https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=238796
Cy Schubert <c...@freebsd.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Resolution|--- |Not A Bug Status|Open |Closed --- Comment #9 from Cy Schubert <c...@freebsd.org> --- cwfw# echo "pass in quick on fxp0 to sk0:10.1.1.1 inet proto tcp from 192.168.0.0/24 port = 22 to any" | ipf -f - cwfw# ipfstat -ion | grep 'pass in quick on fxp0 to sk0:10.1.1.1 inet' @212 pass in quick on fxp0 to sk0:10.1.1.1 inet proto tcp from 192.168.0.0/24 port = ssh to any cwfw# echo "pass in quick on fxp0 to sk0:10.1.1.1 inet proto tcp from 192.168.0.0/24 port = 22 to any" | ipf -r -f - cwfw# ipfstat -ion | grep 'pass in quick on fxp0 to sk0:10.1.1.1 inet' cwfw# cwfw# uname -a FreeBSD cwfw 13.0-CURRENT FreeBSD 13.0-CURRENT #407 r349853M: Mon Jul 8 18:28:18 PDT 2019 root@cwfw:/export/obj/opt/src/svn-current/amd64.amd64/sys/PROD2 amd64 cwfw# I am unable to reproduce this on my production firewall. It is likely your problem is due to one of your custom patches. -- You are receiving this mail because: You are on the CC list for the bug. _______________________________________________ freebsd-net@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"