On Thu, 17 Feb 2005, Jon Noack wrote:
> Henry Su wrote:
> > You can configure both NIC as /32. You also need proxy arp installed and
> > listen on both NIC. Then the traffic should be able to follow between two
> > NICs. Since Proxy ARP always answers its MAC to client
You can configure both NIC as /32. You also need proxy arp installed and
listen on both NIC. Then the traffic should be able to follow between two
NICs. Since Proxy ARP always answers its MAC to clients, so the clients can
always send traffic to em1 or em0. Based on client's mac entry in the ARP
ta
You can google it, there're many articles.
Breifly answer your question:
1. Compile kernel to support ipfw (firewall).
2. Edit /etc/sysctl.conf add "net.inet.ip.forwarding=1" for routing.
Good luck.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of angelito m
No, we do not have this problem. If it works on your LAN, it should work on
Internet too.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of jack xiao
Sent: Monday, March 25, 2002 11:33 AM
To: [EMAIL PROTECTED]
Subject: VLAN questions
Hi,
I set up VLAN
Hi, Julian:
Do you know this code in ip_fw.c?
#define BRIDGED (cookie == &bridgeCookie)
hlen = ip->ip_hl << 2;
Is this cause bridging fwd or divert problem? If so, how can we change it
for bridging ipfw fwd or divert?
Thanks.
******
Henry Su
Is it possible to use ipfw provide packet header details to a user program
for authentication? Any clue will be greatly appreciated.
**
Henry Su *
NTT MCL *
**
To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-net" in the b
?
__ ___
| |crossover cable | |
|test1|>| test2(ipfw,proxy)|-->router->Internet
|_| |__|
-Original Message-
From: Julian Elischer [mailto:[EMAIL PROTECTED]]
Sent: Friday, December 28, 2001 4:59 PM
To: Henry Su
C
Hi, Julian:
Could you please give me some code example for using the 'ksocket' node to
open 'in kernel'
sockets? Thanks.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Julian Elischer
Sent: Thursday, December 20, 2001 3:08 PM
To:
I tried localhost, it is an issue for me. It's 4.3 freebSD. Is this a bug?
-Original Message-
From: Crist J . Clark [mailto:[EMAIL PROTECTED]]
Sent: Thursday, December 27, 2001 11:19 PM
To: Henry Su
Cc: Julian Elischer; [EMAIL PROTECTED]
Subject: Re: Why is my ipfw(8) ``fwd'
Same thing, it only works for telneting to test2:80 for test1.
-Original Message-
From: Julian Elischer [mailto:[EMAIL PROTECTED]]
Sent: Thursday, December 27, 2001 5:31 PM
To: Henry Su
Cc: [EMAIL PROTECTED]
Subject: RE: socket call in the kernel
put the forward rule as rule 50 and
http://www.unixguide.net/freebsd/faq/09.20.shtml
Is there a way to configure your machine not drop these packets?
To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-net" in the body of the message
Hi, Julian:
Here's all the rules that I am using:
[17:13:59][root@test2:~]$ ipfw show
001000 0 allow ip from any to any via lo0
002000 0 deny ip from any to 127.0.0.0/8
003000 0 deny ip from 127.0.0.0/8 to any
004000 0 allow udp from 0.0.0.0 2054 to 0.0.0.0
00500
**
Henry Su *
NTT MCL *
**
On Thu, 27 Dec 2001, Julian Elischer wrote:
>
>
>
>
> On Thu, 27 Dec 2001, Henry Su wrote:
>
> > Thanks a lot Julian. Please let me know if u need more info.
> >
> >
> > My goal is
Thanks a lot Julian. Please let me know if u need more info.
My goal is using test2 as authentication server, when http request pass
through test2 box, test2 will redirect to an authentication url on itself.
__ ___
| |crossover cable |
do it. It has next_hop for fwd. I do not know how to do
packet manupunation in ip_fw.c's chk func.
Thanks a lot.
******
Henry Su *
NTT MCL *
**
On Wed, 26 Dec 2001, Julian Elischer wrote:
>
>
> is your server binding to 216.115.102.75?
> if you
et can not be received at port 8800.
Thanks.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Julian Elischer
Sent: Wednesday, December 26, 2001 4:08 PM
To: Henry Su
Cc: [EMAIL PROTECTED]
Subject: RE: socket call in the kernel
On Wed, 26 Dec 2001, H
Behalf Of Julian Elischer
Sent: Thursday, December 20, 2001 3:08 PM
To: Henry Su
Cc: [EMAIL PROTECTED]
Subject: RE: socket call in the kernel
I have two answers:
1/ Use ipfw add NNN fwd localhost,8001 [deny criteria]
to make the packet that is denied go to a default server listenning on
s, buffer, BUFSIZ)) > 0)
write(1, buffer, bytes);
*/
}
}
/* end debug */
return(IP_FW_PORT_DENY_FLAG);
-Original Message-
From: Julian Elischer [mailto:[EMAIL PROTECTED]]
Sent: Thursday, December 20, 2001 12:59 PM
To: Henry Su
Cc: [EMAIL PROTECTED]
Subj
rnel level? If not, how
can I accomplish socket communication in the kernel level?
Thanks.
----
Henry Su
NTT Multimedia Communications Laboratories, Inc.
250 Cambridge Avenue Suite 300
Palo Alto, CA 94306, USA (PST:UTC -8H)
Tel: +1 650 833 3652
F
19 matches
Mail list logo