Trouble with full nf_conntrack table

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I have two firewalls that take evenly distributed traffic from 2
different internet pipes (45 MB/s each). These are bridging firewalls
and have been in operation for nearly 5 years.

Recently one firewall has started giving the log message at a huge rate:

nf_conntrack: table full, dropping packet

The table just keeps filling up, while the other firewall remains
steady  ie one is steady at ~10k, and the other is full at over 65k

I have adjusted all of the sysctl properties I can find to increase
max values and decrease timeouts where reasonable.

Are there any 'gotchas' that might cause this?  I'm just not sure
where to look at this point.  Both machines have the same config:


net.bridge.bridge-nf-call-
iptables=1
net.bridge.bridge-nf-filter-vlan-tagged=1
net.netfilter.nf_conntrack_max = 786432
net.netfilter.nf_conntrack_buckets = 196608
net.ipv4.netfilter.ip_conntrack_max = 131072
net.ipv4.netfilter.ip_conntrack_buckets = 32768
net.netfilter.nf_conntrack_tcp_timeout_unacknowledged = 30
net.nf_conntrack_max = 786432
net.ipv4.netfilter.ip_conntrack_generic_timeout=120
net.ipv4.netfilter.ip_conntrack_tcp_timeout_established=54000
net.core.somaxconn=1024
net.ipv4.tcp_fin_timeout = 30
net.ipv4.netfilter.ip_conntrack_tcp_timeout_fin_wait = 60
net.ipv4.tcp_max_syn_backlog=1280
net.ipv4.tcp_keepalive_probes = 5
net.ipv4.tcp_keepalive_intvl = 15

# Uncomment the next two lines to enable Spoof protection (reverse-path filter)
# Turn on Source Address Verification in all interfaces to
# prevent some spoofing attacks
#net.ipv4.conf.default.rp_filter=1
#net.ipv4.conf.all.rp_filter=1

# Uncomment the next line to enable TCP/IP SYN cookies
# See http://lwn.net/Articles/277146/
# Note: This may impact IPv6 TCP sessions too
net.ipv4.tcp_syncookies=1

# Uncomment the next line to enable packet forwarding for IPv4
#net.ipv4.ip_forward=1

# Uncomment the next line to enable packet forwarding for IPv6
#  Enabling this option disables Stateless Address Autoconfiguration
#  based on Router Advertisements for this host
#net.ipv6.conf.all.forwarding=1

##############################
#####################################
# Additional settings - these settings can improve the network
# security of the host and prevent against some network attacks
# including spoofing attacks and man in the middle attacks through
# redirection. Some network environments, however, require that these
# settings are disabled so review and enable them as needed.
#
# Do not accept ICMP redirects (prevent MITM attacks)
net.ipv4.conf.all.accept_redirects = 0
net.ipv6.conf.all.accept_redirects = 0
# _or_
# Accept ICMP redirects only for gateways listed in our default
# gateway list (enabled by default)
# net.ipv4.conf.all.secure_redirects = 1
#
# Do not send ICMP redirects (we are not a router)
net.ipv4.conf.all.send_redirects = 0
#
# Do not accept IP source route packets (we are not a router)
net.ipv4.conf.all.accept_source_route = 0
net.ipv6.conf.all.accept_source_route = 0
#
# Log Martian Packets
net.ipv4.conf.all.log_martians = 0
#
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux