For whatever reason, it sounds like you state table is filling up, and thus, it appears the firewall has stopped working because it cannot track any new connections. After the state table cleans itself out over time, things seem to start working again. You cat check your state table by doing a: cat /proc/net/ip_conntrack. How many connections that the connection tracking table can hold depends upon a variable that can changed. The default value depends on how much memory you have. In general, you are allocated about 8000 connections for every 128 MB of RAM. You can read and set your settings through the /proc/sys/net/ipv4/ip_conntrack_max setting. Example: echo "65000" > /proc/sys/net/ipv4/ip_conntrack_max. Mind you, this is just a hunch. -----Original Message----- From: netfilter-admin@xxxxxxxxxxxxxxxxxxx [mailto:netfilter-admin@xxxxxxxxxxxxxxxxxxx] On Behalf Of Erik Ahlner Sent: Monday, March 29, 2004 5:53 AM To: netfilter@xxxxxxxxxxxxxxxxxxx Subject: Iptables and kernel 2.6.4 on slackware 9.1 hello! I've recently reentered this mailinglist and thus i don't know if this question has been asked before.. i hope i'm not alone with this problem! Last week I bought a new harddrive for my box, and installed slackware 9.1 (had 8.0 earlier) and compiled kernel 2.6.4 (had 2.4.22 earlier). At first, everything seems to be fine, iptables runs. But after half an hour or so, iptables just stops working. It's only iptables that does this (i suppose), the server/router still has connection to the internet and the computers behind it. (I.e i have a ventrilo server running on the router, and i can still talk to users connecting to it from the internet, while i'm connected to it from inside the lan). After about 5 minutes of downtime iptables suddenly starts working again, and the computers on the NAT has internet access again. These are my rules: IPTABLES=/usr/sbin/iptables EXTIF="eth0" INTIF="eth1" $IPTABLES -P INPUT ACCEPT $IPTABLES -F INPUT $IPTABLES -P OUTPUT ACCEPT $IPTABLES -F OUTPUT $IPTABLES -P FORWARD DROP $IPTABLES -F FORWARD $IPTABLES -t nat -F $IPTABLES -A FORWARD -i $EXTIF -o $INTIF -j ACCEPT $IPTABLES -A FORWARD -i $INTIF -o $EXTIF -j ACCEPT $IPTABLES -t nat -A POSTROUTING -o $EXTIF -j MASQUERADE Nothing here has changes since i was running kernel 2.4.22. What could be the problem? Anyone else who has experienced this? I'm using iptables v1.2.9 Regards Erik Ahlner