[j-nsp] DFW_PFE out of memory errors

Nicola Foggi nfoggi at depaul.edu
Thu Jul 6 15:03:28 EDT 2006


Ah yes...

That message actually was put in after I worked JTAC for awhile
troubleshooting some problems.  From my memory, I the firewall is
compiled in SRAM which the amount is dependent on which box you're
using.  It is a hard limit of available space, which if I remember, is
shared amongst a bunch of different things.

You can "tweak" the filter to make it less of a memory hog, or, if you
make the change, deactivate the filter, commit, the reactivate and
commit it should apply.

Nicola Foggi
Networks and Telecom
DePaul University

On Thu, 2006-07-06 at 01:09 -0500, Kevin Day wrote:
> Has anyone seen anything like this:
> 
> Jul  6 00:48:36  core1-chi mgd[4366]: UI_COMMIT: User 'admin'  
> performed commit: no comment
> Jul  6 00:48:50  core1-chi /kernel:
> Jul  6 00:48:50  core1-chi /kernel: DFW_PFE: add/change for filter fw- 
> to-lan failed due to lack of memory space.
> Jul  6 00:48:50  core1-chi ssb DFW: firewall addition failed (No memory)
> Jul  6 00:48:50  core1-chi ssb DFW: jtree cutover failed (memory  
> allocation failure) for filter (1) change!
> 
> 
> admin at core1-chi# show firewall |match "term" |count
> Count: 249 lines
> 
> SSB status:
> Slot 0 information:
>    State                                 Master
>    Temperature                        40 degrees C / 104 degrees F
>    CPU utilization                     7 percent
>    Interrupt utilization               0 percent
>    Heap utilization                   78 percent
>    Buffer utilization                 52 percent
>    Total CPU DRAM                     64 MB
>    Internet Processor II                 Version 1, Foundry IBM, Part  
> number 9
>    Start time:                           2006-07-05 16:40:10 CDT
>    Uptime:                              8 hours, 18 minutes, 59 seconds
> 
> 
> 
> I seem to have hit some limit in my firewall config - I have 249  
> active terms right now. If I add 1 or 2 more, I get the above  
> message. Once I pass 250, either my commit has no effect, or it  
> silently turns some of my firewall rules into "accept" which is kinda  
> scary. Is there a limit of 250 terms that I'm missing somewhere?  
> Which memory am I exceeding? Is there any way to boost this up any,  
> or is it a hard limit?
> 
> 
> Failing that, is there an accounting system that can do things more  
> efficiently than:
> 
>          term inhost160 {
>              from {
>                  destination-address {
>                      xx.xx.xx.160/32;
>                  }
>              }
>              then {
>                  count inhost160;
>                  accept;
>              }
>          }
>          term inhost161 {
>              from {
>                  destination-address {
>                      xx.xx.xx.161/32;
>                  }
>              }
>              then {
>                  count inhost161;
>                  accept;
>              }
>          }
> 
> 
> to generate counters for every IP passing through within a certain  
> range? I only need to monitor about a /27 worth, but we need to track  
> in/out on each IP. Or any way to make that more memory efficient?
> 
> We're doing too much traffic for the RE to handle any decent  
> percentage of traffic for generating netflow records, and an AS or MS  
> pic is a bit out of our budget.
> 
> 
> 
> 
> _______________________________________________
> juniper-nsp mailing list juniper-nsp at puck.nether.net
> http://puck.nether.net/mailman/listinfo/juniper-nsp


More information about the juniper-nsp mailing list