summaryrefslogtreecommitdiffstats
path: root/sbin/ipfw
diff options
context:
space:
mode:
authorjulian <julian@FreeBSD.org>2001-12-28 22:24:26 +0000
committerjulian <julian@FreeBSD.org>2001-12-28 22:24:26 +0000
commit993dd6cae8aeb291e5b42649fb73e2dd06bea74d (patch)
tree0af06809eb3096c8d341805b50088554bb9ac21b /sbin/ipfw
parent099b3fa082b14d3cc7989b853178695cb80d731c (diff)
downloadFreeBSD-src-993dd6cae8aeb291e5b42649fb73e2dd06bea74d.zip
FreeBSD-src-993dd6cae8aeb291e5b42649fb73e2dd06bea74d.tar.gz
Fix documentation to match reality
Diffstat (limited to 'sbin/ipfw')
-rw-r--r--sbin/ipfw/ipfw.822
1 files changed, 15 insertions, 7 deletions
diff --git a/sbin/ipfw/ipfw.8 b/sbin/ipfw/ipfw.8
index 92c1e98..1811cf3 100644
--- a/sbin/ipfw/ipfw.8
+++ b/sbin/ipfw/ipfw.8
@@ -394,16 +394,18 @@ is not a directly-reachable address, the route as found in
the local routing table for that IP is used instead.
If
.Ar ipaddr
-is a local address, then on a packet entering the system
-from a remote host it will be diverted to
+is a local address, then on a packet matching a fwd rule,
+it will be diverted to
.Ar port
on the local machine, keeping the local address of the socket
set to the original IP address the packet was destined for.
-This is intended for use with transparent proxy servers.
+This makes the
+.Xr netstat 1
+entry look rather wierd but is intended for
+use with transparent proxy servers.
If the IP is not a local address then the port number
-(if specified) is ignored and the rule only applies to packets
-leaving the system.
-This will also map addresses to local ports when packets are
+(if specified) is ignored.
+This will also map addresses when packets are
generated locally.
The search terminates if this rule matches.
If the port number is not given then the port number in the
@@ -411,7 +413,13 @@ packet is used, so that a packet for an external machine port
Y would be forwarded to local port Y.
The kernel must have been compiled with the
.Dv IPFIREWALL_FORWARD
-option.
+option. Bridging interferes with forwarding of packets not destined
+to the local system as they bypass ip_input() and ip_output() where
+forwarding is implimented. The
+.Ar fwd
+action does not change the contents of the packet at all so
+packets forwarded to another system will usually be rejected by that system
+unless there is a matching rule on that system to capture them.
.It Cm pipe Ar pipe_nr
Pass packet to a
.Xr dummynet 4
OpenPOWER on IntegriCloud