Date: Thu, 21 Feb 2002 08:49:55 -0800 From: "Crist J. Clark" <cjc@FreeBSD.ORG> To: Simon J Mudd <sjmudd@pobox.com> Cc: freebsd-questions@FreeBSD.ORG Subject: Re: ipfw and getting the interface logged Message-ID: <20020221084955.C48401@blossom.cjclark.org> In-Reply-To: <Pine.LNX.4.44.0202211714050.30303-100000@phoenix.ea4els.ampr.org>; from sjmudd@pobox.com on Thu, Feb 21, 2002 at 05:18:59PM %2B0100 References: <Pine.LNX.4.44.0202211714050.30303-100000@phoenix.ea4els.ampr.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Feb 21, 2002 at 05:18:59PM +0100, Simon J Mudd wrote: > Hello, > > I'm running 4.5-STABLE with ipfw and having trouble with my firewall > rules. However they are probably my own doing. > > Via syslog I see messages of the type: > > Feb 21 16:13:56 unicorn /kernel: Connection attempt to TCP 44.133.228.2:6000 from 44.133.228.5:2187 > Feb 21 16:13:57 unicorn /kernel: Connection attempt to TCP 44.133.228.2:6000 from 44.133.228.5:2188 Which are from net.inet.tcp.log_in_vain being set, not from ipfw(8). > Which I think my rules should allow: > > ${fwcmd} add pass all from ${inet} to ${inet} via ${iif} And they are letting it through if they are being logged in vain. > where > > # set these to your inside interface network and netmask and ip > iif="ed0" > inet="44.133.228.0/26" > iip="44.133.228.2" > > How can I get syslog to log more information such as at least the > interface over which the traffic is arriving? If ipfw(8) was logging the packets, the interface information would be there. -- Crist J. Clark | cjclark@alum.mit.edu | cjclark@jhu.edu http://people.freebsd.org/~cjc/ | cjc@freebsd.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020221084955.C48401>