Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 11 Jun 2000 09:30:12 +0200 (CEST)
From:      Luigi Rizzo <luigi@info.iet.unipi.it>
To:        cjclark@alum.mit.edu
Cc:        freebsd-ipfw@FreeBSD.ORG
Subject:   Re: ARP Hack for BRIDGE?
Message-ID:  <200006110730.JAA10194@info.iet.unipi.it>
In-Reply-To: <20000610133741.G1197@dialin-client.earthlink.net> from "Crist J. Clark" at "Jun 10, 2000 01:37:41 pm"

next in thread | previous in thread | raw e-mail | index | archive | help

> I just noticed the following code hiding in the 4.0-STABLE
> rc.firewall,
> 
>   # If you're using 'options BRIDGE', uncomment the following line to pass ARP
>   #${fwcmd} add 300 pass udp from 0.0.0.0 2054 to 0.0.0.0

it was ahack to let ARP throgu when you use a closed firewall
and net.link.ether.bridge_ipfw=1 i.e. you pass bridged packets
through the firewall.

i think after recent bridging patches by Archie, you are not
able to filter non-ip packets anymore.

	cheers
	luigi

-----------------------------------+-------------------------------------
  Luigi RIZZO, luigi@iet.unipi.it  . Dip. di Ing. dell'Informazione
  http://www.iet.unipi.it/~luigi/  . Universita` di Pisa
  TEL/FAX: +39-050-568.533/522     . via Diotisalvi 2, 56126 PISA (Italy)
  Mobile   +39-347-0373137
-----------------------------------+-------------------------------------


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-ipfw" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200006110730.JAA10194>