| Summary: | ipfw does not permit multicast packets to pass when configured to do so. | ||
|---|---|---|---|
| Product: | Base System | Reporter: | bks <bks> |
| Component: | misc | Assignee: | freebsd-bugs (Nobody) <bugs> |
| Status: | Closed FIXED | ||
| Severity: | Affects Only Me | ||
| Priority: | Normal | ||
| Version: | 3.2-STABLE | ||
| Hardware: | Any | ||
| OS: | Any | ||
On Fri, Aug 20, 1999 at 02:50:18PM -0700, bks@CS.Berkeley.EDU wrote: > > $fwcmd add pass all from 224.0.0.0/8 to ${ip}224.0.0.0/8 > $fwcmd add pass all from ${ip} to 224.0.0.0/8 > > produces > > ipfw: 2000 Deny P:2 128.32.35.1 224.0.0.1 in via fxp0 > ipfw: 2000 Deny P:2 128.32.35.1 224.0.0.1 in via fxp0 > `all' keyword is a synonym for `ip' (see `ipfw list' output). You need to add the following rule: $fwcmd add allow igmp ... Can I close this PR? -- Ruslan Ermilov Sysadmin and DBA of the ru@ucb.crimea.ua United Commercial Bank, ru@FreeBSD.org FreeBSD committer, +380.652.247.647 Simferopol, Ukraine http://www.FreeBSD.org The Power To Serve http://www.oracle.com Enabling The Information Age State Changed From-To: open->closed Originator reports that the problem is fixed by properly configuring ipfw(8). |
$fwcmd add pass all from 224.0.0.0/8 to ${ip}224.0.0.0/8 $fwcmd add pass all from ${ip} to 224.0.0.0/8 produces ipfw: 2000 Deny P:2 128.32.35.1 224.0.0.1 in via fxp0 ipfw: 2000 Deny P:2 128.32.35.1 224.0.0.1 in via fxp0 How-To-Repeat: add $fwcmd's above to rc.firewall, and run sdr.