Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 29 Jul 2019 14:22:54 -0400
From:      mike tancsa <mike@sentex.net>
To:        Kristof Provost <kp@freebsd.org>, Paul Webster <paul.g.webster@googlemail.com>
Cc:        "freebsd-pf@freebsd.org" <freebsd-pf@freebsd.org>
Subject:   Re: pf and dummynet
Message-ID:  <8e58346b-5540-b47e-e446-1a5bb11743d3@sentex.net>
In-Reply-To: <20190729175134.GE10541@vega.codepro.be>
References:  <d68129cd-40a4-e065-32c3-3f574eca537e@sentex.net> <5d3f305f.1c69fb81.90047.531f@mx.google.com> <20190729175134.GE10541@vega.codepro.be>

next in thread | previous in thread | raw e-mail | index | archive | help
On 7/29/2019 1:51 PM, Kristof Provost wrote:
>
> Also beware of gotchas with things like IPv6 fragment handling or
> route-to.
>
> I do not consider mixing firewalls to be a supported configuration. If
> it breaks you get to keep the pieces.

Thanks, I was worried about that!  Is there a way to get altq to limit
inbound traffic directed to a server ?  I would prefer not mixing and
matching, but I dont see any other way other than going to ipfw which I
would rather not

    ---Mike





Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?8e58346b-5540-b47e-e446-1a5bb11743d3>