Date: Sun, 11 Jun 2000 09:30:12 +0200 (CEST) From: Luigi Rizzo <luigi@info.iet.unipi.it> To: cjclark@alum.mit.edu Cc: freebsd-ipfw@FreeBSD.ORG Subject: Re: ARP Hack for BRIDGE? Message-ID: <200006110730.JAA10194@info.iet.unipi.it> In-Reply-To: <20000610133741.G1197@dialin-client.earthlink.net> from "Crist J. Clark" at "Jun 10, 2000 01:37:41 pm"
next in thread | previous in thread | raw e-mail | index | archive | help
> I just noticed the following code hiding in the 4.0-STABLE
> rc.firewall,
>
> # If you're using 'options BRIDGE', uncomment the following line to pass ARP
> #${fwcmd} add 300 pass udp from 0.0.0.0 2054 to 0.0.0.0
it was ahack to let ARP throgu when you use a closed firewall
and net.link.ether.bridge_ipfw=1 i.e. you pass bridged packets
through the firewall.
i think after recent bridging patches by Archie, you are not
able to filter non-ip packets anymore.
cheers
luigi
-----------------------------------+-------------------------------------
Luigi RIZZO, luigi@iet.unipi.it . Dip. di Ing. dell'Informazione
http://www.iet.unipi.it/~luigi/ . Universita` di Pisa
TEL/FAX: +39-050-568.533/522 . via Diotisalvi 2, 56126 PISA (Italy)
Mobile +39-347-0373137
-----------------------------------+-------------------------------------
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-ipfw" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200006110730.JAA10194>
