Date: Tue, 27 Dec 2011 15:41:48 +0100 From: Luigi Rizzo <rizzo@iet.unipi.it> To: Pawel Tyll <ptyll@nitronet.pl> Cc: freebsd-ipfw@freebsd.org, "Alexander V. Chernikov" <melifaro@freebsd.org>, freebsd-net@freebsd.org Subject: Re: Firewall Profiling. Message-ID: <20111227144148.GA65684@onelab2.iet.unipi.it> In-Reply-To: <143974317.20111227151804@nitronet.pl> References: <1498545030.20111227015431@nitronet.pl> <4EF9ADBC.8090402@FreeBSD.org> <623366116.20111227150047@nitronet.pl> <20111227142600.GA65456@onelab2.iet.unipi.it> <143974317.20111227151804@nitronet.pl>
next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, Dec 27, 2011 at 03:18:04PM +0100, Pawel Tyll wrote: > > plans, yes - not sure how long it will take. I have compiled > > ipfw+dummynet as a standalone module (outside the kernel) > > but have not yet hooked the code to netmap to figure out how fast > > it can run. > If I understand correctly, this would require netmap to catch every > packet from interfaces that would be firewalled/routed using ipfw, and > then during processing determine if packet is destined for local host > or network and write it out to host kernel for normal processing or > quickly write it out to some destination OS? In other words, userland > routing engine using netmap? :) correct.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20111227144148.GA65684>