hello,
I use netgraph for :
hatm: <-> atmllc <->em
also I use vcc chanels:
ngctl msg hatm0: cpcsinit {name="sig1" aal=5 vci=55}
I need to set some more vcc parameters ( ubr, pixel-rate, burst-size)
it was possible to do using atmconfig
( atmconfig natm add 1.1.1.1 hatm0 0
I recently swaped ADSL isp's and have been experiencing pppoe issues ever since.
Basically the issue is this, ppp connects fine, and the connection
will work, but after around 45seconds the connection will stop
receving data, even though all analysis reveals that we are still
connected.
After muc
Hi ,
checkout the 'netnice' tool , here is the link :
http://www.netnice.org/
you can use 'netnice' just like the well know 'nice' except the fact that
the ressource managed by 'nice' is the cpu , while 'netnice' manages the
network interface access.
Enjoy ,
-- Saber
On Tue, September 7,
On Sep 7, 2004, at 9:53 AM, Vladimir Terziev wrote:
When HTTP traffic is forwarded with Squid all is ok, because the
proper X-FORWARDED-FOR header is set and we are able to identify the
request issuer. When Squid forwards HTTPS traffic to us, situation is
different, because the only IP which we
On Tue, 7 Sep 2004, Omer Faruk Sen wrote:
> Hi,
>
> I have given a work to test VPN performance of FreeBSD IPSEC subsystem. I am
> not that familiar with ipsec terms. (just started to read IPSEC documents
> about 5 days ago)I wanted to share my observations:
>
> My hardware is : P IV 2.8, 256 MB
George S wrote:
> Hi Ian,
>
> Thanks for your response.
>
> Yes, the behaviour is exactly as I describe. What happens is that on its way
> back, the SYN+ACK packet with DST IP/PORT 10.0.0.2 and SRC IP/PORT
> 69.196.154.5/80 hits rule #1 where there is a keep-state. This causes ipfw
> to check all
Hi all,
I have the following prolem:
Our ISP makes audit of all web traffic going to our servers in order to
prevent different kind of attacks against them. The ISP then forwards the traffic
which is clean using Squid.
Our web application needs to know the clie
Hi,
I have given a work to test VPN performance of FreeBSD IPSEC subsystem. I am
not that familiar with ipsec terms. (just started to read IPSEC documents
about 5 days ago)I wanted to share my observations:
My hardware is : P IV 2.8, 256 MB, fxp NIC
First of all I have used FreeBSD 4.10 Sta
Hi Ian,
Thanks for your response.
Yes, the behaviour is exactly as I describe. What happens is that on its way
back, the SYN+ACK packet with DST IP/PORT 10.0.0.2 and SRC IP/PORT
69.196.154.5/80 hits rule #1 where there is a keep-state. This causes ipfw
to check all dynamic rules implicitly (as pe
В вт, 07/09/2004 в 10:38 +0300, Dmitriy V. Andrushko пишет:
> > ifconfig_rl1="inet 192.168.10.1 netmask 255.255.255.0"
> > ifconfig_rl0="inet 192.168.10.2 netmask 255.255.255.0"
>
> You can't have two network interfaces on the same subnet. You can
> configure your net next way:
> ifconfig_rl1
> ifconfig_rl1="inet 192.168.10.1 netmask 255.255.255.0"
> ifconfig_rl0="inet 192.168.10.2 netmask 255.255.255.0"
You can't have two network interfaces on the same subnet. You can
configure your net next way:
ifconfig_rl1="inet 192.168.10.1 netmask 255.255.255.0"
ifconfig_rl0="inet 192.168.2
Hello kamal,
I am not sure but this may be the result of the attempt to assign inet
address from the subnet that is already used on the rl0 iface. If you
are sure that that you need this behaviour, use netmask of -1 on the
rl1 iface.
Tuesday, September 07, 2004, 11:10:30 AM, kamal kc wrote:
kk>
George S wrote:
> Hello all,
>
> I've been having some trouble with this strange ipfw configuration and I am
> pretty sure it is probably a bug. I posted a note to freebsd-ipfw a little
> while ago, but I think the problem is better demonstrated with a figure.
Are you sure that you perormed the t
i have run into a mysterious problem.
The thing is that i wanted to configure to NIC cards.
I just put the card in the slot and booted FreeBSD. The
card was detected. When i wanted to configure the nic card using the
ifconfig command the following error message was reported.
ifconfig: ioctl (SIOC
14 matches
Mail list logo