I have yet to see any implementation of any FW in 2014 - 2016 that has UDP timeouts in the 2-5 minutes range , as described in RFC 4787 . IF I remember UDP implementations from a lot of todays firewalls is typically set default timeout to about 30-40 seconds , and despite RFC4787 I would rather recommend having lower timeouts for UDP and higher ones for just those protocols that require this than to have 2-5 minutes for UDP which in most cases never last more then 2-4 seconds . That seems like an unreasonable reverse logic and use of resources , looking at today vs 10-20 years ago's most common UDP traffic patterns . But yes , I agree on increasing connection table in either case as this was clearly low for such current level of sessions and find the root cause for the high amounts of sessions and fix that if possible ... Best regards André Paulsberg-Csibi Senior Network Engineer Fault Handling IBM Services AS andre.paulsberg-csibi@xxxxxxxx M +47 9070 5988 -----Original Message----- From: netfilter-owner@xxxxxxxxxxxxxxx [mailto:netfilter-owner@xxxxxxxxxxxxxxx] On Behalf Of zrm Sent: 2. september 2016 16:48 To: André Paulsberg-Csibi (IBM Consultant) <Andre.Paulsberg-Csibi@xxxxxxxx>; John Ratliff <jratliff@xxxxxxxxxxxxxx>; netfilter@xxxxxxxxxxxxxxx Subject: Re: nf_conntrack_max On 09/02/2016 02:27 AM, André Paulsberg-Csibi (IBM Consultant) wrote: > In the meantime there is no real issues increasing you the connection table while you figure that out , > and you can also GLOBALY fix the UDP timeouts if you so desire as most likely this can be lowered significantly from > the defaults , here you can see one example from a smaller FW then yours ( but still applicable ) : > > zotac:~ # grep netfilter /etc/sysctl.conf > net.netfilter.nf_conntrack_max = 10000 > net.netfilter.nf_conntrack_tcp_timeout_established = 3600 > net.netfilter.nf_conntrack_tcp_timeout_close_wait = 40 > net.netfilter.nf_conntrack_tcp_timeout_fin_wait = 40 > net.netfilter.nf_conntrack_tcp_timeout_syn_recv = 40 > net.netfilter.nf_conntrack_tcp_timeout_syn_sent = 40 > net.netfilter.nf_conntrack_tcp_timeout_time_wait = 40 > net.netfilter.nf_conntrack_udp_timeout_stream = 60 > net.netfilter.nf_conntrack_udp_timeout = 10 Global timeouts that short can cause other trouble though. See RFC4787 Section 4.3 and RFC5382 Section 5. Outside of reducing the timeout only for DNS, the best choice is probably just increasing the maximum number of conntrack entries (and buying more memory if necessary). -- To unsubscribe from this list: send the line "unsubscribe netfilter" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html -- To unsubscribe from this list: send the line "unsubscribe netfilter" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html