Thanks Mike,
I will try with the sysctl settings on my next reboot (hopefully in the
next month or so). About the shaping I will post another mail, just to keep
the topics separate.
Thanks once again.

Regards,
Lyubomir

On Tue, 9 Mar 2021 at 15:24, mike tancsa <m...@sentex.net> wrote:

> Hi,
>
>     I havent tried shaping.  If you are getting both blocks on the NIC
> firewall and ipfw its possible the packets ipfw are stopping are
> fragments or packets with bad checksums.  You can have the NIC drop the
> bad checksum traffic too with that sysctl setting in loader.conf
>
>     ---Mike
>
> On 3/9/2021 8:12 AM, Lyubomir Yotov wrote:
> > Hi Mike,
> > I tried with the VLAN option but it appears to be valid only for the
> > switch action:
> > #cxgbetool t5nex0 filter 10 iport 0 action pass dip 192.168.1.122
> > dport 80 vlan "=100"
> > cxgbetool: port, dmac, smac, vlan, and nat only make sense with
> > "action switch"
> > Anyway I have implemented this and it works fine. I noticed that there
> > are some hits on ipfw rule that used to take care of it. Do you have
> > any idea why?
> > Have tried to do some sort of shaping in the card?
> >
> > Regards,
> >
> > Lyubo
> >
> > On Mon, 8 Mar 2021 at 13:52, Lyubomir Yotov <l.yo...@gmail.com
> > <mailto:l.yo...@gmail.com>> wrote:
> >
> >     Hi Mike,
> >     Thanks a lot!
> >
> >     Regards,
> >
> >     Lyubomir
> >
> >     On Mon, 8 Mar 2021 at 12:26, mike tancsa <m...@sentex.net
> >     <mailto:m...@sentex.net>> wrote:
> >
> >         On 3/8/2021 3:17 AM, Lyubomir Yotov wrote:
> >         > Hi Mike,
> >         > Thanks for the quick response and provided information. I
> >         currently
> >         > have only one interface (in and out). I will try  to use the
> >         vlan
> >         > option as well to be more precise. My rule might look like:
> >         > #cxgbetool t5nex0 filter 10 iport 0 action drop dip
> >         192.168.1.122
> >         > dport 23 vlan 100
> >         > Just to be on the safe side, if I add only the above drop
> >         rule in the
> >         > firewall I won't need explicit "allow all" in the end?
> >
> >         Hi Lyubomir,
> >
> >             Correct, its *not* like pf where its default block.  You
> >         can then
> >         use cxgbetool t5nex0 filter list to see what hits.  Actually,
> >         maybe to
> >         be on the safe side at first, instead of action drop add in
> >         action pass
> >         and then hit the rule to see if its being hit or not the way
> >         you expect.
> >         You will see the counter go up. then delete it and add it back
> >         as action
> >         drop when you are confident its going to do just what you want
> >         it to do.
> >
> >         >
> >         > I don't have "hw.cxgbe.attack_filter" and
> >         > "hw.cxgbe.drop_pkts_with_l3_errors". These will either
> >         appear after I
> >         > add a rule or if a change the firmware. I will check after
> >         adding a rule.
> >
> >         These are /boot/loader.conf values. See man cxl to see what
> >         they do.
> >
> >             ---Mike
> >
> >
> >         >
> >         > Regards,
> >         > Lyubomir
> >         >
> >         >
> >         > On Sun, 7 Mar 2021 at 19:15, mike tancsa <m...@sentex.net
> >         <mailto:m...@sentex.net>
> >         > <mailto:m...@sentex.net <mailto:m...@sentex.net>>> wrote:
> >         >
> >         >     Hi,
> >         >         I am using the T5 firewall features on FreeBSD 11
> >         and 12 in
> >         >     production and it works great!
> >         >
> >         >     On 3/7/2021 10:41 AM, Lyubomir Yotov wrote:
> >         >     > - is it safe to add rules on the fly in BSDRP?
> >         >     I add and remove rules on the fly all the time.
> >         >     > - is it safe to implement drop only rules on a
> >         production server
> >         >     > without breaking the other traffic (should I have an
> >         allow-all
> >         >     in the
> >         >     > end)?
> >         >     > I would like to test dropping all packets incoming on
> >         cxl0 from any
> >         >     > host to host 192.168.1.122 with destination port 23. I
> >         suppose a
> >         >     rule
> >         >     > like the following will do the job:
> >         >     >
> >         >     > #cxgbetool t5nex0 filter 10 iport 0 action drop dip
> >         192.168.1.122
> >         >     > dport 23
> >         >     >
> >         >     Careful of the orientation. If you have 2 ports, the
> >         iport makes a
> >         >     difference as to whether the rule gets hit or not.
> >         >
> >         >
> >         >     > If I want this persistent I should create a script
> >         probably and
> >         >     start
> >         >     > it with the system boot?
> >         >     Yes. I have yet to come up with a nice interface to do
> >         this. For some
> >         >     strange reason, cxgbetool displays IP addresses in HEX ?!?
> >         >     > How many rules can I plug in?
> >         >
> >         >     I am not sure, but I think
> >         >
> >         >     dev.t5nex.0.nfilters: number of filters
> >         >
> >         >     shows the limit ? I have 20 on one box that handles
> >         about 1Gb/s of
> >         >     packet forwarding. Under DDoS it sees 5-8 and nicely
> >         drops those
> >         >     packets
> >         >     and normal traffic flows unhindered.
> >         >
> >         >     I also have
> >         >
> >         >     hw.cxgbe.attack_filter="1"
> >         >     hw.cxgbe.drop_pkts_with_l3_errors="1"
> >         >
> >         >     as I often see corrupted packets as part of the DDoS, so
> >         I just drop
> >         >     those anyways.  The packets do show up in the NIC
> >         counters, so if you
> >         >     are using graphana/cacti to monitor bandwidth, you will
> >         see them
> >         >     as part
> >         >     of the traffic counts.
> >         >
> >         >     I run this every 5min and then graph it on cacti to keep
> >         track of how
> >         >     much is dropped on the box. Its kinda depressing how
> >         much RFC1918 and
> >         >     Bogon traffic gets dropped :(
> >         >
> >         >     /usr/sbin/cxgbetool t5nex0 filter list | /usr/bin/grep
> >         -v Hits |
> >         >     /usr/bin/awk '{ sum+=$2;} END{print sum;}' >
> >         /var/run/filter-stats.log
> >         >
> >         >
> >         >         ---Mike
> >         >
> >         >
> >         >     >
> >         >     > Regards,
> >         >     > Lyubomir
> >         >     >
> >         >     >
> >         >     > _______________________________________________
> >         >     > Bsdrp-users mailing list
> >         >     > Bsdrp-users@lists.sourceforge.net
> >         <mailto:Bsdrp-users@lists.sourceforge.net>
> >         >     <mailto:Bsdrp-users@lists.sourceforge.net
> >         <mailto:Bsdrp-users@lists.sourceforge.net>>
> >         >     >
> >         https://lists.sourceforge.net/lists/listinfo/bsdrp-users
> >         <https://lists.sourceforge.net/lists/listinfo/bsdrp-users>
> >         >
> >          <https://lists.sourceforge.net/lists/listinfo/bsdrp-users
> >         <https://lists.sourceforge.net/lists/listinfo/bsdrp-users>>
> >         >
> >
>
_______________________________________________
Bsdrp-users mailing list
Bsdrp-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/bsdrp-users

Reply via email to