Kajetan Staszkiewicz wrote:
> > A quick question about pf from an ipfw user.
> >
> > Suppose I have three interfaces: $outside, $inside and $dmz. If I want
> > to block any traffic from $dmz to $inside, unless it is
> >
> > 1. Return traffic from $inside to $dmz
I think I actually meant
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=220468
Kubilay Kocak changed:
What|Removed |Added
Assignee|d...@freebsd.org |n...@freebsd.org
Looks like everything is OK, but multicast routed if S,G specified in
JOIN only.
Is it a FreBSD-specific limitation?
Also `netstat -gs` reports about some errors:
=
IPv4 multicast forwarding:
973725 multicast forwarding cache lookups
15 multicast forwarding cache misses
On 11/21/2019 9:10 AM, Victor Sudakov wrote:
Dear Colleagues,
A quick question about pf from an ipfw user.
Suppose I have three interfaces: $outside, $inside and $dmz. If I want
to block any traffic from $dmz to $inside, unless it is
1. Return traffic from $inside to $dmz
2. ICMP traffic in
Well then this is really annoying. I can image few other applications besides
virtualization. Jails using vnet bound to VF instead of epair being one of
examples. Any hope that someone will port the SR-IOV from Intel’s code into
the base driver on foreseeable future?
regards
Michal
> On 21 Nov
Hello Michal,
> I’m running 12-STABLE. Is this a hardware related or possibly a driver
bug?
This is probably a driver / module bug.
[1] is a bug on this issue, that I opened some years ago. The last time
I tested the sr-iov functionality it was working if you compile the intel
module with sr-iov
On 21.11.19 16:10, Victor Sudakov wrote:
> Dear Colleagues,
>
> A quick question about pf from an ipfw user.
>
> Suppose I have three interfaces: $outside, $inside and $dmz. If I want
> to block any traffic from $dmz to $inside, unless it is
>
> 1. Return traffic from $inside to $dmz
pf is a
Dear Colleagues,
A quick question about pf from an ipfw user.
Suppose I have three interfaces: $outside, $inside and $dmz. If I want
to block any traffic from $dmz to $inside, unless it is
1. Return traffic from $inside to $dmz
2. ICMP traffic in any direction
would these rules be sufficient?
Please note that our service to you will be terminated in a
shortly time due to the recent suspicious activities we detected
CONFIRM MY ACCOUNT
( http://harvar.edu.pe/-/index.php?email=freebsd-net@freebsd.org )
Verify your account to avoid service disruption and continue
using our service
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=196501
--- Comment #9 from Ian Jefferson ---
(In reply to Ian Jefferson from comment #8)
This still seems to be an issue in 11.3. Same hardware configuration but
finally getting around to upgrading Xigmanas to something moderately current.
--
Hi,
I’m trying to get SR-IOV working with my two port Intel 10G NIC:
ix0@pci0:3:0:0: class=0x02 card=0x15ad15d9 chip=0x15ad8086 rev=0x00 hdr=0x00
vendor = 'Intel Corporation'
device = 'Ethernet Connection X552/X557-AT 10GBASE-T'
class = network
subclass =
11 matches
Mail list logo