From owner-freebsd-questions Wed Feb 16 8:43:48 2000 Delivered-To: freebsd-questions@freebsd.org Received: from builder.freebsd.org (builder.FreeBSD.ORG [204.216.27.24]) by hub.freebsd.org (Postfix) with ESMTP id 9C5FF37B50B for ; Wed, 16 Feb 2000 08:43:47 -0800 (PST) (envelope-from jbeley@daemon9.cameron.edu) Received: from daemon9.cameron.edu (daemon9.cameron.edu [164.58.116.140]) by builder.freebsd.org (Postfix) with ESMTP id 2B5A0132E2 for ; Wed, 16 Feb 2000 08:43:12 -0800 (PST) Received: by daemon9.cameron.edu (Postfix, from userid 1001) id 14D1510201; Wed, 16 Feb 2000 10:43:09 -0600 (CST) Date: Wed, 16 Feb 2000 10:43:09 -0600 From: Jeff Beley To: questions@FreeBSD.ORG Subject: ipfw and nmap Message-ID: <20000216104308.A18535@daemon9.cameron.edu> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.1.3i Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG I have a FreeBSD bridge setup with firewalling. I'd like to be able to filter nmap port scans using ipfw(beacuse ipf doesn't work with bridges in FreeBSD). Does any one have any ipfw rules to that effect? --Jeff To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message