Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 28 Jan 2002 22:17:24 -0800 (PST)
From:      Matthew Dillon <dillon@apollo.backplane.com>
To:        "Thomas T. Veldhouse" <veldy@veldy.net>
Cc:        <andrew.cowan@hsd.com.au>, "Nate Williams" <nate@yogotech.com>, "Freebsd-Stable" <freebsd-stable@FreeBSD.ORG>
Subject:   Re: Proposed Solution To Recent "firewall_enable" Thread. [Please Read]
Message-ID:  <200201290617.g0T6HO036172@apollo.backplane.com>
References:  <NEBBJIKPNGEHLCBOLMDMMEBOFPAC.andrew.cowan@hsd.com.au> <001e01c1a873$bdf12f10$0101a8c0@cascade>

next in thread | previous in thread | raw e-mail | index | archive | help
    Lets not make things even more confusing then they already are.  The
    answer to me is simple:

    If firewall_enable is "NO" and ipfw is active, /etc/rc* should
    simply add a rule to allow all traffic.  Simple.  Problem solved.

						-Matt

:What would the expected functionality be for this?
:
:ipfw_enable=no
:ipfw_firewall_enable=yes
:
:And what would the expected funcationality be for this?
:
:ipfw_enable=yes
:ipfw_firewall_enable=no
:
:I would expect the former to not load the ipfw module, so what does the
:firewall enable option do?
:
:I would expect the latter to load the ipfw module and the latter to not run
:the firewall script.  Seems to make sense, except what happens when you have
:IPFIREWALL built into the kernel?
:
:Tom Veldhouse
:veldy@veldy.net

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-stable" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200201290617.g0T6HO036172>