Danke für die Info - stecke aber leider mit der Fehler meldung no altq fest und komme nicht weiter
No ALTQ support in kernel
ALTQ related functions disabled
sudo pfctl -f /pfad_zu_den_fw_regeln
sudo pfctl -e
sudo pfctl -d
pass out on en0 inet from any to 10.0.0.0/16 flags S/SA keep state
pass out on en0 inet from any to 127.16.0.0/12 flags S/SA keep state
pass in on en0 inet from 10.0.0.0/16 to any flags S/SA keep state
pass in on en0 inet from 127.16.0.0/12 to any flags S/SA keep state
No ALTQ support in kernel
ALTQ related functions disabled
block drop all
pass out on en0 proto udp from any to any port = 1194 keep state
pass out on en0 proto udp from any to any port = 1151 keep state
pass out on en0 proto udp from any to any port = 150 keep state
pass out on en0 proto udp from any to any port = 151 keep state
pass out on en0 proto udp from any to any port = 149 keep state
pass out on en0 proto udp from any to any port = 1149 keep state
pass out on en0 proto udp from any to any port = 1150 keep state
pass out on en0 proto udp from any to any port = 53 keep state
pass out on en0 proto udp from any to any port = 5353 keep state
pass out on lo0 all flags S/SA keep state
pass in on lo0 all flags S/SA keep state
pass out on en0 proto tcp from any to any port = 1152 flags S/SA keep state
pass out on en0 proto tcp from any to any port = 152 flags S/SA keep state
pass out on en0 inet from any to 192.168.0.0/16 flags S/SA keep state
pass out on en0 inet from any to 10.0.0.0/16 flags S/SA keep state
pass out on en0 inet from any to 127.16.0.0/12 flags S/SA keep state
pass in on en0 inet from 192.168.0.0/16 to any flags S/SA keep state
pass in on en0 inet from 10.0.0.0/16 to any flags S/SA keep state
pass in on en0 inet from 127.16.0.0/12 to any flags S/SA keep state
pass out on tun0 all flags S/SA keep state
pass in on tun0 all flags S/SA keep state
Beim PP Manager der testversion fiel mir das auch auf das unter El Capitan die Firewall-Option nicht ziehen. Das wird natürlich den Start auch verzögern, da das abgefragt werden muss und dann an die Version von macOS die der Nutzer hat, angepasst werden muss.
Mein letzter Stand war, das ein Kollege den Code momentan glatt zieht und aufräumt. Unter 10.10 war der Manager an sich schon voll funktionsfähig. Aber es soll eben schon ordentlich sein
block in all
block out all
pass in on lo0 all
pass out on lo0 all
pass out on $iface inet proto udp to any port {1151,150,151,149,1149,1150,53,5353} keep state
pass out on $iface inet proto tcp to any port {1152,152} keep state
pass out on $iface inet to 10.0.0.0/8
pass in on $iface inet from 10.0.0.0/8
pass out on $iface inet to 192.168.0.0/16
pass in on $iface inet from 192.168.0.0/16
pass out on $iface inet to 172.16.0.0/12
pass in on $iface inet from 172.16.0.0/12
pass out on utun0 all keep state
pass out on tun0 all keep state
block in all
block out all
pass in on lo0 all
pass out on lo0 all
pass out on en0 inet proto udp to any port {1151,150,151,149,1149,1150,53,5353} keep state
pass out on en0 inet proto tcp to any port {1152,152} keep state
pass out on en0 inet to 10.0.0.0/8
pass in on en0 inet from 10.0.0.0/8
pass out on en0 inet to 192.168.0.0/16
pass in on en0 inet from 192.168.0.0/16
pass out on en0 inet to 172.16.0.0/12
pass in on en0 inet from 172.16.0.0/12
pass out on utun0 all keep state
pass out on tun0 all keep state
do shell script "/sbin/pfctl -f /Users/admin/Documents/vpn.rules ;/sbin/pfctl -e" password "Mein Paßwort" with administrator privileges
Als Format des Dokumentes wähle Reiner Text,
block all
pass in on lo0 all
pass out on lo0 all
pass out on en0 proto udp to any port {1151,150,151,149,1149,1150,53,5353} keep state
pass out on en0 proto tcp to any port {1152,152} keep state
pass out on en0 to 192.168.2.0/24
pass in on en0 from 192.168.2.0/24
pass out on tun0 all keep state
pass in on tun0 all keep state
block in all
block out all
pass in on lo0 all
pass out on lo0 all
pass out on en0 inet proto udp to any port {1151,150,151,149,1149,1150,53,5353} keep state
pass out on en0 inet proto tcp to any port {1152,152} keep state
pass out on en0 inet to 10.0.0.0/8
pass in on en0 inet from 10.0.0.0/8
pass out on en0 inet to 192.168.0.0/16
pass in on en0 inet from 192.168.0.0/16
pass out on en0 inet to 172.16.0.0/12
pass in on en0 inet from 172.16.0.0/12
pass out on utun0 all keep state
pass out on tun0 all keep state
pass out log (all) on en0 inet proto tcp to any port 443 keep state
ifconfig pflog0 create
sudo tcpdump -n -e -ttt -i pflog0
sudo tcpdump -i pflog0 -s 0 -B 524288 -w /Pfad_zur_Datei &
ps -ef
sudo kill PID
tcpdump -n -e -ttt -r /Pfad_zur_Datei
pass out on en0 to 192.168.7.0/24
pass in on en0 from 192.168.7.0/24
pass out on en0 to 192.168.6.0/24
pass in on en0 from 192.168.6.0/24
do shell script "/sbin/pfctl -f ~/Documents/vpn.rules;/sbin/pfctl -e" password "meinpasswort" with administrator privileges
block in all
block out all
pass in on lo0 all
pass out on lo0 all
pass out on en0 inet proto udp to any port {1151,150,151,149,1149,1150,53,5353} keep state
pass out on en0 inet proto tcp to any port {1152,152,32400} keep state
pass out on en0 inet to 10.0.0.0/8
pass in on en0 inet from 10.0.0.0/8
pass out on en0 inet to 192.168.7.0/16
pass in on en0 inet from 192.168.7.0/16
pass out on en0 inet to 192.168.6.0/16
pass in on en0 inet from 192.168.6.0/16
pass out on utun0 all keep state
pass out on tun0 all keep state
do shell script "/sbin/pfctl -f /Users/admin/Documents/vpn.rules ;/sbin/pfctl -e" password "Mein Paßwort" with administrator privileges
sudo pfctl -F rules