what exactly needs to happened in pf.conf so a range of ips gets blocked?!
in this case he range in <badstuff> is not blocked. i tried putting the
block right after the table declaration also? nothing spectacular
happened..
any help would be appreciated? thanks?
here is my ruleset:
table <badstuff> { 46.19.139.0/24 }
tcp_in = "{ domain, www, https }"
udp = "{ domain, ntp, snmp }"
ping = "echoreq"
set skip on lo
scrub in
antispoof for bge0 inet
block in all
pass out all keep state
### for tracroutes
pass out inet proto udp from any to any port 33433 >< 33626 keep state
pass proto udp to any port $udp
##icmp
pass inet proto icmp all icmp-type $ping keep state
## passing in
##pass in inet proto tcp to any port $tcp_in keep state
pass in inet proto tcp to any port $tcp_in flags S/SAF synproxy state
pass proto tcp to any port ssh
block in on bge0 from { <badstuff> } to any