Daniel Dias Gonçalves wrote:
Julian,
You could give an example of rules with tables?
I'm sorry I forgot that you want to count packets from each client.
tables won't work for that.
for counting I suggest the technique I show below,
but for just allowing, you can add allowable addresses to
a
Julian,
You could give an example of rules with tables?
Julian Elischer escreveu:
Daniel Dias Gonçalves wrote:
Very good thinking, congratulations, but my need is another.
The objective is a Captive Porrtal that each authentication is
dynamically created a rule to ALLOW or COUNT IP
What may be happening ? I'm with polling enabled on all interfaces, can
you influence ?
em0: Intel(R) PRO/1000 Network Connection 6.9.6 port 0x7000-0x703f mem
0xdfa0-0xdfa1 irq 16 at device 8.0 on pci4
em1: Intel(R) PRO/1000 Network Connection 6.9.6 port 0x7400-0x743f mem
Going to another example.
If I wanted that each authentication (username and password) in captive
portal, set up rules limiting the speed of the user's IP, as I do? I can
create two rules for the in / out for each user associated with a pipe?
When simulating this with a script adding hundreds
You may want to investigate using pf; i'm not sure whether they handle
this better.
Me, I'd investigate writing a tree ipfw rule type. Ie, instead of
having a list of rules, all evaluated one at a time, I'd create a rule
implementing a subrule match on ip/netmask with some kind of action
(allow,
On Mon, 27 Apr 2009, Daniel Dias Gonçalves wrote:
What may be happening ? I'm with polling enabled on all interfaces, can you
influence ?
em0: Intel(R) PRO/1000 Network Connection 6.9.6 port 0x7000-0x703f mem
0xdfa0-0xdfa1 irq 16 at device 8.0 on pci4
em1: Intel(R) PRO/1000
Very good thinking, congratulations, but my need is another.
The objective is a Captive Porrtal that each authentication is
dynamically created a rule to ALLOW or COUNT IP authenticated, which I'm
testing is what is the maximum capacity of rules supported, therefore
simultaneous user.
In response to Daniel Dias Gonçalves d...@yan.com.br:
Very good thinking, congratulations, but my need is another.
The objective is a Captive Porrtal that each authentication is
dynamically created a rule to ALLOW or COUNT IP authenticated, which I'm
testing is what is the maximum capacity
You'd almost certainly be better off hacking up an extension to ipfw
which lets you count a /24 in one rule.
As in, the count rule would match on the subnet/netmask, have 256 32
(or 64 bit) integers allocated to record traffic in, and then do an
O(1) operation using the last octet of the v4
Bill Moran wrote:
In response to Daniel Dias Gonçalves d...@yan.com.br:
Very good thinking, congratulations, but my need is another.
The objective is a Captive Porrtal that each authentication is
dynamically created a rule to ALLOW or COUNT IP authenticated, which I'm
testing is what is the
Daniel Dias Gonçalves wrote:
Very good thinking, congratulations, but my need is another.
The objective is a Captive Porrtal that each authentication is
dynamically created a rule to ALLOW or COUNT IP authenticated, which I'm
testing is what is the maximum capacity of rules supported,
Hi,
My system is a FreeBSD 7.1R.
When I add rules IPFW COUNT to 254 IPS from my network, one of my
interfaces increases the latency, causing large delays in the network,
when I delete COUNT rules, everything returns to normal, which can be ?
My script:
ipcount.php
-- CUT --
?
$c=0;
In response to Daniel Dias Gonçalves d...@yan.com.br:
My system is a FreeBSD 7.1R.
When I add rules IPFW COUNT to 254 IPS from my network, one of my
interfaces increases the latency, causing large delays in the network,
when I delete COUNT rules, everything returns to normal, which can be
Daniel Dias Gonçalves wrote:
Hi,
My system is a FreeBSD 7.1R.
When I add rules IPFW COUNT to 254 IPS from my network, one of my
interfaces increases the latency, causing large delays in the network,
when I delete COUNT rules, everything returns to normal, which can be ?
My script:
of
14 matches
Mail list logo