Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 22 Jun 2016 08:05:21 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-amd64@FreeBSD.org
Subject:   [Bug 210408] Problem with outgoing traffic using ipfw and kernel nat originated from local address
Message-ID:  <bug-210408-6-54BxGdF1k8@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-210408-6@https.bugs.freebsd.org/bugzilla/>
References:  <bug-210408-6@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D210408

smithi@nimnet.asn.au changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |smithi@nimnet.asn.au

--- Comment #1 from smithi@nimnet.asn.au ---
>From ipfw(8), second last paragraph:

"    Due to the architecture of libalias(3), ipfw nat is not compatible with
     the TCP segmentation offloading (TSO).  Thus, to reliably nat your net-
     work traffic, please disable TSO on your NICs using ifconfig(8)."

I don't know about RXCSUM & TXCSUM in this context, but NAT is only for
IPv4 - make sure your NAT rules only apply to ipv4 packets specifically -
 and you certainly need to turn TSO4 off when using either kernel NAT
 or natd(8), both of which use libalias(3).

--=20
You are receiving this mail because:
You are on the CC list for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-210408-6-54BxGdF1k8>