RE: outgoing traffic load balancing with multiple ISP

2001-05-03 Thread Ted Mittelstaedt
Your in a bad spot there, because even if you stuff the pipe to ISP#1, then how much additional bandwidth you get out of them is entirely dependent on how stuffed THEIR pipe is to ISP#2. Also, unless ISP#2 has a bigger feed to the core than you have to them, you won't gain anything. But, I have

RE: outgoing traffic load balancing with multiple ISP

2001-05-03 Thread Wai Chan
Our old network admin signed a stupid 5 years contract with ISP 1 (the ISP 1 uses ISP 2 for next hop), and we added ISP 2 when the new network admin arrived (this network admin is smarter becuase he only signed 1 year contract with ISP 2). We cannot get rid of ISP 1 because of the stupid contract

Re: outgoing traffic load balancing with multiple ISP

2001-05-03 Thread Ted Mittelstaedt
Quoting Wai Chan <[EMAIL PROTECTED]>: > I have two ISPs (two different serial links to my router). I want 50% > of > all outgoing traffic go through ISP 1 with ISP 1 provided IP address as > source address, and the other 50% of all outgoing traffic go through ISP > 2 > with ISP 2 provided IP add

RE: outgoing traffic load balancing with multiple ISP

2001-05-03 Thread Wai Chan
The rules I had doesn't make anysense (not working). How about the following "new" rules? /sbin/ipfw -f flush /sbin/ipfw add prob 0.5 fwd isp1.ip.address all from 127.0.0.1 8080 to any /sbin/ipfw add prob 1 fwd isp2.ip.address all from 127.0.0.1 8080 to any /sbin/ipfw add allow tcp from isp1.ip.

outgoing traffic load balancing with multiple ISP

2001-05-03 Thread Wai Chan
I have two ISPs (two different serial links to my router). I want 50% of all outgoing traffic go through ISP 1 with ISP 1 provided IP address as source address, and the other 50% of all outgoing traffic go through ISP 2 with ISP 2 provided IP address as source address. Will this work if I add th

Re: gifs and tcpdump

2001-05-03 Thread Lars Eggert
"Louis A. Mamakos" wrote: > > Should I be able to "tcpdump -i gif0"? tcpdump indicates it's listening > > on gif0 but I never capture anything. Yes, you should. If you send traffic over it, but from what Louis wrote, maybe you don't. > Traffic going over an ESP tunnel never actual transits the

Re: [altq 839] Re: The future of ALTQ, IPsec & IPFILTER playing together ...

2001-05-03 Thread Jason R Thorpe
On Thu, May 03, 2001 at 04:06:01PM +, Gunther Schadow wrote: > Hmm, so you are arguing gainst multiple return values and stateful > inspection? I like simplicity, but wouldn't this impede the ability > to produce high-performance classifiers? The approach I'm taking is to have the filters

Re: [altq 839] Re: The future of ALTQ, IPsec & IPFILTER playing together ...

2001-05-03 Thread Gunther Schadow
Jason R Thorpe wrote: > > On Thu, May 03, 2001 at 10:15:36AM +0200, Fulvio Risso wrote: > > > Not only. > > BPF does not support: > > - stateful inspection > > - multiple return values (only 1/0) > > - multiple outputs (I want to know, for example the amount of traffic IP > > *and* TCP) >

Re: [altq 839] Re: The future of ALTQ, IPsec & IPFILTER playing together ...

2001-05-03 Thread Jason R Thorpe
On Thu, May 03, 2001 at 10:15:36AM +0200, Fulvio Risso wrote: > Not only. > BPF does not support: > - stateful inspection > - multiple return values (only 1/0) > - multiple outputs (I want to know, for example the amount of traffic IP > *and* TCP) My solution to this is to use the classifi

Re: [altq 838] Re: The future of ALTQ, IPsec & IPFILTER playing together ...

2001-05-03 Thread Jason R Thorpe
On Thu, May 03, 2001 at 09:50:25AM +0200, Luigi Rizzo wrote: > wrong. It is an interpreted bytecode, much slower than, > say, approaches which translate individual filters into > native machine code (DPT/DPF ? don't remember the exact reference, > it was some usenix/sigcomm paper). The fact

Re: (KAME-snap 4636) ALTQ and tunnel devices ...

2001-05-03 Thread itojun
>O.K., I have taken the gre-tun.c code and learned how to use the >tun device. Then, I thought, I would simply build an RFC 1933 >IP over IP(v4) tunnel daemon (iptund). This was all very simple >and worked using any kind of protocol, except -- BUMMER -- I >can't open a raw IP socket with the IP

sing netgraph.

2001-05-03 Thread Root Dude
yes you are correct. netgraph will allow you to write any random data to an ethernet port. (no headers will be prepended..) chek out netgraph(3) and nghook as example code. also check the various examples in /usr/share/examples/netgraph too. gotta go.. My flight leaves soon.. (am in Singapore

Re: gifs and tcpdump

2001-05-03 Thread Louis A. Mamakos
> > Should I be able to "tcpdump -i gif0"? tcpdump indicates it's listening > on gif0 but I never capture anything. > > My gif's look like this: > gif0: flags=8091 mtu 1440 > inet 10.3.1.1 --> 10.3.2.1 netmask 0x > physical address inet 207.76.205.83 --> 207.76.205.115 >

Re: (KAME-snap 4633) Re: The future of ALTQ, IPsec & IPFILTER playing together ...

2001-05-03 Thread Darren Reed
In some email I received from Jason R Thorpe, sie wrote: > On Thu, May 03, 2001 at 10:01:18AM +1000, Darren Reed wrote: > > > > BPF "expressions" are literally BPF bytecodes. > > > > Well, one of the goals of IPFilter is it can parse (as rules) a textual > > representation of what's currentl

RE: [altq 839] Re: The future of ALTQ, IPsec & IPFILTER playing together ...

2001-05-03 Thread Fulvio Risso
> -Original Message- > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On > Behalf Of Luigi Rizzo > Sent: Thursday, May 03, 2001 09:50 > To: Gunther Schadow > Cc: Darren Reed; [EMAIL PROTECTED]; [EMAIL PROTECTED]; > [EMAIL PROTECTED]; [EMAIL PROTECTED]; > [EMAIL PROTECTED]; [EMAIL PROT

Re: [altq 838] Re: The future of ALTQ, IPsec & IPFILTER playing together ...

2001-05-03 Thread Bill Fumerola
On Thu, May 03, 2001 at 09:50:25AM +0200, Luigi Rizzo wrote: > wrong. It is an interpreted bytecode, much slower than, > say, approaches which translate individual filters into > native machine code (DPT/DPF ? don't remember the exact reference, > it was some usenix/sigcomm paper). http://www.pd

Re: [altq 838] Re: The future of ALTQ, IPsec & IPFILTER playing together ...

2001-05-03 Thread Luigi Rizzo
> is fast, as fast as it gets. It is my understanding that BPF > is very fast wrong. It is an interpreted bytecode, much slower than, say, approaches which translate individual filters into native machine code (DPT/DPF ? don't remember the exact reference, it was some usenix/sigcomm paper). >

Re: (KAME-snap 4629) Re: The future of ALTQ, IPsec & IPFILTER playing together ...

2001-05-03 Thread Gunther Schadow
Darren Reed wrote: > > In some email I received from Jason R Thorpe, sie wrote: > > On Thu, May 03, 2001 at 08:30:55AM +1000, Darren Reed wrote: > > > > > IPFilter 4.0 will, as part of its general increase in kernel bloat, > > > let you use BPF expressions for matching. There are other things