search for: one_pass

Displaying 4 results from an estimated 4 matches for "one_pass".

Did you mean: ice_pass
2003 May 24
1
ipfirewall(4)) cannot be changed
root@vigilante /root cuaa1# man init |tail -n 130 |head -n 5 3 Network secure mode - same as highly secure mode, plus IP packet filter rules (see ipfw(8) and ipfirewall(4)) cannot be changed and dummynet(4) configuration cannot be adjusted. root@vigilante /root cuaa1# sysctl -a |grep secure kern.securelevel: 3 root@vigilante /root cuaa1# ipfw show 00100 0 0 allow
2003 May 30
1
Strange startup messages
...12 stats RW *Handler Opaque/struct 13 accept_sourceroute RW *Handler Int 14 fastforwarding RW *Handler Int 15 keepfaith RW *Handler Int 16 gifttl RW *Handler Int 100 subnets_are_local RW *Handler Int 101 fw RW Node 100 enable RW *Handler Int 101 one_pass RW *Handler Int 102 debug RW *Handler Int 103 verbose RW *Handler Int 104 verbose_limit RW *Handler Int 105 dyn_buckets RW *Handler Int 106 curr_dyn_buckets R *Handler Int 107 dyn_count R *Handler Int 108 dyn_max RW *Handler Int 109...
2003 May 07
4
IPFW Bandwidth throttling?
I am trying to limit outgoing SMTP traffic to about 14 Mbps and these are the IPFW rules I am using. ${fwcmd} add pipe 1 tcp from 192.168.0.0/24 to any 25 out via dc0 ${fwcmd} pipe 1 config bw 14Mbit/s I've tried multiple tweaks to the pipe rule and I seem to be missing something. I only get about half the bandwidth I specify. Is this normal behavior? Is there something wrong
2003 Oct 30
1
Using racoon-negotiated IPSec with ipfw and natd
[ -netters, please Cc me or security@ with replies. ] I'm running into trouble integrating dynamic racoon-based IPSec into a network with ipfw and natd. I need to be able to allow VPN access from any address from authenticated clients. I've got the dynamic VPN working, with racoon negotiating SAs and installing SPs, but the problem is that I can't tell whether an incoming packet on