From owner-freebsd-questions@FreeBSD.ORG Wed Jan 21 12:19:46 2004 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 2546B16A4CE for ; Wed, 21 Jan 2004 12:19:46 -0800 (PST) Received: from corb.mc.mpls.visi.com (corb.mc.mpls.visi.com [208.42.156.1]) by mx1.FreeBSD.org (Postfix) with ESMTP id 1446E43D46 for ; Wed, 21 Jan 2004 12:19:17 -0800 (PST) (envelope-from veldy@veldy.net) Received: from veldy.net (fuggle.veldy.net [209.98.200.33]) by corb.mc.mpls.visi.com (Postfix) with ESMTP id 8CF288394; Wed, 21 Jan 2004 14:19:16 -0600 (CST) Received: from localhost (localhost.veldy.net [127.0.0.1]) by veldy.net (Postfix) with ESMTP id 2A87B1CC61; Wed, 21 Jan 2004 14:19:16 -0600 (CST) Received: from veldy.net ([127.0.0.1]) by localhost (fuggle.veldy.net [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 49839-02; Wed, 21 Jan 2004 14:19:14 -0600 (CST) Received: from 4K3500B (localhost.veldy.net [127.0.0.1]) by veldy.net (Postfix) with SMTP id 93F5E1CC6A; Wed, 21 Jan 2004 14:19:13 -0600 (CST) Message-ID: <009601c3e05b$d67148a0$d037630a@nic.target.com> From: "Thomas T. Veldhouse" To: "Dinesh Nair" , "Adam Seniuk" References: <20040122035407.K532-100000@prophet.alphaque.com> Date: Wed, 21 Jan 2004 14:19:13 -0600 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2800.1106 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106 X-Virus-Scanned: by amavisd-new at veldy.net cc: freebsd-questions@freebsd.org Subject: Re: IPFW and Dynamic Rules X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 21 Jan 2004 20:19:46 -0000 Dinesh Nair wrote: > seems like you're hitting this limit with too many keep-state rules in > your ipfw ruleset. try trimming them down a little, by adding in > specific reverse packet flow rules. > It does not take many at all to hit the limit. This is what I used to use [in /etc/sysctl.conf] on a webserver with great success: # increase the number of dynamic firewall rules allowed net.inet.ip.fw.dyn_max=3000 Tom Veldhouse