Date: Mon, 28 Jan 2002 22:17:24 -0800 (PST) From: Matthew Dillon <dillon@apollo.backplane.com> To: "Thomas T. Veldhouse" <veldy@veldy.net> Cc: <andrew.cowan@hsd.com.au>, "Nate Williams" <nate@yogotech.com>, "Freebsd-Stable" <freebsd-stable@FreeBSD.ORG> Subject: Re: Proposed Solution To Recent "firewall_enable" Thread. [Please Read] Message-ID: <200201290617.g0T6HO036172@apollo.backplane.com> References: <NEBBJIKPNGEHLCBOLMDMMEBOFPAC.andrew.cowan@hsd.com.au> <001e01c1a873$bdf12f10$0101a8c0@cascade>
next in thread | previous in thread | raw e-mail | index | archive | help
Lets not make things even more confusing then they already are. The answer to me is simple: If firewall_enable is "NO" and ipfw is active, /etc/rc* should simply add a rule to allow all traffic. Simple. Problem solved. -Matt :What would the expected functionality be for this? : :ipfw_enable=no :ipfw_firewall_enable=yes : :And what would the expected funcationality be for this? : :ipfw_enable=yes :ipfw_firewall_enable=no : :I would expect the former to not load the ipfw module, so what does the :firewall enable option do? : :I would expect the latter to load the ipfw module and the latter to not run :the firewall script. Seems to make sense, except what happens when you have :IPFIREWALL built into the kernel? : :Tom Veldhouse :veldy@veldy.net To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-stable" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200201290617.g0T6HO036172>