dst cache overflow (bridged wan interfaces)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I recompiled yet 2.6.19.1 kernel (using iptables with the same patches too).

The configuration for this test is:
   1) linux box with 2.6.19.1 kernel (SMP machine) with these
patches/modules:
      a) l7-filter
      b) ipp2p
      c) connlimit
      d) set
   2) 4 ethernet interfaces:
      a) 2 external (eth1 and eth3) interfaces with balanced links (as
described in nato-howto) bridged as wan0 with static IPs assigned to
wan0 and wan0:1
      b) 2 internal ineterfaces (eth0 and eth2) in bridge zlan0 with STP
enabled and configured.

IPTABLES relevant configuration:
# iptables -t nat -vn -L POSTROUTING
Chain POSTROUTING (policy ACCEPT 185 packets, 16649 bytes)
 pkts bytes target     prot opt in     out     source              
destination
   26  1529 MASQUERADE  0    --  *      wan0    10.1.1.0/27         
0.0.0.0/0
    0     0 MASQUERADE  0    --  *      wan0:1  10.1.1.0/27         
0.0.0.0/0


ROUTES CONFIGURATION:
# service rt status
=== REGLAS DE ENRUTAMIENTO ===
0:      from all lookup local
50:     from all lookup main
151:    from NET_PUB1 lookup 151
152:    from NET_PUB2 lookup 152
220:    from all lookup 220
32766:  from all lookup main
32767:  from all lookup default
=== TABLAS DE RUTAS ===
=== MAIN ===
NET_PUB1/26 dev wan0  proto kernel  scope link  src IP_PUB1
NET_PUB2/24 dev wan0  proto kernel  scope link  src IP_PUB2
192.168.3.0/24 dev zlan0  proto kernel  scope link  src 192.168.3.247
192.168.2.0/24 dev zlan0  proto kernel  scope link  src 192.168.2.247
192.168.1.0/24 dev zlan0  proto kernel  scope link  src 192.168.1.247
10.1.1.0/24 dev zlan0  proto kernel  scope link  src 10.1.1.6
169.254.0.0/16 dev zlan0  scope link
239.0.0.0/8 dev zlan0  scope link
=== wan0 TABLA 151 ===
default via GW_PUB1 dev wan0  proto static  src IP_PUB1
prohibit default  proto static  metric 1
=== wan0 TABLA 152 ===
default via GW_PUB2 dev wan0  proto static  src IP_PUB2
prohibit default  proto static  metric 1
=== TABLA 220 (defecto) ===
default  proto static
        nexthop via GW_PUB1  dev wan0 weight 1
        nexthop via GW_PUB2  dev wan0 weight 1

ROUTING parameters configuration:
# grep . /proc/sys/net/ipv4/route/*
/proc/sys/net/ipv4/route/error_burst:5000
/proc/sys/net/ipv4/route/error_cost:1000
grep: /proc/sys/net/ipv4/route/flush: Operación no permitida
/proc/sys/net/ipv4/route/gc_elasticity:8
/proc/sys/net/ipv4/route/gc_interval:60
/proc/sys/net/ipv4/route/gc_min_interval:0
/proc/sys/net/ipv4/route/gc_min_interval_ms:500
/proc/sys/net/ipv4/route/gc_thresh:32768
/proc/sys/net/ipv4/route/gc_timeout:300
/proc/sys/net/ipv4/route/max_delay:10
/proc/sys/net/ipv4/route/max_size:524288
/proc/sys/net/ipv4/route/min_adv_mss:256
/proc/sys/net/ipv4/route/min_delay:2
/proc/sys/net/ipv4/route/min_pmtu:552
/proc/sys/net/ipv4/route/mtu_expires:600
/proc/sys/net/ipv4/route/redirect_load:20
/proc/sys/net/ipv4/route/redirect_number:9
/proc/sys/net/ipv4/route/redirect_silence:20480
/proc/sys/net/ipv4/route/secret_interval:600

When I test it along some weeks with intensive traffic I'll put here more
info about this test.

If somebody has any idea on how to solve the problem, please, tell us. I'm
a bit desesperate with this issue.

Regards



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux