From owner-freebsd-hackers Tue Jul 18 15:20:48 2000 Delivered-To: freebsd-hackers@freebsd.org Received: from PacHell.TelcoSucks.org (pachell.telcosucks.org [207.90.181.5]) by hub.freebsd.org (Postfix) with ESMTP id B1E1637B6CF for ; Tue, 18 Jul 2000 15:20:44 -0700 (PDT) (envelope-from ulf@PacHell.TelcoSucks.org) Received: (from ulf@localhost) by PacHell.TelcoSucks.org (8.9.3/8.9.1) id PAA78456 for hackers@FreeBSD.org; Tue, 18 Jul 2000 15:20:44 -0700 (PDT) (envelope-from ulf) Date: Tue, 18 Jul 2000 15:20:44 -0700 From: Ulf Zimmermann To: hackers@FreeBSD.org Subject: Maybe OT, maybe not Message-ID: <20000718152043.A18798@PacHell.TelcoSucks.org> Reply-To: ulf@Alameda.net Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Mailer: Mutt 1.0i Organization: Alameda Networks, Inc. X-Operating-System: FreeBSD 3.4-STABLE Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG Hello, I got a problem I need to get "solved" as fast as possible. I have here a firewall box (FreeBSD based, yeah!) and need to test this in conjunction with web crawling. Our current FW1 based Sun firewalls die very fast. I need to emulate about 9,000 or more concurrent open tcp sessions. Each session should be random sized from 500 to maybe 20,000 bytes data transferred. In addition to these I need x amount of initiated tcp sessions which never get answered. FW1 with its tcp connection table will create an entry for these "failed" sessions and hold it up to its time out. Our crawlers do not. So I am basicly looking for a load generator and a "server". Anyone got something laying around like that ? -- Regards, Ulf. --------------------------------------------------------------------- Ulf Zimmermann, 1525 Pacific Ave., Alameda, CA-94501, #: 510-769-2936 Alameda Networks, Inc. | http://www.Alameda.net | Fax#: 510-521-5073 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message