Searched +refs:fib +refs:rule +refs:all (Results 1 – 3 of 3) sorted by relevance
42 fib saddr . iif oif missing counter log prefix "$netns nft_rpfilter: " drop55 fib saddr . iif oif gt 0 accept69 ip daddr 1.1.1.1 fib saddr . iif oif missing counter drop70 ip6 daddr 1c3::c01d fib saddr . iif oif missing counter drop154 ip netns exec "$nsrouter" sysctl net.ipv6.conf.all.forwarding=1 > /dev/null157 ip netns exec "$nsrouter" sysctl net.ipv4.conf.all.rp_filter=0 > /dev/null219 ip -net "$nsrouter" rule add from all table 128220 ip -net "$nsrouter" rule add from all iif veth0 table 129225 ip -net "$nsrouter" -4 rule delete table main
58 ip netns exec $ns1 sysctl -qw net.ipv6.conf.all.forwarding=1488 $NS_EXEC sysctl -qw net.ipv4.conf.all.rp_filter=1489 $NS_EXEC sysctl -qw net.ipv4.conf.all.accept_local=1490 $NS_EXEC sysctl -qw net.ipv4.conf.all.route_localnet=1491 ip netns exec $ns2 sysctl -qw net.ipv4.conf.all.rp_filter=1492 ip netns exec $ns2 sysctl -qw net.ipv4.conf.all.accept_local=1493 ip netns exec $ns2 sysctl -qw net.ipv4.conf.all.route_localnet=1617 $IP -4 rule add pref 32765 table local618 $IP -4 rule del pref 0619 $IP -6 rule add pref 32765 table local[all …]
343 Please note that not all PPTP modes of operation are supported yet.486 rule-set. It also comes with the generic set infrastructure that533 ratelimit rule matchings per connections.545 ratelimit rule matchings.628 tristate "Netfilter nf_tables fib inet support"701 tristate "Netfilter nf_tables netdev fib lookups support"932 resets the timer associated with label specified when the rule is1044 REDIRECT is a special case of NAT: all incoming connections are1057 Masquerading is a special case of NAT: all outgoing connections are1105 will log every rule which match the packets as those traverse[all …]