From owner-freebsd-hackers Sat Mar 13 10:13:30 1999 Delivered-To: freebsd-hackers@freebsd.org Received: from rt2.synx.com (tech.boostworks.com [194.167.81.239]) by hub.freebsd.org (Postfix) with ESMTP id 5250F14ED6 for ; Sat, 13 Mar 1999 10:13:26 -0800 (PST) (envelope-from root@synx.com) Received: from synx.com (rn.synx.com [192.1.1.241]) by rt2.synx.com (8.9.1/8.9.1) with ESMTP id TAA29395; Sat, 13 Mar 1999 19:19:32 +0100 (CET) Message-Id: <199903131819.TAA29395@rt2.synx.com> Date: Sat, 13 Mar 1999 19:11:19 +0100 (CET) From: Remy Nonnenmacher Reply-To: remy@synx.com Subject: Re: ipflow and ipfirewall To: ru@ucb.crimea.ua Cc: hackers@FreeBSD.ORG In-Reply-To: <19990313200150.A83040@relay.ucb.crimea.ua> MIME-Version: 1.0 Content-Type: TEXT/plain; CHARSET=US-ASCII Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG On 13 Mar, Ruslan Ermilov wrote: > Hi! > > I thought about starting to use fast IP forwarding, but... > > It seems that such "fast forwardable" packets, when passed from > ether_input(), for example, just simply bypass all firewall checks. > > Am I right? > you are. RN. IaM To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message