On 2011-08-21 23:33, Christiano F. Haesbaert wrote:
>
> I have a partial diff for this.
>
> Unfortunately I couldn't test so I'll need more time.
>
> The idea is to flag the incoming packet with a new flag M_VLANPRIO
> which signals vlan(4) to not touch the vlanprio in vlan_start().
>
> It's a
On Fri, Aug 19, 2011 at 09:07:42AM +0200, Peter Hallin wrote:
> Hello,
>
> I have a question.
>
> We use bridging firewalls at Lund University with different vlan tags on
> respective sides of the bridges. The frames are therefore "retagged"
> when passing through the bridge and unforunatley the
Hi,
So here is the final version using -T with IPv6 with some points addressed by
jmc@ in the manual.
ok to commit ?
Index: tcpbench.1
===
RCS file: /cvs/src/usr.bin/tcpbench/tcpbench.1,v
retrieving revision 1.12
diff -d -u -p -w -
Hello,
On Sun, 21 Aug 2011 19:17:36 +0200 (CEST)
"Gruel Bruno" wrote:
> Thank's for your reply it's works.
Thank you for your feedbacks.
> But i have still some question.
> It's not realy secure to do that, no (a VPN without password )??
It depends on your network which you use L2TP on.
Until
Hello,
Thank's for your reply it's works.
By disable tunnel auth in MPD the client, can get ip configuration via the
L2TP tunnel.
But i have still some question.
It's not realy secure to do that, no (a VPN without password )??
Do you plan to implement tunnel auth in npppd ?
So thank's for your
Hello,
On Fri, 19 Aug 2011 20:26:25 +0200 (CEST)
"Gruel Bruno" wrote:
> Now i have got that:
>
> 2011-08-19 16:11:33:WARNING: l2tpd ctrl=13 Received AVP (CHALLENGE/11) is not
> supported, but it's mandatory
> 2011-08-19 16:11:33:NOTICE: l2tpd ctrl=13 logtype=Started RecvSCCRQ
> from=172.16.1.1:3