On Mar 2, 2007, at 6:53 PM, Sergey N. Romanov wrote:
We have PF-related problems on our FreeBSD 6.2 server. This is
web-server and we have large problems even with not so much requests
amount (may be if more than 100-200/second) - we can't ping host,
can't
make any connection to host and etc.
Hello,
We have PF-related problems on our FreeBSD 6.2 server. This is
web-server and we have large problems even with not so much requests
amount (may be if more than 100-200/second) - we can't ping host, can't
make any connection to host and etc. We can solved this problem only
after PF restart (
Hi,
I'm not sure if this is a bug or feature, but the trailing slash used to
split long lines works for comments too.
Thanks,
Brad
[EMAIL PROTECTED]/etc][31]% cat pf.conf
pass all
# some comments \
block all
pass all
[EMAIL PROTECTED]/etc][32]% /etc/rc.d/pf reload
Reloading pf rules.
[EMAIL PROT
Greg Hennessy wrote:
I actually need to see how a packet that the IPSEC code generates is
passes through PF (What rules it is (not) matching etc). At the moment
it seems that it is either a) not passing through pf at all, b) For
some
reason not matching the source routing rule.
Is there anyway
Greg Hennessy wrote:
I was wondering if there is any way to trace packets as they pass
through PF and possibly even the network stack. If someone could give
me some pointers on this it would be greatly appreciated.
A full tcpdump on the ingress and egress interfaces,a bpf filter will find
the
>
> I actually need to see how a packet that the IPSEC code generates is
> passes through PF (What rules it is (not) matching etc). At the moment
> it seems that it is either a) not passing through pf at all, b) For
> some
> reason not matching the source routing rule.
>
> Is there anyway to see
> I was wondering if there is any way to trace packets as they pass
> through PF and possibly even the network stack. If someone could give
> me some pointers on this it would be greatly appreciated.
A full tcpdump on the ingress and egress interfaces,a bpf filter will find
the interesting bits