf [pf] No way to adjust pidfile in pflogd o conf/142817 pf [patch] etc/rc.d/pf: silence pfctl o kern/141905 pf [pf] [panic] pf kernel panic on 7.2-RELEASE with empty o kern/140697 pf [pf] pf behaviour changes - must be documented o kern/137982 pf [pf] when pf can hit state limits, random IP failures o kern/136781 pf [pf] Packets appear to drop with pf scrub and if_bridg o kern/135948 pf [pf] [gre] pf not natting gre protocol o kern/135162 pf [pfsync] pfsync(4) not usable with GENERIC kernel o kern/134996 pf [pf] Anchor tables not included when pfctl(8) is run w o kern/133732 pf [pf] max-src-conn issue o kern/132769 pf [pf] [lor] 2 LOR's with pf task mtx / ifnet and rtent f kern/132176 pf [pf] pf stalls connection when using route-to [regress o conf/130381 pf [rc.d] [pf] [ip6] ipv6 not fully configured when pf st o kern/129861 pf [pf] [patch] Argument names reversed in pf_table.c:_co o kern/127920 pf [pf] ipv6 and synproxy don't play well together o conf/127814 pf [pf] The flush in pf_reload in /etc/rc.d/pf does not w o kern/127439 pf [pf] deadlock in pf f kern/127345 pf [pf] Problem with PF on FreeBSD7.0 [regression] o kern/127121 pf [pf] [patch] pf incorrect log priority o kern/127042 pf [pf] [patch] pf recursion panic if interface group is o kern/125467 pf [pf] pf keep state bug while handling sessions between s kern/124933 pf [pf] [ip6] pf does not support (drops) IPv6 fragmented o kern/124364 pf [pf] [panic] Kernel panic with pf + bridge o kern/122773 pf [pf] pf doesn't log uid or pid when configured to o kern/122014 pf [pf] [panic] FreeBSD 6.2 panic in pf o kern/121704 pf [pf] PF mangles loopback packets o kern/120281 pf [pf] [request] lost returning packets to PF for a rdr o kern/120057 pf [pf] [patch] Allow proper settings of ALTQ_HFSC. The c o bin/118355 pf [pf] [patch] pfctl(8) help message options order false o kern/114567 pf [pf] [lor] pf_ioctl.c + if.c o kern/114095 pf [carp] carp+pf delay with high state limit o kern/111220 pf [pf] repeatable hangs while manipulating pf tables s conf/110838 pf [pf] tagged parameter on nat not working on FreeBSD 5. o kern/103283 pf pfsync fails to sucessfully transfer some sessions o kern/103281 pf pfsync reports bulk update failures o kern/93825 pf [pf] pf reply-to doesn't work o sparc/93530 pf [pf] Incorrect checksums when using pf's route-to on s o kern/92949 pf [pf] PF + ALTQ problems with latency o bin/86635 pf [patch] pfctl(8): allow new page character (^L) in pf. o kern/82271 pf [pf] cbq scheduler cause bad latency 43 problems total. From owner-freebsd-pf@FreeBSD.ORG Wed Apr 21 13:10:24 2010 Return-Path: Delivered-To: freebsd-pf@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id A719E1065674 for ; Wed, 21 Apr 2010 13:10:24 +0000 (UTC) (envelope-from dave.list@pixelhammer.com) Received: from smtp1.tls.net (smtp1.tls.net [65.124.104.104]) by mx1.freebsd.org (Postfix) with ESMTP id 4DA7E8FC18 for ; Wed, 21 Apr 2010 13:10:23 +0000 (UTC) Received: (qmail 68396 invoked from network); 21 Apr 2010 13:10:22 -0000 Received: by simscan 1.4.0 ppid: 68345, pid: 68389, t: 4.3727s scanners: attach: 1.4.0 clamav: 0.95.3/m:52/d:10766 spam: 3.2.1 X-Spam-Checker-Version: SpamAssassin 3.2.1 (2007-05-02) on smtp1.tls.net X-Spam-Level: * X-Spam-Status: No, score=1.6 required=7.0 tests=ALL_TRUSTED,TVD_RCVD_IP autolearn=disabled version=3.2.1 Received: from 64-184-11-205.bb.hrtc.net (HELO ?192.168.1.46?) (ldg@tls.net@64.184.11.205) by ssl-smtp1.tls.net with ESMTPA; 21 Apr 2010 13:10:18 -0000 Message-ID: <4BCEF926.9060800@pixelhammer.com> Date: Wed, 21 Apr 2010 09:09:58 -0400 From: DAve User-Agent: Thunderbird 2.0.0.12 (Windows/20080213) MIME-Version: 1.0 To: freebsd-pf@freebsd.org References: <4BBF59E2.80303@pixelhammer.com> <4BBF8629.1090109@pixelhammer.com> <4BC72457.1000202@pixelhammer.com> <4BC7E357.2070203@pixelhammer.com> In-Reply-To: X-Enigmail-Version: 0.96.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Subject: Re: Fwd: Issues with pf and snmp X-BeenThere: freebsd-pf@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Technical discussion and general questions about packet filter \(pf\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 21 Apr 2010 13:10:24 -0000 Top posting for a reason. I appreciate all the help but I will no be working on this problem any longer. My position has been closed and I am out of a job. So the FW is someone else's problem now. Again, a thanks for the help from everyone both on and off list. DAve Peter Maxwell wrote: > > > On 16 April 2010 05:11, DAve > wrote: > > DAve wrote: > > Peter Maxwell wrote: > >> Can't see anything obvious but have you tried these things in the > event > >> something strange is going on: > >> > >> - removing the scrub rule; > >> > >> - removing the antispoof rule; > >> > >> - add 'log' to the the pass rules and then check to see if there > are any > >> other snmp udp packets getting passed/dropped in the wrong place. > > > > A good idea. I will try to get that done this evening, though I am > > running 100% until Monday. > > > > > > Nope, no scrubbing no antispoof, same result exactly. I did check > snmpget and it seemed to work. I will check which oid is next in line > and see if I can get that value next. > > > If snmpget is working, pf is passing packets and there is something > unexpected happening. I'd start opening up your ruleset until it works > or you reach a 'pass all' ruleset (with the former you've found the > problem, in the later you know for certain pf is the problem). > > - add an equivalent 'pass out' rule for the network; > > - change the pass rule to be 'from to any'; > > - comment out the three unnecessary block rules (3 through 5); > > - remove *all* instances of the 'quick' keyword; > > - move the snmp rules to immediately underneath the first block rules; > > - remove all the pass rules and replace with pass in from any to $ext_if > & pass out from $ext_if to any. > > If you've reached this far and it still doesn't work then, erm, we'll > deal with that if it happens. > > > > > It appears some restriction on the snmpwalk, possibly a limit on how > many results are being returned? (Shooting in the dark now). > > > No, that would be on the application layer, the tcpdump output showed an > inbound udp packet getting blocked. The only difference I can imagine > between snmpget and snmpwalk would be the size of the packets, number of > packets, or source port numbers. > > I'd try doing a tcpdump on the dc0 interface of the snmpwalk session > when pf isn't loaded then load pf and collect a tcpdump from both the > dc0 and pflog0 interfaces. There should be enough information in those > three datasets to discover what on earth is going on. > > > > > I use Cacti everywhere within our networks, no snmpwalk is a show > stopper for me here... > > DAve > > > -- > "Posterity, you will know how much it cost the present generation to > preserve your freedom. I hope you will make good use of it. If you > do not, I shall repent in heaven that ever I took half the pains to > preserve it." John Adams > > http://appleseedinfo.org > > _______________________________________________ > freebsd-pf@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-pf > To unsubscribe, send any mail to "freebsd-pf-unsubscribe@freebsd.org > " > > -- "Posterity, you will know how much it cost the present generation to preserve your freedom. I hope you will make good use of it. If you do not, I shall repent in heaven that ever I took half the pains to preserve it." John Adams http://appleseedinfo.org From owner-freebsd-pf@FreeBSD.ORG Thu Apr 22 08:25:21 2010 Return-Path: Delivered-To: freebsd-pf@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 8ACF81065680 for ; Thu, 22 Apr 2010 08:25:21 +0000 (UTC) (envelope-from ose11rose@gmail.com) Received: from avas4.indosat.net.id (avas4.indosat.net.id [202.155.90.5]) by mx1.freebsd.org (Postfix) with ESMTP id 8353E8FC1F for ; Thu, 22 Apr 2010 08:25:20 +0000 (UTC) X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AqITADOlz0tyOjSk/2dsb2JhbACBP4UFAWAyhUADgweBD4pxYw6sGwqIJy6IUoJ6ghQEgzKJEg X-IronPort-AV: E=Sophos;i="4.52,255,1270400400"; d="scan'208,217";a="35618102" Received: from unknown (HELO BION11) ([114.58.52.164]) by avas3.indosat.net.id with ESMTP; 22 Apr 2010 15:13:23 +0700 MIME-Version: 1.0 From: "Absensi terbaik di Indonesia hanya 1,3 jt" To: freebsd-pf@freebsd.org X-Mailer: SendBlaster.1.6.0 Date: Thu, 22 Apr 2010 15:25:15 +0700 Message-ID: <34646960528025695117@BION-11> Content-Type: text/plain Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.5 Subject: LUAR BIASA!!! ABSENSI SIDIK JARI HANYA 1, 3 JUTA => LIFETIME WARANTY X-BeenThere: freebsd-pf@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: ose11rose@yahoo.com List-Id: "Technical discussion and general questions about packet filter \(pf\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 22 Apr 2010 08:25:21 -0000 =B7 ABSENSI SIDIK JARI TERBAIK DI INDONESIA =B7 Penyedia Solusi Pengamanan Sistem, Aplikasi dan Data Perusahaan Me= nggunakan Teknologi Sidik Jari Pertama di Indonesia (lebih aman daripada me= nggunakan password,unique ID,encryption,dll) Hanya 1,3JT GARANSI SPARE PART 3 TAHUN GARANSI SERVICE LIFETIME TINGGALKAN ABSENSI MANUAL ANDA BERALIHLAH MENGGUNAKAN ABSENSI SIDIK JARI Hub : Rosnita Fingerspot (021) 93229090/ (021) 62202861 Please visit us @ www.fingerspot .com PT BiomeTrik Citra Solusi