View | Details | Raw Unified | Return to bug 248943
Collapse All | Expand All

(-)sbin/ipfw/ipfw.8 (-9 / +9 lines)
Lines 682-688 to simulate the effect of multiple paths leading to out-of-order Link Here
682
packet delivery.
682
packet delivery.
683
.Pp
683
.Pp
684
Note: this condition is checked before any other condition, including
684
Note: this condition is checked before any other condition, including
685
ones such as 
685
ones such as
686
.Cm keep-state
686
.Cm keep-state
687
or
687
or
688
.Cm check-state
688
.Cm check-state
Lines 1604-1610 Matches IPv6 packets containing any of the flow labels given in Link Here
1604
is a comma separated list of numeric flow labels.
1604
is a comma separated list of numeric flow labels.
1605
.It Cm frag Ar spec
1605
.It Cm frag Ar spec
1606
Matches IPv4 packets whose
1606
Matches IPv4 packets whose
1607
.Cm ip_off 
1607
.Cm ip_off
1608
field contains the comma separated list of IPv4 fragmentation
1608
field contains the comma separated list of IPv4 fragmentation
1609
options specified in
1609
options specified in
1610
.Ar spec .
1610
.Ar spec .
Lines 3370-3376 Thus translator host should be configured as IPv4 and IPv6 router. Link Here
3370
Also this means, that a packet is handled by firewall twice.
3370
Also this means, that a packet is handled by firewall twice.
3371
First time an original packet is handled and consumed by translator,
3371
First time an original packet is handled and consumed by translator,
3372
and then it is handled again as translated packet.
3372
and then it is handled again as translated packet.
3373
This behavior can be changed by sysctl variable 
3373
This behavior can be changed by sysctl variable
3374
.Va net.inet.ip.fw.nat64_direct_output .
3374
.Va net.inet.ip.fw.nat64_direct_output .
3375
Also translated packet can be tagged using
3375
Also translated packet can be tagged using
3376
.Cm tag
3376
.Cm tag
Lines 4086-4092 Controls the output method used by Link Here
4086
module:
4086
module:
4087
.Bl -tag -width indent
4087
.Bl -tag -width indent
4088
.It Cm 0
4088
.It Cm 0
4089
A packet is handled by 
4089
A packet is handled by
4090
.Nm ipfw
4090
.Nm ipfw
4091
twice.
4091
twice.
4092
First time an original packet is handled by
4092
First time an original packet is handled by
Lines 4277-4287 ruleset to minimize the amount of work scanning the ruleset. Link Here
4277
Your mileage may vary.
4277
Your mileage may vary.
4278
.Pp
4278
.Pp
4279
For more complex scenarios with dynamic rules
4279
For more complex scenarios with dynamic rules
4280
.Cm record-state 
4280
.Cm record-state
4281
and
4281
and
4282
.Cm defer-action
4282
.Cm defer-action
4283
can be used to precisely control creation and checking of dynamic rules.
4283
can be used to precisely control creation and checking of dynamic rules.
4284
Example of usage of these options are provided in 
4284
Example of usage of these options are provided in
4285
.Sx NETWORK ADDRESS TRANSLATION (NAT)
4285
.Sx NETWORK ADDRESS TRANSLATION (NAT)
4286
Section.
4286
Section.
4287
.Pp
4287
.Pp
Lines 4439-4449 Using the Link Here
4439
.Cm fwd
4439
.Cm fwd
4440
action, the table entries may include hostnames and IP addresses.
4440
action, the table entries may include hostnames and IP addresses.
4441
.Pp
4441
.Pp
4442
.Dl "ipfw table T2 create type addr ftype ip"
4442
.Dl "ipfw table T2 create type addr valtype ipv4"
4443
.Dl "ipfw table T2 add 192.168.2.0/24 10.23.2.1"
4443
.Dl "ipfw table T2 add 192.168.2.0/24 10.23.2.1"
4444
.Dl "ipfw table T21 add 192.168.0.0/27 router1.dmz"
4444
.Dl "ipfw table T2 add 192.168.0.0/27 router1.dmz"
4445
.Dl "..."
4445
.Dl "..."
4446
.Dl "ipfw add 100 fwd tablearg ip from any to table(1)"
4446
.Dl "ipfw add 100 fwd tablearg ip from any to 'table(T2)'"
4447
.Pp
4447
.Pp
4448
In the following example per-interface firewall is created:
4448
In the following example per-interface firewall is created:
4449
.Pp
4449
.Pp

Return to bug 248943