Date: Fri, 2 Feb 2001 20:10:59 +0100 From: Hroi Sigurdsson <hroi@netgroup.dk> To: "Thomas T. Veldhouse" <veldy@veldy.net> Cc: freebsd-stable@FreeBSD.ORG, freebsd-net@FreeBSD.ORG Subject: Re: Bridge and IPFW woes ... Message-ID: <20010202201059.A48414@chewbacca.netgroup.dk> In-Reply-To: <006801c08d39$6974f9e0$3028680a@tgt.com>; from veldy@veldy.net on Fri, Feb 02, 2001 at 10:58:48AM -0600 References: <006801c08d39$6974f9e0$3028680a@tgt.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, Feb 02, 2001 at 10:58:48AM -0600, Thomas T. Veldhouse wrote: > If I change the bridging code over to NETGRAPH - this scenario does not > happen. All communication works just fine between all the hosts and the > Internet, however, all firewall rules that would apply to Host B and C seem > to quit working. In other words - all the hosts, except for Host A, are > left completely unprotected. I have tried using IPFILTER with both the in > kernel bridging code and NETGRAPH and have come to the same conclusion. > There is no way to filter the bridged packets. Netgraph doesn't support ipfw. It is in the TODO and look at this from sys/netgraph/ng_bridge.c: /* Run packet through ipfw processing, if enabled */ if (priv->conf.ipfw[linkNum] && fw_enable && ip_fw_chk_ptr != NULL) { /* XXX not implemented yet */ } It would be really nice to have code in there instead of that comment or a seperate ipfw netgraph node altogether :-) I've been reading through some of the netgraph code and it is a beautiful thing to behold. -- Hroi Sigurdsson hroi@netgroup.dk Netgroup A/S http://www.netgroup.dk To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-stable" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010202201059.A48414>