Hi!
I'm experiencing strange connection losses between internal clients and two external servers. The connection is allowed through a packet filter rule:
(2 { Sxxxx_Internal_Networks } { QuoteSpeed_Services } { QuoteSpeed_Servers } Log Allow)
and seems to work fine most of the time. But unfortunately the packet filter drops packets from time to time which causes the clients to crash (they´re using RPC protocol i was told...):
2004-Feb 23 11:13:59 (none) kernel: TCP Drop: IN=eth0 OUT=eth1 SRC=172.25.4.28 DST=217.110.115.5 LEN=78 TOS=0x00 PREC=0x00 TTL=126 ID=52529 DF PROTO=TCP SPT=4280 DPT=18247 WINDOW=16856 RES=0x00 ACK PSH URGP=0
2004-Feb 23 11:13:59 (none) kernel: TCP Drop: IN=eth1 OUT=eth0 SRC=217.110.115.5 DST=172.25.4.28 LEN=357 TOS=0x00 PREC=0x00 TTL=121 ID=54230 DF PROTO=TCP SPT=18247 DPT=4280 WINDOW=32050 RES=0x00 ACK PSH URGP=0
2004-Feb 23 11:13:59 (none) kernel: TCP Drop: IN=eth0 OUT=eth1 SRC=172.27.0.210 DST=217.110.115.5 LEN=40 TOS=0x00 PREC=0x00 TTL=124 ID=50668 DF PROTO=TCP SPT=1145 DPT=18247 WINDOW=65173 RES=0x00 ACK URGP=0
2004-Feb 23 11:13:59 (none) kernel: TCP Drop: IN=eth1 OUT=eth0 SRC=217.110.115.5 DST=172.25.1.165 LEN=273 TOS=0x00 PREC=0x00 TTL=121 ID=17112 DF PROTO=TCP SPT=18247 DPT=1235 WINDOW=31456 RES=0x00 ACK PSH URGP=0
(eth0 = internal interface, eth1 = external interface)
Today the connection problems could have been caused by a configuration change through webadmin. First I enabled PSD, which caused a crash of all clients at 9:03 am and at 11:13 am I changed the configuration of PSD to exclude all traffic between the affected servers/clients - which caused the second crash.
Since the packet filter only shows ACK PSH packets I conclude that the firewall forgets about the state of the connections or something like that... Is that possible and how could I prevent that? It seems that these connection problems also occur when nobody is playing with the firewall.
Does anybody have a clue?
Any help would be really appreciated.
Regards,
Alexander
This thread was automatically locked due to age.