Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 27 Dec 2011 15:41:48 +0100
From:      Luigi Rizzo <rizzo@iet.unipi.it>
To:        Pawel Tyll <ptyll@nitronet.pl>
Cc:        freebsd-ipfw@freebsd.org, "Alexander V. Chernikov" <melifaro@freebsd.org>, freebsd-net@freebsd.org
Subject:   Re: Firewall Profiling.
Message-ID:  <20111227144148.GA65684@onelab2.iet.unipi.it>
In-Reply-To: <143974317.20111227151804@nitronet.pl>
References:  <1498545030.20111227015431@nitronet.pl> <4EF9ADBC.8090402@FreeBSD.org> <623366116.20111227150047@nitronet.pl> <20111227142600.GA65456@onelab2.iet.unipi.it> <143974317.20111227151804@nitronet.pl>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, Dec 27, 2011 at 03:18:04PM +0100, Pawel Tyll wrote:
> > plans, yes - not sure how long it will take. I have compiled
> > ipfw+dummynet as a standalone module (outside the kernel)
> > but have not yet hooked the code to netmap to figure out how fast
> > it can run.
> If  I  understand  correctly, this would require netmap to catch every
> packet from interfaces that would be firewalled/routed using ipfw, and
> then  during processing determine if packet is destined for local host
> or  network  and  write it out to host kernel for normal processing or
> quickly  write it out to some destination OS? In other words, userland
> routing  engine using netmap? :)

correct.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20111227144148.GA65684>