On Mon, Feb 27, 2017 at 02:43:08PM -0300, Elise Lennion wrote: > Hashlimit has similar functionality to flow tables in nftables. Some > usage examples are: > > $ iptables-translate -A OUTPUT -m tcp -p tcp --dport 443 -m hashlimit \ > --hashlimit-above 20kb/s --hashlimit-burst 1mb --hashlimit-mode dstip \ > --hashlimit-name https --hashlimit-dstmask 24 -m state --state NEW \ > -j DROP > > nft add rule ip filter OUTPUT tcp dport 443 flow table https { ip \ > daddr and 255.255.255.0 timeout 60s limit rate over 20 kbytes/second \ > burst 1 mbytes} ct state new counter drop > > $ iptables-translate -A OUTPUT -m tcp -p tcp --dport 443 -m hashlimit \ > --hashlimit-upto 300 --hashlimit-burst 15 --hashlimit-mode \ > srcip,dstip --hashlimit-name https --hashlimit-htable-expire 300000 \ > -m state --state NEW -j DROP > > nft add rule ip filter OUTPUT tcp dport 443 flow table https { ip \ > daddr . ip saddr timeout 300s limit rate 300/second burst 15 packets} \ > ct state new counter drop > > The translation isn't supported when --hashlimit-mode isn't specified. > Also, the following options don't apply to flow tables: > > --hashlimit-htable-size > --hashlimit-htable-max > --hashlimit-htable-gcinterval Applied, thanks Elise. I think it would be good to enhance the flow table article in the wiki to describe how people can do hashlimit with nft. -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html