>
> kernel: Limiting open port RST response from xxxx to yyy packets/sec
> Is there a way to find out which specific TCP port is getting hammered
> or any other additional debug information related to these log entries?
> (the server has multiple open and publicly reachable open TCP ports)
>
You can identify and log these packets in IPFIREWALL (man ipfw).
You can also set sysctl net.inet.tcp.log_debug=1
--
"Well," Brahma said, "even after ten thousand explanations, a fool is no
wiser, but an intelligent person requires only two thousand five hundred."
- The Mahābhārata
_______________________________________________
freebsd-...@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "freebsd-questi...@freebsd.org"