From owner-freebsd-ipfw Thu May 30 1: 2:48 2002 Delivered-To: freebsd-ipfw@freebsd.org Received: from c015.snv.cp.net (h003.c015.snv.cp.net [209.228.35.118]) by hub.freebsd.org (Postfix) with SMTP id 80B1D37B403 for ; Thu, 30 May 2002 01:02:45 -0700 (PDT) Received: (cpmta 16291 invoked from network); 30 May 2002 01:02:45 -0700 Date: 30 May 2002 01:02:45 -0700 Message-ID: <20020530080245.16290.cpmta@c015.snv.cp.net> X-Sent: 30 May 2002 08:02:45 GMT Received: from [65.69.2.157] by mail.compgeek.com with HTTP; 30 May 2002 01:02:45 PDT Content-Type: text/plain Content-Disposition: inline Mime-Version: 1.0 To: artem@mipk-kspu.kharkov.ua From: Jon Noack Cc: freebsd-ipfw@FreeBSD.ORG X-Mailer: Web Mail 3.9.3.11 Subject: Re: peer-to-peer asymmetric simulation X-Sent-From: noackjr@compgeek.com Sender: owner-freebsd-ipfw@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG > Use sysctl to set net.inet.ip.fw.one_pass=0 > > Packets from pipes will be reinserted in the ipfw to the next rule. > Hope this will be helpful. Not with bridging (from http://info.iet.unipi.it/~luigi/ip_dummynet/): net.inet.ip.fw.one_pass: 1 Forces a single pass through the firewall. If set to 0, packets coming out of a pipe will be reinjected into the firewall starting with the rule after the matching one. NOTE: there is always one pass for bridged packets. Jon Noack To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ipfw" in the body of the message