Ah, thanks for the hint.
However, it still doesn't work! Here's my setup:
This is fine so far, but the address is not masqueraded:
How can I make this work?
However, it still doesn't work! Here's my setup:
Code Select
# pfctl -s nat | grep vlan0.250
nat on vlan0.250 inet from (vlan0.250:network) to any -> 1.2.3.4 port 1024:65535
# ifconfig vlan0.250
vlan0.250: flags=1008943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST,LOWER_UP> metric 0 mtu 1500
description: management (opt13)
options=4000000<MEXTPG>
ether 00:22:4d:84:77:29
inet 10.89.250.3 netmask 0xffffff00 broadcast 10.89.250.255
inet 10.89.250.1 netmask 0xffffff00 broadcast 10.89.250.255 vhid 250
groups: vlan
carp: MASTER vhid 250 advbase 1 advskew 0
peer 224.0.0.18 peer6 ff02::12
vlan: 250 vlanproto: 802.1q vlanpcp: 0 parent interface: em1
media: Ethernet autoselect (1000baseT <full-duplex>)
status: active
nd6 options=29<PERFORMNUD,IFDISABLED,AUTO_LINKLOCAL>
# tcpdump -i vlan0.250 -c 2 host 8.8.8.8
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on vlan0.250, link-type EN10MB (Ethernet), snapshot length 262144 bytes
13:08:00.024830 IP 10.89.250.42 > dns.google: ICMP echo request, id 2845, seq 1, length 64
13:08:00.027434 IP dns.google > 10.89.250.42: ICMP echo reply, id 2845, seq 1, length 64
2 packets captured
30 packets received by filter
0 packets dropped by kernel
This is fine so far, but the address is not masqueraded:
Code Select
# tcpdump -i em0 -c 2 host 8.8.8.8
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on em0, link-type EN10MB (Ethernet), snapshot length 262144 bytes
13:08:26.491733 IP 10.89.250.42 > dns.google: ICMP echo request, id 2846, seq 1, length 64
13:08:26.494192 IP dns.google > 10.89.250.42: ICMP echo reply, id 2846, seq 1, length 64
2 packets captured
335 packets received by filter
0 packets dropped by kernel
How can I make this work?