the right person in
your organization.
Best Regards,
David Thomas
To opt out,please response Exit.
___
freebsd-ipfw@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-ipfw
To unsubscribe, send any mail to
Sun, Jan 29, 2017 at 06:52:58PM +0100, Rakor:
> Hi and thanks for your reply!
Hello! Sorry for not following up, I was busy and forgot.
> I also tried it using recv and xmit rules.
> [...]
> So to me it looks like he does not know that the packet will be transmitted
> via igb2 at the moment it
Tue, Jun 28, 2016 at 01:48:30PM -0400, Ataro via freebsd-ipfw:
> Hi there,
>
> I've set up a FreeBSD machine inside a VirtualBox machine and used IPFW to
> redirect all the requests to the internet through a squid proxy server
> running on the same machine in port 3128 in intercept mode (also kn
is kind of static
port forwarding might be more secure. Redirect only the necessary ports
and don't worry about it. Or isolate the PS4 in a DMZ, if you're
concerned it could be used as a point of entry into your network.
Cheers,
Thomas
Wed, Nov 25, 2015 at 04:00:12PM +1100, Graham Menhenn
On 06/03/2011 14:23, Dave Johnson wrote:
An IPFW problem when going from release to stable on 8.2
An help gladly accepted
LOG ON
Flushed all rules.
00010 allow ip from 127.0.0.1 to 127.0.0.1 via lo0
00030 divert 8668 ip from any to any via bge0
ipfw: getsockopt(IP_FW_ADD): Invalid argument
500
The following reply was made to PR kern/148928; it has been noted by GNATS.
From: Thomas Sandford
To: bug-follo...@freebsd.org, fmy...@gmail.com
Cc:
Subject: Re: kern/148928: [ipfw] Problem with loading of ipfw NAT rules during
system startup
Date: Sun, 12 Sep 2010 19:24:39 +0100
The
sure if it was ever commited to -stable or -head.
Regards,
Thomas Vogt
___
freebsd-ipfw@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ipfw
To unsubscribe, send any mail to "[EMAIL PROTECTED]"
pretty useless if these patches
> would hang in GNATS forever.
I hope someone will commit it. DSCP/TOS feature in ipfw is pretty useful
if you're doing VOIP or QoS in generell.
The days where ISPs don't do QoS because they do erything with
"over-provesioning" are over. Most
packets, an interface name can only be used as:
'recv|xmit|via ifXXX'
Thomas
___
freebsd-ipfw@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ipfw
To unsubscribe, send any mail to "[EMAIL PROTECTED]"
your complete ruleset.
Thomas
___
freebsd-ipfw@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ipfw
To unsubscribe, send any mail to "[EMAIL PROTECTED]"
ny in recv fxp0
ipfw add divert natd all from 192.168.1.1/32 to any out xmit fxp0
Thomas
___
freebsd-ipfw@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ipfw
To unsubscribe, send any mail to "[EMAIL PROTECTED]"
length: 351
the dhcp server sends the client an answer, even though ipfw seems to
reject the packet.
Is there any way to block the dhcprequest from reaching the dhcp
server ?
tcpdump version 3.8.3
isc-dhcp3-server-3.0.2_7
FreeBSD lizard 5.4-RC2 FreeBSD 5.4-RC2
best regards
Thoma
12 matches
Mail list logo