I have two firewalls that take evenly distributed traffic from 2 different internet pipes (45 MB/s each). These are bridging firewalls and have been in operation for nearly 5 years. Recently one firewall has started giving the log message at a huge rate: nf_conntrack: table full, dropping packet The table just keeps filling up, while the other firewall remains steady ie one is steady at ~10k, and the other is full at over 65k I have adjusted all of the sysctl properties I can find to increase max values and decrease timeouts where reasonable. Are there any 'gotchas' that might cause this? I'm just not sure where to look at this point. Both machines have the same config: net.bridge.bridge-nf-call- iptables=1 net.bridge.bridge-nf-filter-vlan-tagged=1 net.netfilter.nf_conntrack_max = 786432 net.netfilter.nf_conntrack_buckets = 196608 net.ipv4.netfilter.ip_conntrack_max = 131072 net.ipv4.netfilter.ip_conntrack_buckets = 32768 net.netfilter.nf_conntrack_tcp_timeout_unacknowledged = 30 net.nf_conntrack_max = 786432 net.ipv4.netfilter.ip_conntrack_generic_timeout=120 net.ipv4.netfilter.ip_conntrack_tcp_timeout_established=54000 net.core.somaxconn=1024 net.ipv4.tcp_fin_timeout = 30 net.ipv4.netfilter.ip_conntrack_tcp_timeout_fin_wait = 60 net.ipv4.tcp_max_syn_backlog=1280 net.ipv4.tcp_keepalive_probes = 5 net.ipv4.tcp_keepalive_intvl = 15 # Uncomment the next two lines to enable Spoof protection (reverse-path filter) # Turn on Source Address Verification in all interfaces to # prevent some spoofing attacks #net.ipv4.conf.default.rp_filter=1 #net.ipv4.conf.all.rp_filter=1 # Uncomment the next line to enable TCP/IP SYN cookies # See http://lwn.net/Articles/277146/ # Note: This may impact IPv6 TCP sessions too net.ipv4.tcp_syncookies=1 # Uncomment the next line to enable packet forwarding for IPv4 #net.ipv4.ip_forward=1 # Uncomment the next line to enable packet forwarding for IPv6 # Enabling this option disables Stateless Address Autoconfiguration # based on Router Advertisements for this host #net.ipv6.conf.all.forwarding=1 ############################## ##################################### # Additional settings - these settings can improve the network # security of the host and prevent against some network attacks # including spoofing attacks and man in the middle attacks through # redirection. Some network environments, however, require that these # settings are disabled so review and enable them as needed. # # Do not accept ICMP redirects (prevent MITM attacks) net.ipv4.conf.all.accept_redirects = 0 net.ipv6.conf.all.accept_redirects = 0 # _or_ # Accept ICMP redirects only for gateways listed in our default # gateway list (enabled by default) # net.ipv4.conf.all.secure_redirects = 1 # # Do not send ICMP redirects (we are not a router) net.ipv4.conf.all.send_redirects = 0 # # Do not accept IP source route packets (we are not a router) net.ipv4.conf.all.accept_source_route = 0 net.ipv6.conf.all.accept_source_route = 0 # # Log Martian Packets net.ipv4.conf.all.log_martians = 0 # -- To unsubscribe from this list: send the line "unsubscribe netfilter" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html