Hello
I Configure shorewall for a Asterisk server.
Need to add on /etc/shorewall/start
rmmod nf_nat_sip &> /dev/null
rmmod nf_conntrack_sip &> /dev/null
And works fine.
The only problem i detect its when i have a call stablished, , on the 30
minutes mark, the call is down, and need to do another call
Configuration its on a Centos 6.5 Final and kernel 2.6.32-431.17.1, Shorewall
4.5.4
I Send the parts of shorewall dump related to the modules and nfconntrack, i
understand its something generic with tcp connections or nf_conntraf (netfilter)
Thanks in advance
Regards
Victor
/proc
/proc/version = Linux version 2.6.32-431.17.1.el6.x86_64
([email protected]) (gcc version 4.4.7 20120313 (Red Hat
4.4.7-4) (GCC) ) #1 SMP Wed May 7 23:32:49 UTC 2014
/proc/sys/net/ipv4/ip_forward = 1
/proc/sys/net/ipv4/icmp_echo_ignore_all = 0
/proc/sys/net/ipv4/conf/all/proxy_arp = 0
/proc/sys/net/ipv4/conf/all/arp_filter = 0
/proc/sys/net/ipv4/conf/all/arp_ignore = 0
/proc/sys/net/ipv4/conf/all/rp_filter = 0
/proc/sys/net/ipv4/conf/all/log_martians = 0
/proc/sys/net/ipv4/conf/default/proxy_arp = 0
/proc/sys/net/ipv4/conf/default/arp_filter = 0
/proc/sys/net/ipv4/conf/default/arp_ignore = 0
/proc/sys/net/ipv4/conf/default/rp_filter = 0
/proc/sys/net/ipv4/conf/default/log_martians = 1
/proc/sys/net/ipv4/conf/eth0/proxy_arp = 0
/proc/sys/net/ipv4/conf/eth0/arp_filter = 0
/proc/sys/net/ipv4/conf/eth0/arp_ignore = 0
/proc/sys/net/ipv4/conf/eth0/rp_filter = 0
/proc/sys/net/ipv4/conf/eth0/log_martians = 1
/proc/sys/net/ipv4/conf/lo/proxy_arp = 0
/proc/sys/net/ipv4/conf/lo/arp_filter = 0
/proc/sys/net/ipv4/conf/lo/arp_ignore = 0
/proc/sys/net/ipv4/conf/lo/rp_filter = 0
/proc/sys/net/ipv4/conf/lo/log_martians = 1
/proc/sys/net/ipv4/conf/tun3/proxy_arp = 0
/proc/sys/net/ipv4/conf/tun3/arp_filter = 0
/proc/sys/net/ipv4/conf/tun3/arp_ignore = 0
/proc/sys/net/ipv4/conf/tun3/rp_filter = 0
/proc/sys/net/ipv4/conf/tun3/log_martians = 1
Modules
ip_set 30977 1 xt_set
iptable_filter 2793 1
iptable_mangle 3349 1
iptable_nat 6158 0
iptable_raw 2264 0
ip_tables 17831 4
iptable_raw,iptable_nat,iptable_mangle,iptable_filter
ipt_addrtype 2153 5
ipt_ah 1247 0
ipt_CLUSTERIP 6796 0
ipt_ecn 1507 0
ipt_ECN 1955 0
ipt_LOG 5845 9
ipt_MASQUERADE 2466 0
ipt_NETMAP 1832 0
ipt_REDIRECT 1840 0
ipt_REJECT 2351 4
ipt_ULOG 10765 0
nf_conntrack 79758 32
xt_connlimit,ipt_MASQUERADE,ipt_CLUSTERIP,nf_nat_tftp,nf_nat_snmp_basic,nf_conntrack_snmp,nf_nat_pptp,nf_nat_irc,nf_nat_h323,nf_nat_ftp,nf_nat_amanda,nf_conntrack_amanda,nf_conntrack_sane,nf_conntrack_tftp,nf_conntrack_proto_udplite,nf_conntrack_proto_sctp,nf_conntrack_pptp,nf_conntrack_proto_gre,nf_conntrack_netlink,nf_conntrack_netbios_ns,nf_conntrack_broadcast,nf_conntrack_irc,nf_conntrack_h323,nf_conntrack_ftp,xt_helper,xt_conntrack,xt_CONNMARK,xt_connmark,xt_state,iptable_nat,nf_nat,nf_conntrack_ipv4
nf_conntrack_amanda 2979 1 nf_nat_amanda
nf_conntrack_broadcast 1471 2 nf_conntrack_snmp,nf_conntrack_netbios_ns
nf_conntrack_ftp 12913 1 nf_nat_ftp
nf_conntrack_h323 67696 1 nf_nat_h323
nf_conntrack_ipv4 9506 16 iptable_nat,nf_nat
nf_conntrack_irc 5530 1 nf_nat_irc
nf_conntrack_netbios_ns 1323 0
nf_conntrack_netlink 17392 0
nf_conntrack_pptp 12166 1 nf_nat_pptp
nf_conntrack_proto_gre 7003 1 nf_conntrack_pptp
nf_conntrack_proto_sctp 12482 0
nf_conntrack_proto_udplite 3348 0
nf_conntrack_sane 5716 0
nf_conntrack_snmp 1651 1 nf_nat_snmp_basic
nf_conntrack_tftp 4878 1 nf_nat_tftp
nf_defrag_ipv4 1483 2 xt_TPROXY,nf_conntrack_ipv4
nf_defrag_ipv6 11156 1 xt_TPROXY
nf_nat 22759 11
ipt_REDIRECT,ipt_NETMAP,ipt_MASQUERADE,nf_nat_tftp,nf_nat_pptp,nf_nat_proto_gre,nf_nat_irc,nf_nat_h323,nf_nat_ftp,nf_nat_amanda,iptable_nat
nf_nat_amanda 1277 0
nf_nat_ftp 3507 0
nf_nat_h323 8830 0
nf_nat_irc 1883 0
nf_nat_pptp 4653 0
nf_nat_proto_gre 3028 1 nf_nat_pptp
nf_nat_snmp_basic 8553 0
nf_nat_tftp 987 0
nf_tproxy_core 1332 1 xt_TPROXY,[permanent]
xt_AUDIT 3064 0
xt_CLASSIFY 1069 0
xt_comment 1034 9
xt_connlimit 3238 0
xt_connmark 1347 0
xt_CONNMARK 1507 0
xt_conntrack 2776 13
xt_dccp 2215 0
xt_dscp 1831 0
xt_DSCP 2279 0
xt_hashlimit 9685 0
xt_helper 1497 0
xt_iprange 2312 0
xt_length 1322 0
xt_limit 2118 0
xt_mac 1118 0
xt_mark 1057 0
xt_MARK 1057 1
xt_multiport 2700 2
xt_NFLOG 1195 0
xt_NFQUEUE 2213 0
xt_owner 1252 0
xt_physdev 1741 0
xt_pkttype 1194 0
xt_policy 2616 0
xt_realm 1060 0
xt_recent 7932 0
xt_set 4032 0
xt_state 1492 0
xt_statistic 1524 0
xt_tcpmss 1607 0
xt_time 2183 0
xt_TPROXY 9249 0
Shorewall has detected the following iptables/netfilter capabilities:
NAT (NAT_ENABLED): Available
Packet Mangling (MANGLE_ENABLED): Available
Multi-port Match (MULTIPORT): Available
Extended Multi-port Match (XMULIPORT): Available
Connection Tracking Match (CONNTRACK_MATCH): Available
Extended Connection Tracking Match Support (NEW_CONNTRACK_MATCH): Available
Packet Type Match (USEPKTTYPE): Available
Policy Match (POLICY_MATCH): Available
Physdev Match (PHYSDEV_MATCH): Available
Physdev-is-bridged Support (PHYSDEV_BRIDGE): Available
Packet length Match (LENGTH_MATCH): Available
IP range Match(IPRANGE_MATCH): Available
Recent Match (RECENT_MATCH): Available
Owner Match (OWNER_MATCH): Available
Owner Name Match (OWNER_NAME_MATCH): Available
CONNMARK Target (CONNMARK): Available
Extended CONNMARK Target (XCONNMARK): Available
Connmark Match (CONNMARK_MATCH): Available
Extended Connmark Match (XCONNMARK_MATCH): Available
Raw Table (RAW_TABLE): Available
Rawpost Table (RAWPOST_TABLE): Not available
IPP2P Match (IPP2P_MATCH): Not available
CLASSIFY Target (CLASSIFY_TARGET): Available
Extended REJECT (ENHANCED_REJECT): Available
Repeat match (KLUDGEFREE): Available
MARK Target (MARK): Available
Extended MARK Target (XMARK): Available
Extended MARK Target 2 (EXMARK): Available
Mangle FORWARD Chain (MANGLE_FORWARD): Available
Comments (COMMENTS): Available
Address Type Match (ADDRTYPE): Available
TCPMSS Match (TCPMSS_MATCH): Available
Hashlimit Match (HASHLIMIT_MATCH): Available
NFQUEUE Target (NFQUEUE_TARGET): Available
Realm Match (REALM_MATCH): Available
Helper Match (HELPER_MATCH): Available
Connlimit Match (CONNLIMIT_MATCH): Available
Time Match (TIME_MATCH): Available
Goto Support (GOTO_TARGET): Available
LOGMARK Target (LOGMARK_TARGET): Not available
IPMARK Target (IPMARK_TARGET): Not available
LOG Target (LOG_TARGET): Available
ULOG Target (ULOG_TARGET): Available
NFLOG Target (NFLOG_TARGET): Available
Persistent SNAT (PERSISTENT_SNAT): Available
TPROXY Target (TPROXY_TARGET): Available
FLOW Classifier (FLOW_FILTER): Available
fwmark route mask (FWMARK_RT_MASK): Available
Mark in any table (MARK_ANYWHERE): Available
Header Match (HEADER_MATCH): Not available
ACCOUNT Target (ACCOUNT_TARGET): Not available
AUDIT Target (AUDIT_TARGET): Available
ipset V5 (IPSET_V5): Not available
Condition Match (CONDITION_MATCH): Not available
Statistic Match (STATISTIC_MATCH): Available
IMQ Target (IMQ_TARGET): Not available
DSCP Match (DSCP_MATCH): Available
DSCP Target (DSCP_TARGET): Available
Geo IP match: Not available
iptables -S (IPTABLES_S): Available
Basic Filter (BASIC_FILTER): Available
CT Target (CT_TARGET): Not available
Traffic Control
Device eth0:
qdisc mq 0: root
Sent 1346296381 bytes 11623838 pkt (dropped 0, overlimits 0 requeues 7)
rate 0bit 0pps backlog 0b 0p requeues 7
class mq :1 root
Sent 842127610 bytes 5697988 pkt (dropped 0, overlimits 0 requeues 1)
backlog 0b 0p requeues 1
class mq :2 root
Sent 504168771 bytes 5925850 pkt (dropped 0, overlimits 0 requeues 6)
backlog 0b 0p requeues 6
Device tun3:
qdisc pfifo_fast 0: root refcnt 2 bands 3 priomap 1 2 2 2 1 2 0 0 1 1 1 1 1 1
1 1
Sent 38445759 bytes 443154 pkt (dropped 0, overlimits 0 requeues 0)
rate 0bit 0pps backlog 0b 0p requeues 0
TC Filters
Device eth0:
Device tun3:
****************************************************************************
This e-mail has been scanned by comendo.com and does not contain virus.
****************************************************************************
------------------------------------------------------------------------------
"Accelerate Dev Cycles with Automated Cross-Browser Testing - For FREE
Instantly run your Selenium tests across 300+ browser/OS combos.
Get unparalleled scalability from the best Selenium testing platform available
Simple to use. Nothing to install. Get started now for free."
http://p.sf.net/sfu/SauceLabs
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users