similar to: ebtables and HTB bandwidth shaping - change frame or packet sizes

Displaying 20 results from an estimated 4000 matches similar to: "ebtables and HTB bandwidth shaping - change frame or packet sizes"

2003 Dec 09
1
Traffic shapper and bridge
The university is like a ISP to give access to Internet to several faculties, but we want to restrict the traffic, we needed a traffic shaper to do this, I wanted to have something like (Packeteer INTEL NETSTRUCTURE 7370 aplication server) which it is a bridge where I not need IP for my networks cards. somebody knows one good one to work it on Linux? Regards.
2005 Jun 30
4
HTB: shaping internet bandwidth but don''t shape local network traffic
i got this problem, i want to shape my clients internet bw, but i don''t want to shape my local network traffic. For information, my clients using wireless to connect to my router[192.168.1.254]. when the clients request data from internet, example download from www.download.com, i want to shape his bandwidth, but when the clients [192.168.1.1] want to download from my file server example
2023 Apr 24
13
[Bug 1674] New: ebtables causing packet loss
https://bugzilla.netfilter.org/show_bug.cgi?id=1674 Bug ID: 1674 Summary: ebtables causing packet loss Product: ebtables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: critical Priority: P5 Component: ebtables-nft Assignee: pablo at netfilter.org
2020 May 27
1
[Bug 1432] New: ebtables ebtables-2.0.11 buffer overflow on getting kernel data ( ebtables compiled with address sanitizer)
https://bugzilla.netfilter.org/show_bug.cgi?id=1432 Bug ID: 1432 Summary: ebtables ebtables-2.0.11 buffer overflow on getting kernel data ( ebtables compiled with address sanitizer) Product: netfilter/iptables Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status:
2007 Apr 18
1
[Bridge] [RELEASE] ebtables-brnf-3-vs-2.4.22 and ebtables-2-0-6
Hi, At http://sourceforge.net/projects/ebtables/ you can find the following new releases: ebtables-brnf-3-vs-2.4.22 Changes: - let iptables see VLAN tagged IP traffic - bugfix for queued packets that get mangled in userspace - ebt_among module (Grzegorz Borowiak) - ebt_limit module (Tom Marshall) The patch compiles but I've done no further tests, but I probably didn't screw up.
2007 Apr 18
2
[Bridge] Re: [RESEND][PATCH] ebtables: clean up vmalloc usage in net/bridge/netfilter/ebtables.c
An earlier variant of your patch was applied already, included below. You'll need to submit the newer parts relative to the current tree. diff-tree 7ad4d2f6901437ba4717a26d395a73ea362d25c6 (from b8282dcf0417bbc8a0786c129fdff9cc768f8f3c) Author: Jayachandran C <c.jayachandran@gmail.com> Date: Tue Apr 11 17:25:38 2006 -0700 [BRIDGE] ebtables: fix allocation in
2020 Nov 13
5
[Bug 1481] New: [ebtables-nft] ebtables -E gives error
https://bugzilla.netfilter.org/show_bug.cgi?id=1481 Bug ID: 1481 Summary: [ebtables-nft] ebtables -E gives error Product: iptables Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: normal Priority: P5 Component: iptables Assignee:
2005 Jul 09
4
TCP window based shaping
I recalled a discussion of manipulating outgoing tcp windows in order to control return tcp traffic. I finally found at least some of that discussion in a thread with the subject above (of this message). But I thought someone announced an implementation and I don''t see it under this thread. If anyone else remembers or knows where I should look for it, please let me know. I''m
2023 Nov 10
0
[Bug 1723] New: ebtables-nft help output woes
https://bugzilla.netfilter.org/show_bug.cgi?id=1723 Bug ID: 1723 Summary: ebtables-nft help output woes Product: ebtables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: enhancement Priority: P5 Component: ebtables-nft Assignee: pablo at netfilter.org
2019 Dec 02
0
[ANNOUNCE] ebtables 2.0.11 release
Hi! The Netfilter project presents: ebtables 2.0.11 ebtables is the userspace command line program used to configure the Linux 2.4.x and bridge packet filtering ruleset. It is targeted towards system administrators. NOTE: This is a release of legacy software. Patches may still be accepted and pushed out to the git repository, which will remain active and accessible as usual although
2023 Sep 08
1
[Bridge] [PATCH AUTOSEL 4.14 6/8] netfilter: ebtables: fix fortify warnings in size_entry_mwt()
From: "GONG, Ruiqi" <gongruiqi1 at huawei.com> [ Upstream commit a7ed3465daa240bdf01a5420f64336fee879c09d ] When compiling with gcc 13 and CONFIG_FORTIFY_SOURCE=y, the following warning appears: In function ?fortify_memcpy_chk?, inlined from ?size_entry_mwt? at net/bridge/netfilter/ebtables.c:2118:2: ./include/linux/fortify-string.h:592:25: error: call to
2023 Sep 08
0
[Bridge] [PATCH AUTOSEL 6.5 33/45] netfilter: ebtables: fix fortify warnings in size_entry_mwt()
From: "GONG, Ruiqi" <gongruiqi1 at huawei.com> [ Upstream commit a7ed3465daa240bdf01a5420f64336fee879c09d ] When compiling with gcc 13 and CONFIG_FORTIFY_SOURCE=y, the following warning appears: In function ?fortify_memcpy_chk?, inlined from ?size_entry_mwt? at net/bridge/netfilter/ebtables.c:2118:2: ./include/linux/fortify-string.h:592:25: error: call to
2023 Sep 08
0
[Bridge] [PATCH AUTOSEL 6.1 20/26] netfilter: ebtables: fix fortify warnings in size_entry_mwt()
From: "GONG, Ruiqi" <gongruiqi1 at huawei.com> [ Upstream commit a7ed3465daa240bdf01a5420f64336fee879c09d ] When compiling with gcc 13 and CONFIG_FORTIFY_SOURCE=y, the following warning appears: In function ?fortify_memcpy_chk?, inlined from ?size_entry_mwt? at net/bridge/netfilter/ebtables.c:2118:2: ./include/linux/fortify-string.h:592:25: error: call to
2023 Sep 08
0
[Bridge] [PATCH AUTOSEL 6.4 30/41] netfilter: ebtables: fix fortify warnings in size_entry_mwt()
From: "GONG, Ruiqi" <gongruiqi1 at huawei.com> [ Upstream commit a7ed3465daa240bdf01a5420f64336fee879c09d ] When compiling with gcc 13 and CONFIG_FORTIFY_SOURCE=y, the following warning appears: In function ?fortify_memcpy_chk?, inlined from ?size_entry_mwt? at net/bridge/netfilter/ebtables.c:2118:2: ./include/linux/fortify-string.h:592:25: error: call to
2023 Sep 08
0
[Bridge] [PATCH AUTOSEL 5.10 11/14] netfilter: ebtables: fix fortify warnings in size_entry_mwt()
From: "GONG, Ruiqi" <gongruiqi1 at huawei.com> [ Upstream commit a7ed3465daa240bdf01a5420f64336fee879c09d ] When compiling with gcc 13 and CONFIG_FORTIFY_SOURCE=y, the following warning appears: In function ?fortify_memcpy_chk?, inlined from ?size_entry_mwt? at net/bridge/netfilter/ebtables.c:2118:2: ./include/linux/fortify-string.h:592:25: error: call to
2023 Sep 08
0
[Bridge] [PATCH AUTOSEL 5.15 12/15] netfilter: ebtables: fix fortify warnings in size_entry_mwt()
From: "GONG, Ruiqi" <gongruiqi1 at huawei.com> [ Upstream commit a7ed3465daa240bdf01a5420f64336fee879c09d ] When compiling with gcc 13 and CONFIG_FORTIFY_SOURCE=y, the following warning appears: In function ?fortify_memcpy_chk?, inlined from ?size_entry_mwt? at net/bridge/netfilter/ebtables.c:2118:2: ./include/linux/fortify-string.h:592:25: error: call to
2023 Aug 16
0
[Bridge] [PATCH net-next v4] netfilter: ebtables: fix fortify warnings in size_entry_mwt()
From: "GONG, Ruiqi" <gongruiqi1 at huawei.com> When compiling with gcc 13 and CONFIG_FORTIFY_SOURCE=y, the following warning appears: In function ?fortify_memcpy_chk?, inlined from ?size_entry_mwt? at net/bridge/netfilter/ebtables.c:2118:2: ./include/linux/fortify-string.h:592:25: error: call to ?__read_overflow2_field? declared with attribute warning: detected read beyond
2009 Jan 30
4
Packet shaping & bandwidth changes
All of a sudden tonight my web browsing and ssh performance is terrible. I''m on a cable connection and I''m wondering if it could be due to evening bandwidth contention or ISP throttling. If so, I suppose tcdevices numbers are out the window. Can anything be done? - Grant ------------------------------------------------------------------------------ This SF.net email is
2007 Apr 18
1
[Bridge] ebtables configuration in 2.6.8 kernel
Hi everyone, I am working on packet filtering at mac layer. I want to use ebtables. I am using Fedora core 2. But I am unable use the ebtables eventhough all the modules are enabled at the time of kernel compilation. Plz suggest me how to use ebtables in Fedora core 2 Phani
2009 Mar 31
0
ebtables tying mac address to ip address problem
Hi all. I''m trying to tie mac addresses to IP addresses to stop ip and mac spoofing on my xen host running debian5.0 amd64. I''ve been trying to follow http://archive.netbsd.se/?ml=xen-users&a=2007-11&m=5776600 The DomU''s network gets blocked both inward and outward. I''ve patched my vif-bridge with the intructions on that page any they seem to be