Thanks, I'll keep an eye on that field.
The server was rebooted this morning, and has quite a few state entries
already.
236 1:44pm# uptime
1:45pm up 4:08, 2 users, load average: 0.01, 0.01, 0.02
237 1:45pm# ipfstat -s
IP states added:
4502 TCP
122908 UDP
0 ICMP
478371 hits
949944 misses
116227 maximum
0 no memory
3467 bkts in use
5354 active
121563 expired
493 closed
Wes Zuber wrote:
Make sure that the state table is not filling up.
do ipfstat -s
you should see some output that looks like this:
IP states added:
23529 TCP
272219 UDP
62094 ICMP
6373584 hits
17441384 misses
0 maximum
0 no memory
14 bkts in use
178 logged
715483 log failures
14 active
334303 expired
23516 closed
If the Maximum field is greater then zero then you state table has
filled up at one time or another. If you see the Maximum number
increasing then this for sure is a problem.
--Wes
On Jun 3, 2005, at 10:59 AM, Erik Huizing wrote:
Hello,
we've got a fairly busy DNS server that we see intermitent
filtering problems on. When the issue happens, the box is
unreachable over the network. In the logs, we see that the filter's
blocked traffic from some of the ports where we've got allow rules
for. The issue seems to be with ipfilter (or the rules), as the
problems go away after running an ipf -Fa. Oddly enough, these
issues don't seem to occur on other servers running similar rule sets.
Does anyone have any ideas/recommendations?
Thanks in advance,
uname:
SunOS ns5.so.cg 5.9 Generic_112233-11 sun4u sparc SUNW,Sun-Fire-V240
isainfo -vk
64-bit sparcv9 kernel modules
netstat -i
Name Mtu Net/Dest Address Ipkts Ierrs Opkts Oerrs
Collis Queue
lo0 8232 loopback localhost 135730 0 135730 0
0 0 bge0 1500 ns5.so.cg ns5 437077 0
424487 0 0 0 netstat -s -P ip
IPv4 ipForwarding = 2 ipDefaultTTL = 255
ipInReceives =434119 ipInHdrErrors = 0
ipInAddrErrors = 0 ipInCksumErrs = 0
ipForwDatagrams = 0 ipForwProhibits = 0
ipInUnknownProtos = 0 ipInDiscards = 0
ipInDelivers =555814 ipOutRequests =425908
ipOutDiscards = 0 ipOutNoRoutes = 12
ipReasmTimeout = 60 ipReasmReqds = 0
ipReasmOKs = 0 ipReasmFails = 0
ipReasmDuplicates = 0 ipReasmPartDups = 0
ipFragOKs = 0 ipFragFails = 0
ipFragCreates = 0 ipRoutingDiscards = 0
tcpInErrs = 1 udpNoPorts = 11808
udpInCksumErrs = 6 udpInOverflows = 0
rawipInOverflows = 0 ipsecInSucceeded = 0
ipsecInFailed = 0 ipInIPv6 = 0
ipOutIPv6 = 0 ipOutSwitchIPv6 = 2
ipf -V
ipf: IP Filter: v3.4.31 (496)
Kernel: IP Filter: v3.4.31 Running: yes
Log Flags: 0 = none set
Default: pass all, Logging: available
Active list: 1
dropped packets: in 0 out 0
non-data packets: in 1 out 1
no-data packets: in 0 out 0
non-ip packets: in 0 out 0
bad packets: in 0 out 0
copied messages: in 2195 out 0
IPv6 packets: in 0 out 0
input packets: blocked 2009 passed 434869 nomatch 37298
counted 0 short 0
output packets: blocked 0 passed 427197 nomatch 35435
counted 0 short 0
input packets logged: blocked 1873 passed 0
output packets logged: blocked 0 passed 0
packets logged: input 1233 output 0
log failures: input 0 output 0
fragment state(in): kept 0 lost 0
fragment state(out): kept 0 lost 0
packet state(in): kept 53 lost 95
packet state(out): kept 47408 lost 127133
ICMP replies: 0 TCP RSTs sent: 0
Invalid source(in): 0
Result cache hits(in): 130898 (out): 114013
IN Pullups succeeded: 0 failed: 0
OUT Pullups succeeded: 1869 failed: 0
Fastroute successes: 0 failures: 0
TCP cksum fails(in): 0 (out): 0
Packet log flags set: (0)
none
ipfstat -i
pass in quick on lo0 from any to any
pass in quick proto icmp from any to any
pass in quick proto udp from any port 66 >< 69 to any port = 67 keep
state
pass in quick proto tcp from HOSTA/32 to any port = 22 flags S/
FSRPAU keep state keep frags
pass in quick proto tcp from NETA/23 to any port = 22 flags S/ FSRPAU
keep state keep frags
pass in quick proto tcp from NETB/24 to any port = 22 flags S/ FSRPAU
keep state keep frags
pass in quick proto udp from NETA/23 to any port = 161
pass in quick proto udp from NETB/24 to any port = 161
pass in quick proto tcp from NETA/23 to any port = 8400 flags S/
FSRPAU keep state keep frags
pass in quick proto tcp from NETB/24 to any port = 8400 flags S/
FSRPAU keep state keep frags
pass in quick proto tcp/udp from any to any port = domain
block in quick proto tcp from any to any port = 80
block in quick proto tcp from any to any port = 445
block in quick proto tcp/udp from any to any port 134 >< 140
block in log from any to any
ipfstat -o
pass out quick on lo0 from any to any
pass out quick proto tcp from any to any flags S/FSRPAU keep state
pass out quick proto tcp from any to any flags A/A
pass out quick from any to any keep state
block out log from any to any
no ipnat
--
Erik Huizing
--
Erik Huizing
Regional Services
(403)-781-4906