Peter Jeremy wrote:
On 2008-Dec-01 17:08:40 -0600, "Sam Fourman Jr." <[EMAIL PROTECTED]> wrote:
So I would like to hear some ideas on how we could use FreeBSD or any other BSD
to limit bandwidth per customer( say one customer (with root access)
per server )
That description sounds like
Wednesday 02 January 2008 18:46:43 kirjutas Tommy Pham:
> Hi Michael,
>
> Here is my ruleset:
>
> NoRouteIPs = "{ 127.0.0.0/8, 192.168.0.0/16, 172.16.0.0/12, 10.0.0.0/8
> }"
>
> # Options: tune the behavior of pf, default values are given.
> #set timeout { interval 10, frag 30 }
> #set timeout { t
On Tuesday 24 April 2007 21:00:41 Dave wrote:
> Hello,
> I've got a machine running ssh and i'm trying to cut down on brute
> force attacks on it. I'm running pf on a freebsd 6.2 box and have added in
> swatch to try to curve these attacks. The problem is nothing is being added
> to either the
On Friday 02 March 2007 00:31, Tom Judge wrote:
> Hi,
>
> I was wondering if there is any way to trace packets as they pass
> through PF and possibly even the network stack. If someone could give
> me some pointers on this it would be greatly appreciated.
>
pass in on rl0 all label "incoming"
pas
On Thursday 16 November 2006 20:55, Andrei Kolu wrote:
> On Thursday 16 November 2006 20:33, Lawrence Farr wrote:
> > > /etc/pf.conf:
> > > pass in on rl0 proto udp from any to (rl0) port 137 keep state
> > >
> > > # tcpdump -n -e -ttt -i pflog0:
On Thursday 16 November 2006 20:33, Lawrence Farr wrote:
> > /etc/pf.conf:
> > pass in on rl0 proto udp from any to (rl0) port 137 keep state
> >
> > # tcpdump -n -e -ttt -i pflog0:
> > rule 0/0(match): block in on rl0: 192.168.2.100.137 >
> > 192.168.2.101.53259: NBT UDP PACKET(137): QUERY; POSITI
On Thursday 16 November 2006 12:03, you wrote:
> On Wed, Nov 15, 2006 at 07:10:51PM +0200, Andrei Kolu wrote:
> > I am struggling here with PF firewall and just can't connect to any samba
> > share if PF is enabled:
>
> That's because the SMB protocol was designed in
Hi!
I am struggling here with PF firewall and just can't connect to any samba
share if PF is enabled:
set block-policy return
set loginterface rl0
scrub in all
block in log all
pass out all keep state
table persist file "/etc/blacklist"
pass inet proto icmp from any to any
antispoof for rl0
pa
On Tuesday 24 October 2006 10:08 pm, you wrote:
> On 10/24/06, Andrei Kolu <[EMAIL PROTECTED]> wrote:
> > I got strange problem here, looks like I am dumb enough to understand
> > this.
> >
> > My current PF rules:
>
> --cut--
>
> > nmap 192.168.2.10
Hello all!
I got strange problem here, looks like I am dumb enough to understand this.
My current PF rules:
--
pfctl -sa
FILTER RULES:
scrub in all fragment reassemble
block drop all
block drop in from no-rout
10 matches
Mail list logo