/freebsd/share/man/man9/ |
H A D | pfil.9 | 65 Packet filtering points, for historical reasons named 73 If the filtering point to be ever destroyed, the subsystem that 77 Packet filtering systems may register arbitrary number of filters, 86 the actual filtering function and user readable name of the filtering 105 is called by filtering modules to autoregister their default ruleset 106 and default filtering points. 124 In case if a hooked filtering module cannot understand 133 .Sh HEADS (filtering points)
|
/freebsd/contrib/sendmail/libmilter/docs/ |
H A D | index.html | 3 <TITLE>Filtering Mail with Sendmail</TITLE> 10 <H1>Filtering Mail with Sendmail</H1> 25 content and meta-information. Filtering policies implemented by 31 filtering, and content control. In general, Milter seeks to address 32 site-wide filtering concerns in a scalable way. Individual users' mail 33 filtering needs (e.g. sorting messages by subject) are left to 56 <LI>Implementing Filtering Policies
|
H A D | design.html | 16 <LI>Implementing Filtering Policies 32 We expect to see both vendor-supplied, configurable mail filtering 38 However, as will be seen in the example, many filtering applications 82 <H2>Implementing Filtering Policies</H2> 85 third-party filters to implement a desired mail filtering policy. For 96 overall mail filtering environment. In particular, he/she must decide
|
/freebsd/sys/net/ |
H A D | bpf_jitter.h | 44 * Prototype of a filtering function created by the jitter. 52 /* Structure describing a native filtering program created by the jitter. */ 54 /* The native filtering binary, in the form of a bpf_filter_func. */ 65 * return The bpf_jit_filter structure containing the native filtering 74 * Deletes a filtering function that was previously created by bpf_jitter(). 79 * with a filtering function.
|
/freebsd/share/examples/ipfilter/ |
H A D | examples.txt | 14 [Image] Packet state filtering 99 Filtering IP fragments 102 fragments can pose a large threat to IP packet filtering, IF there are rules 133 Filtering on IP options can be achieved two ways. The first is by naming 169 Filtering by ports 171 Filtering by port number only works with the TCP and UDP IP protocols. When 236 Filtering on TCP flags is useful, but fraught with danger. I'd recommend 237 that before using TCP flags in your IP filtering, you become at least a 243 Some IP filtering/firewall packages allow you to filter out TCP packets 244 which belong to an "established" connection. This is, simply put, filtering [all …]
|
/freebsd/share/man/man4/ |
H A D | bridge.4 | 274 .Sh PACKET FILTERING 275 Packet filtering can be used with any firewall package that hooks in via the 278 When filtering is enabled, bridged packets will pass through the filter 282 The filtering behavior can be controlled using 296 to enable filtering on the incoming and outgoing member interfaces, set 303 to enable filtering on the bridge interface, set 317 to enable layer2 filtering with 336 to enable layer2 ARP filtering with 434 The described situation will appear at least on the filtering bridges 441 will let you do the additional filtering on the physical interface.
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/events/ |
H A D | zed_rc_filter.ksh | 30 # Verify zed.rc ZED_SYSLOG_SUBCLASS_INCLUDE/EXCLUDE event filtering works. 34 # 2. Test different combinations of ZED_SYSLOG_SUBCLASS_INCLUDE filtering. 36 # 4. Test different combinations of ZED_SYSLOG_SUBCLASS_EXCLUDE filtering. 106 log_pass "zed.rc event filtering works correctly."
|
/freebsd/sbin/ipf/ipf/ |
H A D | ipf.8 | 3 ipf \- alters packet filtering lists for IP packet input and output 100 When an option is set, any packet which exits filtering and matches the 145 displayed (whether logging is active, default filtering, etc). 156 Zero global statistics held in the kernel for filtering only (this doesn't 178 Needs to be run as root for the packet filtering lists to actually
|
H A D | ipfilter.4 | 4 ipfilter \- Introduction to IP packet filtering 42 UDP and ICMP. The IP Packet filter allows filtering of: 106 interrogates the kernel for statistics on packet filtering, so 181 | V groups IP Filtering V | 214 V | IP Filtering | |
|
H A D | ipf.5 | 119 recognised protocols. After decapsulating the inner packet, any filtering 155 The first and most basic part of matching for filtering rules is to 547 By itself, filtering based on the TCP flags becomes more work but when 548 combined with stateful filtering (see below), the situation changes. 550 The TCP and UDP are not the only protocols for which filtering beyond 564 The ICMP header has two fields that are of interest for filtering: 613 .SH Stateful Packet Filtering 614 Stateful packet filtering is where IPFilter remembers some information from 654 When using stateful filtering with TCP it is best to add "flags S" to the 658 filtering, there are some options that are only sent at the start of the [all …]
|
/freebsd/sys/contrib/dev/iwlwifi/fw/api/ |
H A D | power.h | 614 * @bf_energy_delta: Used for RSSI filtering, if in 'normal' state. Send beacon 617 * the Energy change is ignored for beacon filtering, and beacon will 620 * @bf_roaming_energy_delta: Used for RSSI filtering, if in 'roaming' state. 623 * means that the Energy change is ignored for beacon filtering while in 625 * @bf_roaming_state: Used for RSSI filtering. If absolute Energy values 630 * filtering (Slow or Fast) that is selected (Units are in Celsuis): 637 * beacon filtering; beacons will not be forced to be sent to driver 642 * beacon filtering; beacons will not be forced to be sent to driver 644 * @bf_enable_beacon_filter: 1, beacon filtering is enabled; 0, disabled. 645 * @bf_debug_flag: beacon filtering debu [all...] |
/freebsd/sys/dev/ice/ |
H A D | virtchnl.h | 789 * The VF would interpret this as VLAN filtering can be supported on both 0x8100 816 * VLAN filtering if the underlying PF supports it. 820 * allows the VF to toggle VLAN filtering, stripping, and/or insertion it should 839 * for filtering, insertion, and stripping capabilities. 841 * If only outer capabilities are supported (for filtering, insertion, and/or 845 * If only inner capabilities are supported (for filtering, insertion, and/or 851 * If both outer and inner capabilities are supported (for filtering, insertion, 863 /* The PF populates these fields based on the supported VLAN filtering. If a 868 * Also, a VF is only allowed to toggle its VLAN filtering setting if the 872 * enabled for VLAN filtering 951 struct virtchnl_vlan_filtering_caps filtering; global() member [all...] |
/freebsd/contrib/libpcap/ |
H A D | README.md | 38 The libpcap interface supports a filtering mechanism based on the 46 Although most packet capture interfaces support in-kernel filtering, 47 libpcap utilizes in-kernel filtering only for the BPF interface.
|
/freebsd/contrib/wpa/src/ap/ |
H A D | hs20.c | 240 "HS 2.0: Terms and Conditions filtering required for " in hs20_t_c_filtering() 243 /* TODO: Enable firewall filtering for the STA */ in hs20_t_c_filtering() 248 "HS 2.0: Terms and Conditions filtering not required for " in hs20_t_c_filtering() 251 /* TODO: Disable firewall filtering for the STA */ in hs20_t_c_filtering()
|
/freebsd/contrib/llvm-project/lldb/source/Plugins/Trace/intel-pt/ |
H A D | TraceIntelPTOptions.td | 127 : Option<"disable-cgroup-filtering", "d">, 128 Desc<"Disable the automatic cgroup filtering that is applied if " 130 "is provided. Cgroup filtering allows collecting intel pt data "
|
/freebsd/sbin/pfilctl/ |
H A D | pfilctl.8 | 49 packet filtering hooks and filters on them. 53 List available packet filtering points.
|
/freebsd/sys/dev/e1000/ |
H A D | e1000_manage.c | 125 * e1000_enable_tx_pkt_filtering_generic - Enable packet filtering on Tx 128 * Enables packet filtering on transmit packets if manageability is enabled 143 /* No manageability, no filtering */ in e1000_enable_tx_pkt_filtering_generic() 150 * reason, disable filtering. in e1000_enable_tx_pkt_filtering_generic() 170 * take the safe route of assuming Tx filtering is enabled. in e1000_enable_tx_pkt_filtering_generic() 177 /* Cookie area is valid, make the final check for filtering. */ in e1000_enable_tx_pkt_filtering_generic()
|
/freebsd/usr.sbin/lpr/lpd/ |
H A D | printcap | 4 # parallel port. No kind of filtering is done, so everything you pass 37 # You can perform any kind of local filtering directly. If you need
|
/freebsd/sys/arm/allwinner/ |
H A D | if_emacreg.h | 143 /* Enable DA Filtering */ 155 /* Enable SA Filtering */ 158 /* Inverse Filtering */
|
/freebsd/contrib/googletest/googletest/test/ |
H A D | googletest-filter-unittest.py | 423 """Tests filtering by full name.""" 439 """Tests filtering by test case name.""" 450 """Tests filtering by test name.""" 621 # Value parameterized tests filtering by the sequence name. 632 # Value parameterized tests filtering by the test name. 644 """Tests that the filter flag overrides the filtering env. variable."""
|
/freebsd/usr.sbin/bsnmpd/modules/snmp_bridge/ |
H A D | BRIDGE-MIB.txt | 807 filtering information. This information is used 819 filtering information." 839 forwarding and/or filtering information." 854 have some forwarding/filtering information about this 1005 -- The Static (Destination-Address Filtering) Database 1015 "A table containing filtering information configured 1035 "Filtering information configured into the bridge by 1059 entry's filtering information applies. This object can 1073 entry's filtering information to apply. A value of zero 1300 "Filtering Database information for the Bridge." [all …]
|
/freebsd/share/man/man5/ |
H A D | pf.conf.5 | 55 Options tune the behaviour of the packet filtering engine. 56 .It Cm Ethernet Filtering 57 Ethernet filtering provides rule-based blocking or passing of Ethernet packets. 66 .It Cm Packet Filtering 67 Packet filtering provides rule-based blocking or passing of packets. 77 packet filtering engine. 651 .Em filtering . 678 packet filtering is not desired and can have unexpected effects. 705 .Sh ETHERNET FILTERING 983 ruleset are evaluated for every packet before stateful filtering. [all …]
|
/freebsd/lib/libkvm/ |
H A D | kvm_getprocs.3 | 66 describes the filtering predicate as follows: 92 modifier to return all kernel visible threads when filtering
|
/freebsd/sys/arm64/coresight/ |
H A D | coresight_etm4x.c | 146 /* No address filtering for ViewData. */ in etm_prepare() 153 /* No address range filtering for ViewInst. */ in etm_prepare() 163 /* No address filtering for ViewData. */ in etm_prepare()
|
/freebsd/tests/sys/netpfil/pf/ |
H A D | rtable.sh | 58 # Allow replies coming back to the tester properly via stateful filtering post-routing. 106 # Allow replies coming back to the tester properly via stateful filtering post-routing.
|