Re: pf problem with table

2006-04-20 Thread Reinhold Platzoeder
On Thu, 20 Apr 2006 09:21:40 +0200 [EMAIL PROTECTED] (Peter N. M. Hansteen) wrote: > Reinhold Platzoeder <[EMAIL PROTECTED]> writes: > > > My problem looks like the file is to big to be loaded into pf > > My firewall stops responding when the file has about 7000 IPs in it > > The old file has 104

Re: pf problem with table

2006-04-20 Thread Peter N. M. Hansteen
Reinhold Platzoeder <[EMAIL PROTECTED]> writes: > My problem looks like the file is to big to be loaded into pf > My firewall stops responding when the file has about 7000 IPs in it > The old file has 104450 IPs in it and I would like to block them You could try manipulating the table entries lim

Re: pf problem with table

2006-04-19 Thread Reinhold Platzoeder
On Wed, 19 Apr 2006 07:41:33 -0400 "fbsd" <[EMAIL PROTECTED]> wrote: > Error msg means there is something wrong with the content of > /etc/pfdata/blocklist-p2p > > check that there are no blank lines in that file. > > make file with only ten entries and test. > Then add more content until you br

RE: pf problem with table

2006-04-19 Thread fbsd
Error msg means there is something wrong with the content of /etc/pfdata/blocklist-p2p check that there are no blank lines in that file. make file with only ten entries and test. Then add more content until you break it. maybe 1.7 MB file size is to large for max table size -Original Messa

re: PF problem!!!

2005-04-25 Thread Didier Wiroth
did you enable the default variables in rc.conf (or rc.conf.local)? see: grep -e pf_ -e pflog /etc/defaults/rc.conf and set the appropriate variables. regards, didier ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/lis

Re: PF problem!!!

2005-04-25 Thread Peter N. M. Hansteen
"Fafa Diliha Romanova" <[EMAIL PROTECTED]> writes: > My question is: Why do I have to type this after everytime I've rebooted > to make my NAT gateway server allow Internet access to my workstation? Your rule set does not contain any rules which let packets pass *in* on your internal interface.