From owner-freebsd-questions@FreeBSD.ORG Sun May 18 11:15:50 2003 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 4BAA337B401; Sun, 18 May 2003 11:15:49 -0700 (PDT) Received: from dhumketu.homeunix.net (dialpool-210-214-66-43.maa.sify.net [210.214.66.43]) by mx1.FreeBSD.org (Postfix) with ESMTP id 1086043F85; Sun, 18 May 2003 11:15:47 -0700 (PDT) (envelope-from freebsd@dhumketu.cjb.net) Received: by dhumketu.homeunix.net (Postfix, from userid 1000) id 8ED18580; Sun, 18 May 2003 23:43:23 +0530 (IST) Date: Sun, 18 May 2003 23:43:23 +0530 From: Shantanu Mahajan To: Rohit Neupane Message-ID: <20030518181323.GA531@dhumketu.homeunix.net> Mail-Followup-To: Rohit Neupane , freebsd-isp@freebsd.org, freebsd-questions@freebsd.org References: <3EC723F7.9090001@wlink.com.np> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <3EC723F7.9090001@wlink.com.np> User-Agent: Mutt/1.4i Organization: Hmmm... I dunno X-OS: FreeBSD 4.8-STABLE i386 cc: freebsd-isp@freebsd.org cc: freebsd-questions@freebsd.org Subject: Re: Transproxy and ipfw X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 18 May 2003 18:15:50 -0000 +++ Rohit Neupane [freebsd] [18-05-03 11:56 +0545]: | Hi, | `ipfw add 50 fwd 127.0.0.1,3128 tcp from any to any 80` returns ipfw: | getsockopt(IP_FW_ADD): Invalid argument | | I'm running FreeBSD 4.6 with the default kernel. I guess | IPFIREWALL_FORWARD option is enabled in kernel. | Do i need to enable it in /etc/rc.conf? if so then how? | | Thanks a lot. | Regards, | Rohit Neupane | ------------------------------ options IPFIREWALL #firewall options IPFIREWALL_VERBOSE #enable logging to syslogd(8) options IPFIREWALL_FORWARD #enable transparent proxy support options IPFIREWALL_VERBOSE_LIMIT=100 #limit verbosity options IPFIREWALL_DEFAULT_TO_ACCEPT #allow everything by default options IPV6FIREWALL #firewall for IPv6 options IPV6FIREWALL_VERBOSE options IPV6FIREWALL_VERBOSE_LIMIT=100 options IPV6FIREWALL_DEFAULT_TO_ACCEPT Above are the relavent options required in kernel. Other option is # kldload ipfw and then test the ipfw rule. Regards, Shantanu -- Madness has no purpose. Or reason. But it may have a goal.