Date: Mon, 29 Jul 2019 14:22:54 -0400 From: mike tancsa <mike@sentex.net> To: Kristof Provost <kp@freebsd.org>, Paul Webster <paul.g.webster@googlemail.com> Cc: "freebsd-pf@freebsd.org" <freebsd-pf@freebsd.org> Subject: Re: pf and dummynet Message-ID: <8e58346b-5540-b47e-e446-1a5bb11743d3@sentex.net> In-Reply-To: <20190729175134.GE10541@vega.codepro.be> References: <d68129cd-40a4-e065-32c3-3f574eca537e@sentex.net> <5d3f305f.1c69fb81.90047.531f@mx.google.com> <20190729175134.GE10541@vega.codepro.be>
next in thread | previous in thread | raw e-mail | index | archive | help
On 7/29/2019 1:51 PM, Kristof Provost wrote: > > Also beware of gotchas with things like IPv6 fragment handling or > route-to. > > I do not consider mixing firewalls to be a supported configuration. If > it breaks you get to keep the pieces. Thanks, I was worried about that! Is there a way to get altq to limit inbound traffic directed to a server ? I would prefer not mixing and matching, but I dont see any other way other than going to ipfw which I would rather not ---Mike
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?8e58346b-5540-b47e-e446-1a5bb11743d3>