| /src/contrib/netbsd-tests/ipf/input/ |
| H A D | f13 | 2 # 1.1.1.1,1025 -> 2.1.1.1,25 TTL=63 TCP DF,FO=0 SYN 7 # 1.1.1.1,1025 -> 2.1.1.1,25 TTL=63 TCP MF ACK 12 # 1.1.1.1,1025 -> 2.1.1.1,25 TTL=63 TCP FO=2 ACK 17 # 1.1.1.1,1024 -> 2.1.1.1,25 TTL=63 TCP DF MF FO=0 SYN 22 # 1.1.1.1,1025 -> 2.1.1.1,25 TTL=63 TCP DF FO=0 27 # 1.1.1.1 -> 2.1.1.1 TTL=63 TCP DF FO=1 SYN 56 # 1.1.1.1,21 -> 2.1.1.1,54 TTL=63 TCP MF FO=0 76 # 2.1.1.1,25 -> 1.1.1.1,1014 TTL=63 TCP DF SYN-ACK 81 # 1.1.1.1,1024 -> 2.1.1.1,25 TTL=63 TCP DF ACK (OOW) 86 # 1.1.1.1,1024 -> 2.1.1.1,25 TTL=63 TCP DF ACK (out-of-order) [all …]
|
| H A D | f17 | 1 # TCP 1.1.1.1,54076 -> 2.2.2.2,27 SYN 8 # TCP 2.2.2.2,27 -> 1.1.1.1,54076 ACK 15 # TCP 1.1.1.1,54076 -> 2.2.2.2,27 SYN 22 # TCP 2.2.2.2,27 -> 1.1.1.1,54076 SYN-ACK 28 # TCP 1.1.1.1,54076 -> 2.2.2.2,27 ACK 34 # TCP 2.2.2.2,27 -> 1.1.1.1,54076 ACK+data
|
| H A D | f12 | 1 # 1.1.1.1,1025 -> 2.1.1.1,25 TTL=63 TCP DF SYN 6 # 1.1.1.1,1025 -> 2.1.1.1,25 TTL=63 TCP DF ACK 11 # 1.1.1.1,1025 -> 2.1.1.1,25 TTL=63 TCP DF MF FO=0 ACK 16 # 1.1.1.1,1025 -> 2.1.1.1,25 TTL=63 TCP DF FO=0 21 # 1.1.1.1 -> 2.1.1.1 TTL=63 TCP DF FO=1 ACK
|
| H A D | f21 | 1 # ICMP dest unreachable with 64 bits in payload (in reply to a TCP packet 3 # IP 4.4.4.4 2.2.2.2 TCP(20480,80) 10 # IP 3.3.3.3 -> 4.4.4.4 ICMP (IP(4.4.4.4,6.6.6.6) TCP(20480,80)) UNREACH 17 # IP 3.3.3.3 -> 4.4.4.4 ICMP (IP(4.4.4.4,6.6.6.6) TCP(20480,80)) REDIRECT 25 # IP 3.3.3.3 -> 5.5.5.5 ICMP (IP(4.4.4.4,6.6.6.6) TCP(20480,80)) UNREACH
|
| H A D | f22 | 1 # ICMP dest unreachable with 64 bits in payload (in reply to a TCP packet 3 # IP 4.4.4.4 2.2.2.2 TCP(20480,80) 10 # IP 3.3.3.3 -> 4.4.4.4 ICMP (IP(4.4.4.4,6.6.6.6) TCP(20480,80)) UNREACH 17 # IP 3.3.3.3 -> 4.4.4.4 ICMP (IP(4.4.4.4,6.6.6.6) TCP(20480,80)) REDIRECT 25 # IP 3.3.3.3 -> 5.5.5.5 ICMP (IP(4.4.4.4,6.6.6.6) TCP(20480,80)) UNREACH
|
| H A D | ni10 | 2 # ICMP dest unreachable with 64 bits in payload (in reply to a TCP packet 4 # IP 4.4.4.4 2.2.2.2 TCP(20480,80) 9 # IP 3.3.3.3 -> 4.4.4.4 ICMP (IP(4.4.4.4,6.6.6.6) TCP(20480,80)) 16 # IP 3.3.3.3 -> 4.4.4.4 ICMP (IP(4.4.4.4,6.6.6.6) TCP(20480,80)) 24 # IP 3.3.3.3 -> 4.4.4.4 ICMP (IP(4.4.4.4,6.6.6.6) TCP(20480,80))
|
| /src/release/packages/ucl/ |
| H A D | tcpd-all.ucl | 19 comment = "TCP Wrappers access control facility" 22 TCP Wrappers allows connections to local network services to be restricted 23 based on a user-defined ruleset. TCP Wrappers can also perform certain 26 Applications which wish to implement the TCP Wrappers functionality natively 28 but are started from the inetd(8) super-server, can also be run under TCP 31 This package also provides a periodic(8) script used to report TCP Wrappers
|
| /src/share/examples/ipfilter/ |
| H A D | examples.txt | 9 [Image] TCP/UDP Ports 11 [Image] TCP Flags (established) 104 package, the threat is that the TCP flags field of the TCP packet may be in 171 Filtering by port number only works with the TCP and UDP IP protocols. When 190 # allow any TCP packets from the same subnet as foo is on through to host 234 TCP Flags (established) 236 Filtering on TCP flags is useful, but fraught with danger. I'd recommend 237 that before using TCP flags in your IP filtering, you become at least a 239 used. This package will compare the flags present in each TCP packet, if 240 asked, and match if those present in the TCP packet are the same as in the [all …]
|
| H A D | rules.txt | 2 # block all incoming TCP packets on le0 from host "foo" to any destination. 9 # block all outgoing TCP packets on le0 from any host to port 23 of host bar. 72 # allow any TCP packets from the same subnet as foo is on through to host 94 # block all TCP packets with only the SYN flag set (this is the first 107 # do any meaningful comparison on. This actually only applies to TCP 113 # log all inbound TCP packets with the SYN flag (only) set 114 # (NOTE: if it were an inbound TCP packet with the SYN flag set and it 150 # block any inbound TCP packets with only the SYN flag set that are 163 # Log all short TCP packets to qe3, with "packetlog" as the intended 168 # Log all connection attempts for TCP
|
| H A D | example.14 | 7 # do any meaningful comparison on. This actually only applies to TCP 13 # log all inbound TCP packets with the SYN flag (only) set 14 # (NOTE: if it were an inbound TCP packet with the SYN flag set and it 50 # block any inbound TCP packets with only the SYN flag set that are
|
| H A D | firewall.2 | 18 # filtering rules won't be able to examine the whole UDP/TCP header, 43 # Block all incoming TCP traffic connections to known services, 50 # Allow incoming TCP connections to ports between 1024 and 5000, as 59 # Now allow various incoming TCP connections to particular hosts, TCP
|
| /src/usr.bin/systat/ |
| H A D | netcmds.c | 143 protos == TCP ? "tcp" : protos == UDP ? "udp" : 0); in changeitems() 167 protos = TCP | UDP; in selectproto() 169 protos = TCP; in selectproto() 182 if ((protos&TCP) == 0) in showprotos() 242 protos == (TCP|UDP) ? 0 : protos == TCP ? "tcp" : "udp"); in showports()
|
| /src/tools/tools/netrate/tcpp/ |
| H A D | README | 1 tcpp -- Parallel TCP Exercise Tool 6 This tool generates large numbers of TCP connections and stuffs lots of data 9 which in turn uses its own TCP port. The number of server processes must be 18 You will need to retune your TCP stack for high volume, see Configuration 26 -r <baseport> Non-default base TCP port, should match client 35 This selects server mode, four workers, and at most 1 million TCP connections 49 -r <baseport> Non-default base TCP port, should match server 58 use 100,000 TCP connections carrying 100K of data, up to 10,000 simultaneous
|
| /src/tests/sys/netpfil/pf/ |
| H A D | tcp.py | 48 / self.sp.TCP(sport=self.sport, dport=self.dport, flags="S", seq=self.seq) 56 t = r.getlayer(self.sp.TCP) 65 / self.sp.TCP(sport=self.sport, dport=self.dport, flags="A", ack=self.ack, seq=self.seq) 71 … / self.sp.TCP(sport=self.sport, dport=self.dport, ack=self.ack, seq=self.seq, flags="") \ 140 tcp = p.getlayer(sp.TCP)
|
| /src/sys/dev/iavf/ |
| H A D | iavf_common.c | 625 IAVF_PTT(26, IP, IPV4, NOF, NONE, NONE, NOF, TCP, PAY4), 634 IAVF_PTT(33, IP, IPV4, NOF, IP_IP, IPV4, NOF, TCP, PAY4), 643 IAVF_PTT(40, IP, IPV4, NOF, IP_IP, IPV6, NOF, TCP, PAY4), 655 IAVF_PTT(48, IP, IPV4, NOF, IP_GRENAT, IPV4, NOF, TCP, PAY4), 664 IAVF_PTT(55, IP, IPV4, NOF, IP_GRENAT, IPV6, NOF, TCP, PAY4), 676 IAVF_PTT(63, IP, IPV4, NOF, IP_GRENAT_MAC, IPV4, NOF, TCP, PAY4), 685 IAVF_PTT(70, IP, IPV4, NOF, IP_GRENAT_MAC, IPV6, NOF, TCP, PAY4), 697 IAVF_PTT(78, IP, IPV4, NOF, IP_GRENAT_MAC_VLAN, IPV4, NOF, TCP, PAY4), 706 IAVF_PTT(85, IP, IPV4, NOF, IP_GRENAT_MAC_VLAN, IPV6, NOF, TCP, PAY4), 715 IAVF_PTT(92, IP, IPV6, NOF, NONE, NONE, NOF, TCP, PAY4), [all …]
|
| /src/share/examples/ipfilter/rules/ |
| H A D | example.sr | 7 # do any meaningful comparison on. This actually only applies to TCP 13 # log all inbound TCP packets with the SYN flag (only) set 14 # (NOTE: if it were an inbound TCP packet with the SYN flag set and it 50 # block any inbound TCP packets with only the SYN flag set that are
|
| H A D | example.8 | 2 # block all incoming TCP connections but send back a TCP-RST for ones to
|
| H A D | example.13 | 2 # Log all short TCP packets to qe3, with 10.3.3.3 as the intended 7 # Log all connection attempts for TCP
|
| /src/sys/dev/qlxge/ |
| H A D | README.txt | 38 * Large Segment Offload over TCP IPV4 39 * Large Segment Offload over TCP IPV6 41 * TCP over IPv4 checksum offload 44 * TCP over IPv6 checksum offload
|
| /src/sys/dev/qlxgb/ |
| H A D | README.txt | 38 * Large Segment Offload over TCP IPV4 39 * Large Segment Offload over TCP IPV6 41 * TCP over IPv4 checksum offload 44 * TCP over IPv6 checksum offload
|
| /src/sys/dev/qlxgbe/ |
| H A D | README.txt | 38 * Large Segment Offload over TCP IPV4 39 * Large Segment Offload over TCP IPV6 41 * TCP over IPv4 checksum offload 44 * TCP over IPv6 checksum offload
|
| /src/contrib/sendmail/cf/mailer/ |
| H A D | smtp.m4 | 19 ifdef(`SMTP_MAILER_ARGS',, `define(`SMTP_MAILER_ARGS', `TCP $h')') 20 ifdef(`ESMTP_MAILER_ARGS',, `define(`ESMTP_MAILER_ARGS', `TCP $h')') 21 ifdef(`SMTP8_MAILER_ARGS',, `define(`SMTP8_MAILER_ARGS', `TCP $h')') 22 ifdef(`DSMTP_MAILER_ARGS',, `define(`DSMTP_MAILER_ARGS', `TCP $h')') 23 ifdef(`RELAY_MAILER_ARGS',, `define(`RELAY_MAILER_ARGS', `TCP $h')')
|
| /src/contrib/sendmail/cf/feature/ |
| H A D | msp.m4 | 37 ifelse(_ARG2_, `MSA', `define(`RELAY_MAILER_ARGS', `TCP $h 587')') 55 define(`LOCAL_MAILER_ARGS', `TCP $h')dnl 59 define(`LOCAL_SHELL_ARGS', `TCP $h')dnl
|
| /src/tools/regression/netinet/tcpstream/ |
| H A D | README | 1 tcpstream - a simple TCP streaming test tool 4 tcpstream generates TCP connections between a 'client' and a 'server'. The
|
| /src/sys/dev/ice/ |
| H A D | ice_lan_tx_rx.h | 1225 ICE_PTT(26, IP, IPV4, NOF, NONE, NONE, NOF, TCP, PAY4), 1234 ICE_PTT(33, IP, IPV4, NOF, IP_IP, IPV4, NOF, TCP, PAY4), 1243 ICE_PTT(40, IP, IPV4, NOF, IP_IP, IPV6, NOF, TCP, PAY4), 1255 ICE_PTT(48, IP, IPV4, NOF, IP_GRENAT, IPV4, NOF, TCP, PAY4), 1264 ICE_PTT(55, IP, IPV4, NOF, IP_GRENAT, IPV6, NOF, TCP, PAY4), 1276 ICE_PTT(63, IP, IPV4, NOF, IP_GRENAT_MAC, IPV4, NOF, TCP, PAY4), 1285 ICE_PTT(70, IP, IPV4, NOF, IP_GRENAT_MAC, IPV6, NOF, TCP, PAY4), 1297 ICE_PTT(78, IP, IPV4, NOF, IP_GRENAT_MAC_VLAN, IPV4, NOF, TCP, PAY4), 1306 ICE_PTT(85, IP, IPV4, NOF, IP_GRENAT_MAC_VLAN, IPV6, NOF, TCP, PAY4), 1315 ICE_PTT(92, IP, IPV6, NOF, NONE, NONE, NOF, TCP, PAY4), [all …]
|