Hi,

I'm not 100% sure but don't wanted to leave it uncommented.
It sounds very similar to basic cases with SST. Since I don't want to
write it down I will quote one article from the web.
SOURCE:
http://biztechstore.com/blog/?p=176=26
QUOTE:
VOIP Calls Dropping After 30 Minutes

We have had an ongoing complaint from one of our customers about their
VOIP calls dropping after 30 minutes.  I admit to some scepticism at
first, but after checking their activity logs, I discovered that any
long calls they placed would disconnect after exactly 30 minutes.

I did some research, and found that others with various providers had
reported similar issues.  Most people were accusing the carriers of
dropping the calls intentionally to save money, but nobody offered any
evidence to back this claim up.  I then contacted both the VOIP vendor
and TalkSwitch.  Both were helpful, but neither could figure out the
issue.  The customer agreed to run a trace on the next call they
expected to be long, but they understandably could never seem to start a
trace on a call that turned out to be long.  As such, the issue just
sat.

Last week, a second customer began reporting the same issue.  I spoke to
both service providers again.  While we were all searching for a way to
identify the issue, I had the "fortune" to experience the problem myself
on a conference call.  Since I have a full firewall with extensive
logging capabilities, I was able to compare my log with the VOIP
vendor's log, and we had the answer.

It seems that nexVortex, the VOIP carrier in this case, sends a SIP
re-invite after 30 minutes just to make sure the call is really still
active.  They understandably do not want to tie up resources on a call
that had already ended.  nexVortex was always sending the re-invite on
the port from which it was seeing the initial connection.  After 30
minute, my firewall no longer was associating that port with my initial
connection, and dropped the packet.  As such, the TalkSwitch never saw
the re-invite and thus never responded.  When nexVortex never got a
response, it figured the call was dead and dropped it.  The fix for me
was relatively easy.  On my SonicWall TZ-210, there is a option to
"Enable Consistent NAT", which makes sure the firewall always sends
outbound traffic on consistent port and IP address pairs.  Since I route
inbound traffic for the standard VOIP ports to my TalkSwitch, it should
cease to be an issue.

In your case I would try this:
Asterisk provides support for SIP Session Timers (RFC 4028) through
parameters in sip.conf. It provides a keep-alive mechanism. However,
they quite often don't work properly and cause calls to drop. The
simplest fix is to disable them with "session-timers=refuse".

As always in those cases a tcpdump would be helpful. I doubt shorewall
does anything to or with this traffic in that manner.

Regards,

Martin 

 

 

Von: Victor Galino [mailto:[email protected]] 
Gesendet: Montag, 19. Mai 2014 11:22
An: [email protected]
Betreff: [Shorewall-users] Shorewall Asterisk SIP Callls Stop at 30
minutes

 

 

Hello

 

I Configure shorewall for a Asterisk server.

 

Need to add on /etc/shorewall/start 

 

rmmod nf_nat_sip &> /dev/null
rmmod nf_conntrack_sip &> /dev/null

 

 

And works fine.

 

The only problem i detect its when i have a call stablished, , on the 30
minutes mark, the call is down, and need to do another call

 

Configuration its on a Centos 6.5 Final and kernel 2.6.32-431.17.1,
Shorewall 4.5.4

 

I Send the parts of shorewall dump related to the modules and
nfconntrack, i understand its something generic with tcp connections or
nf_conntraf (netfilter)

 

Thanks in advance

Regards

Victor

 

 

 

/proc

 

   /proc/version = Linux version 2.6.32-431.17.1.el6.x86_64
([email protected]) (gcc version 4.4.7 20120313 (Red
Hat 4.4.7-4) (GCC) ) #1 SMP Wed May 7 23:32:49 UTC 2014
   /proc/sys/net/ipv4/ip_forward = 1
   /proc/sys/net/ipv4/icmp_echo_ignore_all = 0
   /proc/sys/net/ipv4/conf/all/proxy_arp = 0
   /proc/sys/net/ipv4/conf/all/arp_filter = 0
   /proc/sys/net/ipv4/conf/all/arp_ignore = 0
   /proc/sys/net/ipv4/conf/all/rp_filter = 0
   /proc/sys/net/ipv4/conf/all/log_martians = 0
   /proc/sys/net/ipv4/conf/default/proxy_arp = 0
   /proc/sys/net/ipv4/conf/default/arp_filter = 0
   /proc/sys/net/ipv4/conf/default/arp_ignore = 0
   /proc/sys/net/ipv4/conf/default/rp_filter = 0
   /proc/sys/net/ipv4/conf/default/log_martians = 1
   /proc/sys/net/ipv4/conf/eth0/proxy_arp = 0
   /proc/sys/net/ipv4/conf/eth0/arp_filter = 0
   /proc/sys/net/ipv4/conf/eth0/arp_ignore = 0
   /proc/sys/net/ipv4/conf/eth0/rp_filter = 0
   /proc/sys/net/ipv4/conf/eth0/log_martians = 1
   /proc/sys/net/ipv4/conf/lo/proxy_arp = 0
   /proc/sys/net/ipv4/conf/lo/arp_filter = 0
   /proc/sys/net/ipv4/conf/lo/arp_ignore = 0
   /proc/sys/net/ipv4/conf/lo/rp_filter = 0
   /proc/sys/net/ipv4/conf/lo/log_martians = 1
   /proc/sys/net/ipv4/conf/tun3/proxy_arp = 0
   /proc/sys/net/ipv4/conf/tun3/arp_filter = 0
   /proc/sys/net/ipv4/conf/tun3/arp_ignore = 0
   /proc/sys/net/ipv4/conf/tun3/rp_filter = 0
   /proc/sys/net/ipv4/conf/tun3/log_martians = 1

 

 

 

Modules

 

ip_set                 30977  1 xt_set
iptable_filter          2793  1
iptable_mangle          3349  1
iptable_nat             6158  0
iptable_raw             2264  0
ip_tables              17831  4
iptable_raw,iptable_nat,iptable_mangle,iptable_filter
ipt_addrtype            2153  5
ipt_ah                  1247  0
ipt_CLUSTERIP           6796  0
ipt_ecn                 1507  0
ipt_ECN                 1955  0
ipt_LOG                 5845  9
ipt_MASQUERADE          2466  0
ipt_NETMAP              1832  0
ipt_REDIRECT            1840  0
ipt_REJECT              2351  4
ipt_ULOG               10765  0
nf_conntrack           79758  32
xt_connlimit,ipt_MASQUERADE,ipt_CLUSTERIP,nf_nat_tftp,nf_nat_snmp_basic,
nf_conntrack_snmp,nf_nat_pptp,nf_nat_irc,nf_nat_h323,nf_nat_ftp,nf_nat_a
manda,nf_conntrack_amanda,nf_conntrack_sane,nf_conntrack_tftp,nf_conntra
ck_proto_udplite,nf_conntrack_proto_sctp,nf_conntrack_pptp,nf_conntrack_
proto_gre,nf_conntrack_netlink,nf_conntrack_netbios_ns,nf_conntrack_broa
dcast,nf_conntrack_irc,nf_conntrack_h323,nf_conntrack_ftp,xt_helper,xt_c
onntrack,xt_CONNMARK,xt_connmark,xt_state,iptable_nat,nf_nat,nf_conntrac
k_ipv4
nf_conntrack_amanda     2979  1 nf_nat_amanda
nf_conntrack_broadcast     1471  2
nf_conntrack_snmp,nf_conntrack_netbios_ns
nf_conntrack_ftp       12913  1 nf_nat_ftp
nf_conntrack_h323      67696  1 nf_nat_h323
nf_conntrack_ipv4       9506  16 iptable_nat,nf_nat
nf_conntrack_irc        5530  1 nf_nat_irc
nf_conntrack_netbios_ns     1323  0
nf_conntrack_netlink    17392  0
nf_conntrack_pptp      12166  1 nf_nat_pptp
nf_conntrack_proto_gre     7003  1 nf_conntrack_pptp
nf_conntrack_proto_sctp    12482  0
nf_conntrack_proto_udplite     3348  0
nf_conntrack_sane       5716  0
nf_conntrack_snmp       1651  1 nf_nat_snmp_basic
nf_conntrack_tftp       4878  1 nf_nat_tftp
nf_defrag_ipv4          1483  2 xt_TPROXY,nf_conntrack_ipv4
nf_defrag_ipv6         11156  1 xt_TPROXY
nf_nat                 22759  11
ipt_REDIRECT,ipt_NETMAP,ipt_MASQUERADE,nf_nat_tftp,nf_nat_pptp,nf_nat_pr
oto_gre,nf_nat_irc,nf_nat_h323,nf_nat_ftp,nf_nat_amanda,iptable_nat
nf_nat_amanda           1277  0
nf_nat_ftp              3507  0
nf_nat_h323             8830  0
nf_nat_irc              1883  0
nf_nat_pptp             4653  0
nf_nat_proto_gre        3028  1 nf_nat_pptp
nf_nat_snmp_basic       8553  0
nf_nat_tftp              987  0

nf_tproxy_core          1332  1 xt_TPROXY,[permanent]
xt_AUDIT                3064  0
xt_CLASSIFY             1069  0
xt_comment              1034  9
xt_connlimit            3238  0
xt_connmark             1347  0
xt_CONNMARK             1507  0
xt_conntrack            2776  13
xt_dccp                 2215  0
xt_dscp                 1831  0
xt_DSCP                 2279  0
xt_hashlimit            9685  0
xt_helper               1497  0
xt_iprange              2312  0
xt_length               1322  0
xt_limit                2118  0
xt_mac                  1118  0
xt_mark                 1057  0
xt_MARK                 1057  1
xt_multiport            2700  2
xt_NFLOG                1195  0
xt_NFQUEUE              2213  0
xt_owner                1252  0
xt_physdev              1741  0
xt_pkttype              1194  0
xt_policy               2616  0
xt_realm                1060  0
xt_recent               7932  0
xt_set                  4032  0
xt_state                1492  0
xt_statistic            1524  0
xt_tcpmss               1607  0
xt_time                 2183  0
xt_TPROXY               9249  0

 

 

 

Shorewall has detected the following iptables/netfilter capabilities:
   NAT (NAT_ENABLED): Available
   Packet Mangling (MANGLE_ENABLED): Available
   Multi-port Match (MULTIPORT): Available
   Extended Multi-port Match (XMULIPORT): Available
   Connection Tracking Match (CONNTRACK_MATCH): Available
   Extended Connection Tracking Match Support (NEW_CONNTRACK_MATCH):
Available
   Packet Type Match (USEPKTTYPE): Available
   Policy Match (POLICY_MATCH): Available
   Physdev Match (PHYSDEV_MATCH): Available
   Physdev-is-bridged Support (PHYSDEV_BRIDGE): Available
   Packet length Match (LENGTH_MATCH): Available
   IP range Match(IPRANGE_MATCH): Available
   Recent Match (RECENT_MATCH): Available
   Owner Match (OWNER_MATCH): Available
   Owner Name Match (OWNER_NAME_MATCH): Available
   CONNMARK Target (CONNMARK): Available
   Extended CONNMARK Target (XCONNMARK): Available
   Connmark Match (CONNMARK_MATCH): Available
   Extended Connmark Match (XCONNMARK_MATCH): Available
   Raw Table (RAW_TABLE): Available
   Rawpost Table (RAWPOST_TABLE): Not available
   IPP2P Match (IPP2P_MATCH): Not available
   CLASSIFY Target (CLASSIFY_TARGET): Available
   Extended REJECT (ENHANCED_REJECT): Available
   Repeat match (KLUDGEFREE): Available
   MARK Target (MARK): Available
   Extended MARK Target (XMARK): Available
   Extended MARK Target 2 (EXMARK): Available
   Mangle FORWARD Chain (MANGLE_FORWARD): Available
   Comments (COMMENTS): Available
   Address Type Match (ADDRTYPE): Available
   TCPMSS Match (TCPMSS_MATCH): Available
   Hashlimit Match (HASHLIMIT_MATCH): Available
   NFQUEUE Target (NFQUEUE_TARGET): Available
   Realm Match (REALM_MATCH): Available
   Helper Match (HELPER_MATCH): Available
   Connlimit Match (CONNLIMIT_MATCH): Available
   Time Match (TIME_MATCH): Available
   Goto Support (GOTO_TARGET): Available
   LOGMARK Target (LOGMARK_TARGET): Not available
   IPMARK Target (IPMARK_TARGET): Not available
   LOG Target (LOG_TARGET): Available
   ULOG Target (ULOG_TARGET): Available
   NFLOG Target (NFLOG_TARGET): Available
   Persistent SNAT (PERSISTENT_SNAT): Available
   TPROXY Target (TPROXY_TARGET): Available
   FLOW Classifier (FLOW_FILTER): Available
   fwmark route mask (FWMARK_RT_MASK): Available
   Mark in any table (MARK_ANYWHERE): Available
   Header Match (HEADER_MATCH): Not available
   ACCOUNT Target (ACCOUNT_TARGET): Not available
   AUDIT Target (AUDIT_TARGET): Available
   ipset V5 (IPSET_V5): Not available
   Condition Match (CONDITION_MATCH): Not available
   Statistic Match (STATISTIC_MATCH): Available
   IMQ Target (IMQ_TARGET): Not available
   DSCP Match (DSCP_MATCH): Available
   DSCP Target (DSCP_TARGET): Available
   Geo IP match: Not available
   iptables -S (IPTABLES_S): Available

   Basic Filter (BASIC_FILTER): Available
   CT Target (CT_TARGET): Not available

 

 

 

Traffic Control

 

Device eth0:
qdisc mq 0: root
 Sent 1346296381 bytes 11623838 pkt (dropped 0, overlimits 0 requeues 7)
 rate 0bit 0pps backlog 0b 0p requeues 7

 

class mq :1 root
 Sent 842127610 bytes 5697988 pkt (dropped 0, overlimits 0 requeues 1)
 backlog 0b 0p requeues 1
class mq :2 root
 Sent 504168771 bytes 5925850 pkt (dropped 0, overlimits 0 requeues 6)
 backlog 0b 0p requeues 6

 

Device tun3:
qdisc pfifo_fast 0: root refcnt 2 bands 3 priomap  1 2 2 2 1 2 0 0 1 1 1
1 1 1 1 1
 Sent 38445759 bytes 443154 pkt (dropped 0, overlimits 0 requeues 0)
 rate 0bit 0pps backlog 0b 0p requeues 0

 

 


TC Filters

 

Device eth0:

 

Device tun3:

 

 

 

 

 

 

 

________________________________

This e-mail has been scanned by comendo.com <http://www.comendo.com>
and does not contain virus.

________________________________

------------------------------------------------------------------------------
"Accelerate Dev Cycles with Automated Cross-Browser Testing - For FREE
Instantly run your Selenium tests across 300+ browser/OS combos.
Get unparalleled scalability from the best Selenium testing platform available
Simple to use. Nothing to install. Get started now for free."
http://p.sf.net/sfu/SauceLabs
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to