[prev in list] [next in list] [prev in thread] [next in thread]
List: ipfilter
Subject: NAT table trouble
From: Scott Augustus <scott () visgen ! com>
Date: 2001-11-30 15:13:55
[Download RAW message or body]
Greetings all,
I'm currently having a lot of difficulty with NAT tables filling up and
causing serious slow downs. Clearing/flushing the tables tends to help
though sometimes for only very short periods of time (we're talking a
matter of minutes!) before they need cleared again. Obviously this is
not ideal as it drops connections for users. I do have a number of
VPN's using isakmpd that connect us to multiple offices. Wondering if
anyone might have some insight as to a potential cause or some nifty
means to help me determine a cause (tcpdump etc.)? Or, is it possible
that a bum rule in ipf could cause this?
I don't have a whole heck of a lot happenning with my ipnat rules, just
one subnet and a few port mappings.
Thx!
Scott
Here's some vitals in case they're needed:
OpenBSD 2.6 (I know, I *should* upgrade ;-)
IP Filter: v3.3.16
# The rules
pass out quick on lo0
pass in quick on lo0
block in quick proto tcp all with short
block in quick on fxp1 all with opt lsrr
block in quick on fxp1 all with opt ssrr
block in log quick on fxp1 proto icmp from any to any icmp-type redir
block in log quick on fxp1 proto tcp/udp all with short
block in log quick on fxp1 from any to any with ipopts
block return-rst in log quick on fxp1 proto tcp from any to any port =
auth flags S/SA
block in quick on fxp1 proto tcp from any to any flags FUP
block in quick on fxp1 proto tcp all flags SF/SFRA
block in quick on fxp1 proto tcp all flags /SFRA
block in quick on fxp1 proto tcp all flags F/SFRA
block in quick on fxp1 proto tcp all flags U/SFRAU
block in quick on fxp1 proto tcp all flags P
block in log quick on fxp0 proto tcp all flags /
block in log quick on fxp1 from 10.0.0.0/8 to any
block in log quick on fxp1 from 172.16.0.0/12 to any
block in log quick on fxp1 from 192.168.0.0/16 to any
block in log quick on fxp1 from 127.0.0.0/8 to any
block in log quick on fxp1 from 0.0.0.0/32 to any
block in log quick on fxp1 from 255.255.255.255/32 to any
block out quick on fxp1 from any to 10.0.0.0/8
block out quick on fxp1 from any to 172.16.0.0/12
block out quick on fxp1 from any to 192.168.0.0/16
block out quick on fxp1 from any to 127.0.0.1/8
# Block all incoming outgoing netbios traffic. Don't log this as it is
# so common.
#
block in quick on fxp1 proto udp from any to any port = netbios-ns
block out quick on fxp1 proto udp from any to any port = netbios-ns
# psssing in ISAKMP traffic from the VPN-security gateways
pass in quick on fxp1 proto udp from any to any port = 500
# Passing in encrypted traffic from VPN-security gateways
pass in quick on fxp1 proto esp from any to any
block return-rst in log quick on fxp1 proto tcp from any to any flags S/SA
block in log quick on fxp1 from any to any
pass out quick on fxp1 proto tcp from any to any flags S keep state
pass out quick on fxp1 proto udp from any to any keep state
pass out quick on fxp1 proto icmp from any to any keep state
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic