I have a couple of jails running on machine that used to serve only as router. Internal physical interface is sitting on 172.16.0.0/12 network. Jails IP aliases sitting on that interface are on 10.0.0.0/8 network, for example 10.255.255.53/32 for DNS, 10.255.255.80/32 for web, etc.
Hosts on 172.16.0.0/12 are able to "telnet" into both 172.16.0.254 80 which gets redirected with pf to 10.255.255.80 80, but also are able to directly "telnet" into 10.255.255.80 80.
Security wise I don't think it matters since service is still listening only on jailed port 80 (plus its my home network). What bugs me is that I'm unable to limit network traffic only to physical IP, not aliases IP in pf.
Can I stop hosts from logging directly to aliased IP, and even more, stop aliased IP from answering to layer 2 traffic such as ARP. In other words, hosts shouldn't see any host on 10.0.0.0/8 on 172.16.0.0/12.
Hosts on 172.16.0.0/12 are able to "telnet" into both 172.16.0.254 80 which gets redirected with pf to 10.255.255.80 80, but also are able to directly "telnet" into 10.255.255.80 80.
Security wise I don't think it matters since service is still listening only on jailed port 80 (plus its my home network). What bugs me is that I'm unable to limit network traffic only to physical IP, not aliases IP in pf.
Can I stop hosts from logging directly to aliased IP, and even more, stop aliased IP from answering to layer 2 traffic such as ARP. In other words, hosts shouldn't see any host on 10.0.0.0/8 on 172.16.0.0/12.