No buffer space available / Failed to send 300 byte long packet



  • Коллеги, приветствую!

    Столкнулся со следующей проблемой с момента апгрейда до 2.0.2 релиза:

    Feb 14 01:03:00	dhcpd: dhcp.c:1323: Failed to send 300 byte long packet over fallback interface.
    Feb 14 01:03:00	dhcpd: send_packet: No buffer space available
    Feb 14 01:02:25	dhcpd: dhcp.c:3263: Failed to send 300 byte long packet over em0 interface.
    Feb 14 01:02:25	dhcpd: send_packet: No buffer space available
    Feb 14 01:02:21	dhcpd: dhcp.c:3263: Failed to send 300 byte long packet over em0 interface.
    Feb 14 01:02:21	dhcpd: send_packet: No buffer space available
    Feb 14 01:02:13	dhcpd: dhcp.c:1323: Failed to send 300 byte long packet over fallback interface.
    Feb 14 01:02:13	dhcpd: send_packet: No buffer space available
    

    Учащается с переполнением канала, но имеет место быть и при минимальной нагрузке.

    В купе с известной проблемой (падающем при удивительн абстоятельствах клиентом dhcp, https://redmine.pfsense.org/issues/2792) было предпринять много действий по диагностике проблемы, в том числе:

    • замена всего железа

    • пересборка всех правил, переустановка всего

    однако ничего не увенчалось успехом.

    Удалось выяснить, что

    • при 100% нагрузке и планировщиком priq ситуация хуже всего. Ошибки возникают постоянно

    • При отключении шейпера ошибок нет вообще

    • Если не указывать полосу пропускания в планировщиках priq и CBQ ошибок нет (с hfsc не пробовал)

    • Dymminet на ситуацию Не влияет

    Если кто-то скажет проблема с шейпингом dhcp трафика, вот правила:
    em0=LAN
    em1=WAN

    $ pfctl -sa | grep DHCP
    pass in quick on em0 inet proto udp from any port = bootpc to 255.255.255.255 port = bootps keep state label "allow access to DHCP server"
    pass in quick on em0 inet proto udp from any port = bootpc to $LAN-int port = bootps keep state label "allow access to DHCP server"
    pass out quick on em0 inet proto udp from port = bootps to any $LAN-int  port = bootpc keep state label "allow access to DHCP server"
    match on em0 proto udp from any port = bootpc to any port = bootps label "USER_RULE: m_Other DHCP LAN" queue qOthersHigh
    match on em1 inet proto udp from $WAN-int port = bootpc to any port = bootps label "USER_RULE: m_Other DHCP WAN" queue qOthersHigh
    pass in quick on em0 proto udp from any port = bootpc to any port = bootps keep state label "USER_RULE: DHCP requests"
    
    

    Т.е весь dhcp в высоко приоритетной очереди без drop'ов.

    Люди добрые, помогите кто может советом хорошим!



  • Может описанное тут поможет - http://forum.pfsense.org/index.php/topic,41947.0.html



  • @werter:

    Может описанное тут поможет - http://forum.pfsense.org/index.php/topic,41947.0.html

    Это же мой пост!)
    Нет, решения там нет



  • Вернитесь на 2.0.1. У меня с 2.0.2 тоже проблемы :(



  • UP!
    Пожалуйста, какие-нибудь советы!
    Замечено, что по какой-то причине клиенты очень часто переполучают адрес по DHCP. Причем эти сообщения в логе вылезают параллельно с некоторыми из этих запросов. Соответственно, клиенты теряют адреса и доступ в сеть до нового получения адреса.

    Mar 6 00:28:08	dhcpd: DHCPACK on 172.22.0.44 to 74:de:2b:f4:bc:6e via em0
    Mar 6 00:28:08	dhcpd: DHCPREQUEST for 172.22.0.44 from 74:de:2b:f4:bc:6e via em0
    Mar 6 00:28:08	dhcpd: DHCPACK on 172.22.0.44 to 74:de:2b:f4:bc:6e via em0
    Mar 6 00:28:08	dhcpd: DHCPREQUEST for 172.22.0.44 from 74:de:2b:f4:bc:6e via em0
    Mar 6 00:28:06	dhcpd: DHCPACK on 172.22.1.70 to e8:03:9a:c4:3f:e8 via em0
    Mar 6 00:28:06	dhcpd: DHCPREQUEST for 172.22.1.70 from e8:03:9a:c4:3f:e8 via em0
    Mar 6 00:27:59	dhcpd: DHCPACK on 172.22.0.44 to 74:de:2b:f4:bc:6e via em0
    Mar 6 00:27:59	dhcpd: DHCPREQUEST for 172.22.0.44 from 74:de:2b:f4:bc:6e via em0
    

    WAN-канал полон, но DHCP функционирует внутри сети. Что может быть не так?
    Лиза стандартная, 7200

    Не известно, что первично а что просто следствие



  • за час около 2000 записей в логе DHCP от 150 клиентов с лизой в 3 часа. Что-то сильно не нормально…



  • @goliy:

    за час около 2000 записей в логе DHCP от 150 клиентов с лизой в 3 часа. Что-то сильно не нормально…

    У меня такая же фигня, но я знаю откуда. У меня в DHCP включен Enable Static ARP entries и в сети есть несколько абонентов "не прописанных". Так вот когда они включаются - начинается эта шняга.



  • @Buch:

    @goliy:

    за час около 2000 записей в логе DHCP от 150 клиентов с лизой в 3 часа. Что-то сильно не нормально…

    У меня такая же фигня, но я знаю откуда. У меня в DHCP включен Enable Static ARP entries и в сети есть несколько абонентов "не прописанных". Так вот когда они включаются - начинается эта шняга.

    Это-то понятно. Не, у меня зарезервированные клиенты, да и Static ARP отключен.



  • Похоже у меня не Ваш случай, в логах:

    Mar 6 15:01:36 dhcpd: dhcp.c:3230: Failed to send 300 byte long packet over fallback interface.

    Как только отключаю "Enable Static ARP entries" лог стихает.



  • Коллеги,

    Есть еще варианты? Любые предположения?



  • У меня такая ситуация началась, когда я поднял мост на фряхе.
    Хотел разбить сеть по вланам.
    Создал мост из вланов, на мост прописал ИП из единственного влана, который был до этого и через минут 10-20 бабах! No buffer space available
    Пришлось откатиться до старой топологии с одним вланом.
    До сих пор понять не могу, что ему не хватает
    Гадил как дхцп так и днс.
    Я грешу на переполнение арп…
    FreeBSD 8.2-RELEASE-p6



  • Т. е. с выключенным шейпером все нормально работает? Увеличение времени аренды не спасло?

    Каковы значения:

    sysctl

    top

    netstat -m

    dmesg

    Гипотеза такая: раз жалуется на буфер, каким-то образом шейпер этот буфер забивает (шейпер вообще особенный в пфсенсе).
    Значит буфер надо расширять. Играться с параметрами ядра.



  • Посмотрите netstat -m в момент когда у Вас выходит No buffer space available



  • Смотрите mbufs in use (current/cache/total)
                  mbuf clusters in use (current/cache/total/max)



  • Выкладываю все:

    Если вкратце - то с mbuf'aми там все ок, до переполнения еще оч. далеко.



  • Может у Вас что-то похожее на это http://forum.lissyara.su/viewtopic.php?f=53&t=38937. Попробуйте (если возможно) постепенно подключать клиентов и смотреть поведение pf



  • Сложно сказать насчет вирусной активности…
    Попробую поставить IPguard, вписать туда всех пользователей.
    Вчера поставил arpwatch - понаблюдать за активностью. Так за 6-9 часов у меня лог он него переполнил весь диск (700мб).. При рабочем static ARP.

    Собственно, главная странность - постоянные переполучения ИП-адресов, как будто лиза 1-5 минут - так и остается необъясненной.
    Еще я заметил, наблюдая 30 сек за ARP-запросами (tcpdump -i em0 arp), что их тоже что-то через чур много:

    ^C
    469 packets captured
    285100 packets received by filter
    0 packets dropped by kernel
    

    Это вообще нормально про 150-200 пользователей?



  • Возможно в сети есть еще DHCP сервер, о котором не знаете?



  • @impulse:

    Возможно в сети есть еще DHCP сервер, о котором не знаете?

    Я сомневаюсь в этом, но если (вдруг) это и так, то как это может сказываться на моем? Клиент должен использовать "знакомый" сервер, или "ближайший", если получает адрес впервые.
    И первая и вторая ситуация не дает нам нестабильную работу с ошибками и переполученим лизы несколько раз в минуты (в особо тяжелых случаях)



  • Коллеги,

    Все же есть вероятность мисс-конфигурирования правил шейпера. Подскажите, может я что забыл?
    Такое ощущение, что при переполнении канала что-то очень важное на ЛАНе дропается (попадая в очередь низкоприоритетную, как неопределенный трафик). Что я мог забыть?
    Подскажите, пожалуйста!

    [2.0.2-RELEASE][root@admiral.joylink.org]/root(5): pfctl -sr
    scrub on em1 all fragment reassemble
    scrub on em0 all fragment reassemble
    anchor "relayd/*" all
    block drop in log all label "Default deny rule"
    block drop out log all label "Default deny rule"
    block drop in quick inet6 all
    block drop out quick inet6 all
    block drop quick proto tcp from any port = 0 to any
    block drop quick proto tcp from any to any port = 0
    block drop quick proto udp from any port = 0 to any
    block drop quick proto udp from any to any port = 0
    block drop quick from <snort2c>to any label "Block snort2c hosts"
    block drop quick from any to <snort2c>label "Block snort2c hosts"
    block drop in log quick proto carp from (self) to any
    pass quick proto carp all keep state
    pass quick proto pfsync all keep state
    block drop in log quick proto tcp from <sshlockout>to any port = ssh label "sshlockout"
    block drop in log quick proto tcp from <webconfiguratorlockout>to any port = 22222 label "webConfiguratorlockout"
    block drop in quick from <virusprot>to any label "virusprot overload table"
    block drop in log quick on em1 from <bogons>to any label "block bogon networks from WAN"
    block drop in on ! em1 inet from 77.37.200.0/23 to any
    block drop in inet from $WAN-inf to any
    block drop in on em1 inet6 from fe80::2e0:81ff:febb:bc3d to any
    block drop in log quick on em1 inet from 10.0.0.0/8 to any label "block private networks from wan block 10/8"
    block drop in log quick on em1 inet from 127.0.0.0/8 to any label "block private networks from wan block 127/8"
    block drop in log quick on em1 inet from 172.16.0.0/12 to any label "block private networks from wan block 172.16/12"
    block drop in log quick on em1 inet from 192.168.0.0/16 to any label "block private networks from wan block 192.168/16"
    pass in on em1 proto udp from any port = bootps to any port = bootpc keep state label "allow dhcp client out WAN"
    pass out on em1 proto udp from any port = bootpc to any port = bootps keep state label "allow dhcp client out WAN"
    block drop in on ! em0 inet from 172.22.0.0/23 to any
    block drop in on ! em0 inet from 172.21.0.0/26 to any
    block drop in inet from 172.22.0.1 to any
    block drop in inet from 172.21.0.1 to any
    block drop in on em0 inet6 from fe80::2e0:81ff:febb:bc3c to any
    pass in quick on em0 inet proto udp from any port = bootpc to 255.255.255.255 port = bootps keep state label "allow access to DHCP server"
    pass in quick on em0 inet proto udp from any port = bootpc to 172.22.0.1 port = bootps keep state label "allow access to DHCP server"
    pass out quick on em0 inet proto udp from 172.22.0.1 port = bootps to any port = bootpc keep state label "allow access to DHCP server"
    pass in on lo0 all flags S/SA keep state label "pass loopback"
    pass out on lo0 all flags S/SA keep state label "pass loopback"
    pass out all flags S/SA keep state allow-opts label "let out anything from firewall host itself"
    pass out route-to (em1 $GW) inet from $WAN-inf to ! 77.37.200.0/23 flags S/SA keep state allow-opts label "let out anything from firewall host itself"
    pass in quick on em0 proto tcp from any to (em0) port = 22222 flags S/SA keep state label "anti-lockout rule"
    pass in quick on em0 proto tcp from any to (em0) port = http flags S/SA keep state label "anti-lockout rule"
    pass in quick on em0 proto tcp from any to (em0) port = ssh flags S/SA keep state label "anti-lockout rule"
    pass in inet all flags S/SA keep state label "NAT REFLECT: Allow traffic to localhost" tagged PFREFLECT
    anchor "userrules/*" all
    match on em1 proto tcp from any to any port <= 1023 label "USER_RULE: known ports" queue(qDefault, qACK)
    match on em1 proto udp from any to any port <= 1023 label "USER_RULE: known ports" queue qDefault
    match on em0 inet proto udp from 172.22.0.144 to any port 4999 >< 5501 label "USER_RULE: m_Game League of Legends outbound" queue qGames
    match on em1 proto tcp from any to any port 8392 >< 8401 label "USER_RULE: m_Game League of Legends outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 2099 label "USER_RULE: m_Game League of Legends PVP.Net outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port 5221 >< 5224 label "USER_RULE: m_Game League of Legends PVP.Net outbound" queue(qGames, qACK)
    match on em1 proto udp from any to any port = vlsi-lm label "USER_RULE: m_Game CoD_MW outbound" queue qGames
    match on em1 proto udp from any to any port = 3005 label "USER_RULE: m_Game CoD_MW outbound" queue qGames
    match on em1 proto udp from any to any port = 3101 label "USER_RULE: m_Game CoD_MW outbound" queue qGames
    match on em1 proto udp from any to any port = 28960 label "USER_RULE: m_Game CoD_MW outbound" queue qGames
    match on em1 proto tcp from any to any port 6111 >< 6120 label "USER_RULE: m_Game Battle.NET outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 6881 label "USER_RULE: m_Game Battle.NET outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 4000 label "USER_RULE: m_Game Battle.NET outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 1120 label "USER_RULE: m_Game Battle.NET outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port 39999 >< 40003 label "USER_RULE: m_Game Battle.NET-2 outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 1119 label "USER_RULE: m_Game Battle.NET-2 outbound" queue(qGames, qACK)
    match on em1 proto udp from any to any port 28019 >< 28046 label "USER_RULE: m_Game Dota2 viewing outbound" queue(qGames, qACK)
    match on em1 proto udp from any to any port 28119 >< 28146 label "USER_RULE: m_Game Dota2 viewing outbound" queue(qGames, qACK)
    match on em1 proto udp from any to any port 26999 >< 27100 label "USER_RULE: m_Game Dota2 outbound" queue(qGames, qACK)
    match on em1 proto udp from any to any port = 3478 label "USER_RULE: m_Game Dota2 outbound" queue(qGames, qACK)
    match on em1 proto udp from any to any port 4378 >< 4381 label "USER_RULE: m_Game Dota2 outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = jetdirect label "USER_RULE: m_Game Dota? outbound" queue(qGames, qACK)
    match on em1 proto udp from any to any port = 9100 label "USER_RULE: m_Game Dota? outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 7456 label "USER_RULE: m_Game Dota? outbound" queue(qGames, qACK)
    match on em1 proto udp from any to any port = 7456 label "USER_RULE: m_Game Dota? outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 8687 label "USER_RULE: m_Game Dota? outbound" queue(qGames, qACK)
    match on em1 proto udp from any to any port = 8687 label "USER_RULE: m_Game Dota? outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 3724 label "USER_RULE: m_Game WoW outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 8688 label "USER_RULE: m_Game Garena outbound" queue(qGames, qACK)
    match on em1 proto udp from any to any port = 8688 label "USER_RULE: m_Game Garena outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 6008 label "USER_RULE: m_Game Garena outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 7456 label "USER_RULE: m_Game Garena outbound" queue(qGames, qACK)
    match on em1 proto udp from any to any port = 7456 label "USER_RULE: m_Game Garena outbound" queue(qGames, qACK)
    match proto tcp from any to any port = 4000 label "USER_RULE: m_Game Garena outbound" queue(qGames, qACK)
    match proto udp from any to any port = 4000 label "USER_RULE: m_Game Garena outbound" queue(qGames, qACK)
    match proto tcp from any to any port = 6200 label "USER_RULE: m_Game Garena outbound" queue(qGames, qACK)
    match proto udp from any to any port = 6200 label "USER_RULE: m_Game Garena outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 7456 label "USER_RULE: m_Game Garena outbound" queue(qGames, qACK)
    match on em1 proto udp from any to any port 1512 >< 1515 label "USER_RULE: m_Game Garena outbound" queue qGames
    match on em1 proto udp from any to any port = 4380 label "USER_RULE: m_Game CS16 outbound" queue qGames
    match on em1 inet proto tcp from any to 80.77.175.114 label "USER_RULE: m_Game CS16 outbound" queue(qGames, qACK)
    match on em1 inet proto udp from any to 80.77.175.114 label "USER_RULE: m_Game CS16 outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port 27013 >< 27051 label "USER_RULE: m_Game CS16 outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 3912 label "USER_RULE: m_Game SopCast outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 26002 label "USER_RULE: m_Game pokerstar outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = ssh label "USER_RULE: m_Game pokerstar outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 6760 label "USER_RULE: m_Game Titan poker outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 5655 label "USER_RULE: m_Game Titan poker outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 4614 label "USER_RULE: m_Game Titan poker outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 6780 label "USER_RULE: m_Game Titan poker outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 4664 label "USER_RULE: m_Game Titan poker outbound" queue(qGames, qACK)
    match proto tcp from any to any port = 6800 label "USER_RULE: m_Game Titan poker outbound" queue(qGames, qACK)
    match proto tcp from any to any port = 6820 label "USER_RULE: m_Game Titan poker outbound" queue(qGames, qACK)
    match proto tcp from any to any port = 6480 label "USER_RULE: m_Game Titan poker outbound" queue(qGames, qACK)
    match proto tcp from any to any port = 6500 label "USER_RULE: m_Game Titan poker outbound" queue(qGames, qACK)
    match proto tcp from any to any port = 6520 label "USER_RULE: m_Game Titan poker outbound" queue(qGames, qACK)
    match proto tcp from any to any port = 6540 label "USER_RULE: m_Game Titan poker outbound" queue(qGames, qACK)
    match proto tcp from any to any port = 6560 label "USER_RULE: m_Game Titan poker outbound" queue(qGames, qACK)
    match proto tcp from any to any port = 6700 label "USER_RULE: m_Game Titan poker outbound" queue(qGames, qACK)
    match proto tcp from any to any port = 6720 label "USER_RULE: m_Game Titan poker outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 6443 label "USER_RULE: m_Game Titan poker outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 7160 label "USER_RULE: m_Game Titan poker outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 6720 label "USER_RULE: m_Game Titan poker outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 6460 label "USER_RULE: m_Game Titan poker outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 6464 label "USER_RULE: m_Game Titan poker outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 6484 label "USER_RULE: m_Game Titan poker outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 5030 label "USER_RULE: m_Game Titan poker outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 6724 label "USER_RULE: m_Game Titan poker outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 6764 label "USER_RULE: m_Game Titan poker outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 6784 label "USER_RULE: m_Game Titan poker outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 6804 label "USER_RULE: m_Game Titan poker outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 6824 label "USER_RULE: m_Game Titan poker outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 6484 label "USER_RULE: m_Game Titan poker outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 6504 label "USER_RULE: m_Game Titan poker outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 6564 label "USER_RULE: m_Game Titan poker outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 6524 label "USER_RULE: m_Game Titan poker outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 6544 label "USER_RULE: m_Game Titan poker outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 6704 label "USER_RULE: m_Game Titan poker outbound" queue(qGames, qACK)
    match on em1 proto udp from any to any port 32799 >< 32901 label "USER_RULE: m_Game WorldOfTanks outbound" queue qGames
    match on em1 proto udp from any to any port 20009 >< 20021 label "USER_RULE: m_Game WorldOfTanks outbound" queue qGames
    match on em1 proto tcp from any to any port = 32803 label "USER_RULE: m_Game WorldOfTanks outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 32801 label "USER_RULE: m_Game WorldOfTanks outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = jabber-client label "USER_RULE: m_Other IRC/TankiOnline outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 5223 label "USER_RULE: m_Other IRC/TankiOnline outbound" queue(qGames, qACK)
    match proto tcp from any to any port = 25565 label "USER_RULE: m_Other minecraft outbound" queue(qGames, qACK)
    match proto udp from any to any port = 25565 label "USER_RULE: m_Other minecraft outbound" queue qGames
    match on em1 proto tcp from any to any port = 14534 label "USER_RULE: m_Other teamspeak1 outbound" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 51234 label "USER_RULE: m_Other teamspeak2 outbound" queue(qGames, qACK)
    match on em1 proto udp from any to any port 8766 >< 8769 label "USER_RULE: m_Other teamspeak3 outbound" queue qGames
    match on em1 proto tcp from any to any port = aol label "USER_RULE: m_Other ICQ1/TankiOnline outbound" queue(qGames, qACK)
    match on em1 inet proto tcp from any to 195.211.128.0/24 port 10007 >< 10010 label "USER_RULE: m_Other SomeGame" queue(qGames, qACK)
    match on em1 inet proto udp from any to 195.211.128.0/24 port 11999 >< 12100 label "USER_RULE: m_Other SomeGame" queue(qGames, qACK)
    match on em1 inet proto udp from any to 195.211.128.0/24 port 12999 >< 13100 label "USER_RULE: m_Other SomeGame" queue(qGames, qACK)
    match on em1 proto tcp from any to any port = 1935 label "USER_RULE: m_Other flash_media outbound" queue(qDefault, qACK)
    match on em1 proto tcp from any to any port = 2379 label "USER_RULE: m_Other Go-game outbound" queue(qDefault, qACK)
    match on em1 proto tcp from any to any port = 5938 label "USER_RULE: m_Other TeamViewer outbound" queue(qDefault, qACK)
    match on em1 proto udp from any to any port = 5938 label "USER_RULE: m_Other TeamViewer outbound" queue qDefault
    match on em0 proto udp from any port = syslog to any port = syslog label "USER_RULE: m_Other syslogd outbound" queue qDefault
    match on em1 proto tcp from any to any port 19 >< 22 label "USER_RULE: m_Othe ftp outbound" queue qDefault
    match on em1 proto tcp from any to any port = http label "USER_RULE: m_Other HTTP outbound" queue(qDefault, qACK)
    match on em1 proto tcp from any to any port = 8080 label "USER_RULE: m_Other HTTP outbound" queue(qDefault, qACK)
    match on em1 proto tcp from any to any port = https label "USER_RULE: m_Other HTTPS outbound" queue(qDefault, qACK)
    match in on em0 proto tcp from <freemen>to any port = http label "USER_RULE: freemen's m_Other HTTP outbound" queue(qOthersLow, qACK)
    match quick on em1 inet proto tcp from any to 172.22.1.199 label "USER_RULE: Camera outbound" queue(qCam, qACK)
    match quick on em0 inet proto tcp from 172.22.1.199 to any label "USER_RULE: Camera inbound" queue(qCam, qACK)
    match on em0 proto udp from any to any port 66 >< 69 label "USER_RULE: m_Other DHCP LAN" queue qOthersHigh
    match on em0 proto udp from any port 66 >< 69 to any label "USER_RULE: m_Other DHCP LAN" queue qOthersHigh
    match on em1 inet proto udp from $WAN-inf port = bootpc to any port = bootps label "USER_RULE: m_Other DHCP WAN" queue qOthersHigh
    match on em0 proto tcp from any to any port = domain label "USER_RULE: m_Other DNS LAN" queue(qOthersHigh, qACK)
    match on em0 proto udp from any to any port = domain label "USER_RULE: m_Other DNS LAN" queue(qOthersHigh, qACK)
    match on em1 proto tcp from any to any port = domain label "USER_RULE: m_Other DNS1 outbound" queue(qOthersHigh, qACK)
    match on em1 proto udp from any to any port = domain label "USER_RULE: m_Other DNS2 outbound" queue qOthersHigh
    match quick on em0 inet proto icmp all label "USER_RULE: m_Other ICMP outbound LAN" queue qOthersHigh
    match quick on em1 inet proto icmp all label "USER_RULE: m_Other ICMP outbound WAN" queue qOthersHigh
    match quick on em0 inet proto tcp from any to 172.22.0.1 port = 22222 label "USER_RULE: LAN web access" queue(qOthersHigh, qACK)
    match quick on em1 inet proto tcp from any to $WAN-inf port = 22222 label "USER_RULE: WAN web access" queue(qOthersHigh, qACK)
    match on em1 inet proto tcp from any to $WAN-inf port = ssh label "USER_RULE: WAN ssh access" queue(qOthersHigh, qACK)
    match on em1 inet proto tcp from 62.231.20.104 port = 10050 to $WAN-inf port = 10051 label "USER_RULE: Zabbix inbound" queue(qOthersHigh, qACK)
    match on em1 inet proto tcp from $WAN-inf port = 10051 to 62.231.20.104 port = 10050 label "USER_RULE: Zabbix outbound" queue(qOthersHigh, qACK)
    match on em0 inet from 172.22.0.1 to 172.22.0.0/23 label "USER_RULE" queue qDefault
    match on em0 inet from 172.22.0.0/23 to 172.22.0.1 label "USER_RULE" queue qDefault
    pass in quick on em1 reply-to (em1 $GW) inet proto tcp from any to 172.22.1.199 port = http flags S/SA keep state label "USER_RULE: camera" dnpipe(29, 28)
    pass in quick on em1 reply-to (em1 $GW) inet proto tcp from any to 172.22.0.72 port = ssh flags S/SA keep state label "USER_RULE: ssh to ftp72"
    pass in quick on em1 reply-to (em1 $GW) inet proto tcp from any to $WAN-inf port = 22222 flags S/SA keep state label "USER_RULE"
    pass in quick on em1 reply-to (em1 $GW) inet proto icmp from any to $WAN-inf icmp-type echoreq keep state label "USER_RULE"
    pass in quick on em1 reply-to (em1 $GW) inet proto tcp from 208.115.198.69 to $WAN-inf port = ssh flags S/SA keep state label "USER_RULE: ssh from vps"
    pass in quick on em1 reply-to (em1 $GW) inet proto tcp from 62.231.20.104 to $WAN-inf port = 10051 flags S/SA keep state label "USER_RULE: Zabbix checks"
    block drop in quick on em1 reply-to (em1 $GW) inet all label "USER_RULE"
    pass in quick on em0 proto udp from any port = bootpc to any port = bootps keep state label "USER_RULE: DHCP requests"
    pass in quick on em0 inet from 172.22.0.0/23 to 172.22.0.1 flags S/SA keep state label "USER_RULE"
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 22)
    pass in quick on em0 inet from 172.22.0.72 to any flags S/SA keep state label "USER_RULE"
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 66)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 67)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 67)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 64)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 63)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 61)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 60)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 60)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 59)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 58)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 57)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 56)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 54)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 53)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 52)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 51)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 50)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 49)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 48)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 47)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 46)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 45)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 44)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 43)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 42)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 41)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 40)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 3)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 26)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 5)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 6)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 7)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 8)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 9)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 10)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 11)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 12)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 13)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 14)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 15)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 17)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 18)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 19)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 20)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 21)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 23)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 24)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 25)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 30)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 38)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 37)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 36)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 35)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 34)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 33)
    pass in quick on em0 from <client>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 39)
    pass in quick on em0 from <test>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 1)
    pass in quick on em0 from <freemen>to any flags S/SA keep state label "USER_RULE" dnpipe(2, 1)
    pass in quick on em0 from <paid>to any flags S/SA keep state label "USER_RULE: Paid to Pipe" dnpipe(2, 1)
    pass in quick on em0 from <temp>to any flags S/SA keep state label "USER_RULE: Temp to Pipe" dnpipe(2, 1)
    pass in quick on em0 inet proto tcp from 172.22.0.0/23 to any port = http flags S/SA keep state label "USER_RULE: oy"
    pass in quick on em0 inet from 172.22.1.199 to any flags S/SA keep state label "USER_RULE: camera" dnpipe(28, 29)
    pass in quick on em0 inet proto tcp from 172.22.0.72 to 77.88.21.3 port = http flags S/SA keep state label "USER_RULE: NAT testing redirect"
    block return in quick on em0 all label "USER_RULE: DENY_ALL"
    anchor "tftp-proxy/*" all</temp></paid></freemen></test></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></client></freemen></bogons></virusprot></webconfiguratorlockout></sshlockout></snort2c></snort2c> 
    


  • Подскажите, господа,
    Нужны ли приоритезировать трафик на ЛАНе? За 1.5 года таких проблем не возникало, что могло случиться сейчас?

    Ниже отмечены места, во время которых возникает описанная проблема


Locked