Displaying 20 results from an estimated 300 matches similar to: "VPN hardware?"
2003 Feb 24
5
Bug in Shorewall check?
I made a boo boo in my config and put in this rule
#PPTP
DNAT net:213.67.241.162/217.209.46.204/32
loc:192.168.221.200 tcp 1723
DNAT net:213.67.241.162/32,217.209.46.204/32
loc:192.168.221.200 47 -
And the the following happened.. and I wonder why it didn''t complain? I
am sure I am just misunderstanding some doc
2003 Jan 11
0
[SOLUTION/Summary] ..all my routing / VPN problems.
Right, time to (as someone said) put this thread to a proper rest.
Some of you have probably read my VPN/Routing/Lost packages hassles in the
last week, well, here is the rundown.
Look at http://statler.mupp.net/shorewall/Layout.jpg
Basically.
The shorewall knows the route to the .224.0/24 net is through .221.221.
The systems in .221.0/24 has the FW as their default gw.
The FW could reach
2017 Apr 02
6
[Bug 1142] New: invalid binop operation 6nft
https://bugzilla.netfilter.org/show_bug.cgi?id=1142
Bug ID: 1142
Summary: invalid binop operation 6nft
Product: nftables
Version: unspecified
Hardware: x86_64
OS: other
Status: NEW
Severity: major
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
Reporter:
2020 Nov 05
3
[Bug 1479] New: seqnum_to_json() is slow
https://bugzilla.netfilter.org/show_bug.cgi?id=1479
Bug ID: 1479
Summary: seqnum_to_json() is slow
Product: nftables
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
Reporter:
2024 Jan 29
2
[Bug 1734] New: nft set with auto-merge json import/export
https://bugzilla.netfilter.org/show_bug.cgi?id=1734
Bug ID: 1734
Summary: nft set with auto-merge json import/export
Product: nftables
Version: 1.0.x
Hardware: All
OS: All
Status: NEW
Severity: minor
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
2023 Jun 09
7
[Bug 1689] New: Resetting the timeout counter for a named set element
https://bugzilla.netfilter.org/show_bug.cgi?id=1689
Bug ID: 1689
Summary: Resetting the timeout counter for a named set element
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
Assignee: pablo at
2023 Dec 18
4
[Bug 1728] New: Regression: iptables lock is now waited for without --wait
https://bugzilla.netfilter.org/show_bug.cgi?id=1728
Bug ID: 1728
Summary: Regression: iptables lock is now waited for without
--wait
Product: iptables
Version: 1.8.x
Hardware: x86_64
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: unknown
2023 May 31
11
[Bug 1685] New: Calling the nftnl_set_free function may trigger the "double free" problem.
https://bugzilla.netfilter.org/show_bug.cgi?id=1685
Bug ID: 1685
Summary: Calling the nftnl_set_free function may trigger the
"double free" problem.
Product: libnftnl
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: critical
Priority: P5
2020 Jan 06
9
[Bug 1395] New: Add element fails with Error: Could not process rule: Invalid argument
https://bugzilla.netfilter.org/show_bug.cgi?id=1395
Bug ID: 1395
Summary: Add element fails with Error: Could not process rule:
Invalid argument
Product: nftables
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: critical
Priority: P5
Component: nft
2003 Jun 03
4
Do i (this time) need hosts?
Two legged 1.4.2 firewall
zone nwl is eth0 (192.168.221.0/24 ($FW on .205))
zone jvc is eth1 (10.200.47.0/24 ($FW on .253))
Lets suppose i need to allow traffic from nwl to "jvn" which is 10.200.0.0/16
(yes, i do realize that they overlap) and route that traffic to 10.200.47.254?
The router upstream from this one routes 10.200.0.0/16 -> 192.168.221.205 and
i do see
2016 Mar 21
3
[Bug 1059] New: Using wildcard interface names in an anonymous set fails on big endian
https://bugzilla.netfilter.org/show_bug.cgi?id=1059
Bug ID: 1059
Summary: Using wildcard interface names in an anonymous set
fails on big endian
Product: nftables
Version: unspecified
Hardware: ppc
OS: other
Status: NEW
Severity: major
Priority: P5
Component: nft
2014 Apr 13
4
[Bug 914] New: nft configure does not use --prefix as include/lib search path
https://bugzilla.netfilter.org/show_bug.cgi?id=914
Summary: nft configure does not use --prefix as include/lib
search path
Product: nftables
Version: unspecified
Platform: x86_64
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
AssignedTo: pablo at
2014 Feb 05
3
[Bug 895] New: Add a 'ipv6_address' set into a ipv4 table and vice versa
https://bugzilla.netfilter.org/show_bug.cgi?id=895
Summary: Add a 'ipv6_address' set into a ipv4 table and vice
versa
Product: nftables
Version: unspecified
Platform: x86_64
OS/Version: Debian GNU/Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
2016 Nov 22
1
[Bug 1099] New: Minor typo in wiki.nftables.org
https://bugzilla.netfilter.org/show_bug.cgi?id=1099
Bug ID: 1099
Summary: Minor typo in wiki.nftables.org
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: trivial
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
2020 Nov 13
5
[Bug 1481] New: [ebtables-nft] ebtables -E gives error
https://bugzilla.netfilter.org/show_bug.cgi?id=1481
Bug ID: 1481
Summary: [ebtables-nft] ebtables -E gives error
Product: iptables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
Component: iptables
Assignee:
2019 Dec 22
2
[Bug 1391] New: iptables-nft-restore --test can segfault
https://bugzilla.netfilter.org/show_bug.cgi?id=1391
Bug ID: 1391
Summary: iptables-nft-restore --test can segfault
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Gentoo
Status: NEW
Severity: normal
Priority: P5
Component: iptables over nftable
Assignee: pablo at
2020 Aug 20
2
[Bug 1452] New: Incorrect information in the iptables-extensions(8) man page
https://bugzilla.netfilter.org/show_bug.cgi?id=1452
Bug ID: 1452
Summary: Incorrect information in the iptables-extensions(8)
man page
Product: iptables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: minor
Priority: P5
Component: iptables
2024 Jul 13
1
[Bug 1759] New: flush and delete nft commands need an option to ignore non-existant objects
https://bugzilla.netfilter.org/show_bug.cgi?id=1759
Bug ID: 1759
Summary: flush and delete nft commands need an option to ignore
non-existant objects
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Ubuntu
Status: NEW
Severity: enhancement
Priority: P5
2024 Sep 03
1
[Bug 1772] New: Double free corruption in libnftables
https://bugzilla.netfilter.org/show_bug.cgi?id=1772
Bug ID: 1772
Summary: Double free corruption in libnftables
Product: nftables
Version: 1.0.x
Hardware: x86_64
OS: Ubuntu
Status: NEW
Severity: normal
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
2024 Sep 26
1
[Bug 1775] New: RAW PAYLOAD EXPRESSION offset is limited to 2048
https://bugzilla.netfilter.org/show_bug.cgi?id=1775
Bug ID: 1775
Summary: RAW PAYLOAD EXPRESSION offset is limited to 2048
Product: nftables
Version: 1.0.x
Hardware: All
OS: All
Status: NEW
Severity: critical
Priority: P5
Component: nft
Assignee: pablo at netfilter.org