Just for extra info:

Mar 13 15:46:34 host ipmon[201]: [ID 702911 local2.warning] 15:46:34.325813 le0 
@200:10 b 66.21.108.21,4511 -> 66.22.104.255,135 PR tcp len 20 48 -S IN mbcast
Mar 13 15:46:35 host ipmon[201]: [ID 702911 local2.warning] 15:46:35.198190 le0 
@200:10 b 66.21.108.21,4511 -> 66.22.104.255,135 PR tcp len 20 48 -S IN mbcast
Mar 13 15:46:36 host ipmon[201]: [ID 702911 local2.warning] 15:46:36.068369 le0 
@200:10 b 66.21.108.21,4511 -> 66.22.104.255,135 PR tcp len 20 48 -S IN mbcast

But, ipfstat -ih reveals for 200:10 :

0 block in log all group 200

[EMAIL PROTECTED]> date
Sun Mar 13 16:22:37 EST 2005
[EMAIL PROTECTED]> uptime
  4:23pm  up 22:06,  1 user,  load average: 0.03, 0.07, 0.08

The counters should be increasing...

Ian


On Sun, 13 Mar 2005, The UnSeen wrote:

On Mon, 14 Mar 2005, Darren Reed wrote:


You've chosen a bad pair of rules to be representative of the problem because I doubt many packets are matching your full description.

The "with short" and "with opt lsrr" add extra requirements for the
packet to match.

If you had "block in log all" at the top and that wasn't matching
packets, I'd be more concerned.

Darren


ok, without revealing all my rules... Lets take SMTP as an example:

[EMAIL PROTECTED]> ipfstat -ih | egrep smtp
b> 0 pass in on le0 all head 200
...
...
0 pass in quick proto tcp from any to 66.22.104.242/32 port = smtp flags S/FSRPAU keep state keep frags group 200
...
...


I say again, all the rules listed by ipfstat -ih are at 0 as is ipfstat -oh. Surely this is not true as:

[EMAIL PROTECTED]> ipfstat
bad packets: in 0 out 0
IPv6 packets: in 0 out 6
input packets: blocked 32753 passed 309840 nomatch 2 counted 0 short 0
output packets: blocked 6279 passed 279131 nomatch 0 counted 0 short 0
input packets logged: blocked 1242 passed 0
output packets logged: blocked 6273 passed 0
packets logged: input 0 output 0
log failures: input 0 output 0
fragment state(in): kept 0 lost 0 not fragmented 0
fragment state(out): kept 0 lost 0 not fragmented 0
packet state(in): kept 3722 lost 0
packet state(out): kept 10545 lost 0
ICMP replies: 0 TCP RSTs sent: 1
Invalid source(in): 0
Result cache hits(in): 7342 (out): 10660
IN Pullups succeeded: 17 failed: 0
OUT Pullups succeeded: 103 failed: 6
Fastroute successes: 53620 failures: 384
TCP cksum fails(in): 0 (out): 0
IPF Ticks: 156574


Now, these same rules did produce counts previously (version 4.1.3).




Reply via email to