[j-nsp] DFW_PFE out of memory errors
Josef Buchsteiner
josefb at juniper.net
Sun Jul 9 08:47:24 EDT 2006
the root of the problem is not the firewall filter but the shortage of
sram memory on the IPII. You have a board which is using 8M of SRAM
and this space is used for all routes, firewall filter, policers,
next-hops and so on... It happen that you are so close to the limit
that changing a fw filter you hit the boundary already. Enhanced SSB
have 256 on CPU Memory ( 4 times higher ) and 16MB of IPII SRAM. (
double)
Josef
Thursday, July 6, 2006, 8:09:33 AM, you wrote:
KD>
KD>
KD>
KD> Has anyone seen anything like this:
KD>
KD> Jul 6 00:48:36 core1-chi mgd[4366]: UI_COMMIT: User 'admin'
KD> performed commit: no comment
KD> Jul 6 00:48:50 core1-chi /kernel:
KD> Jul 6 00:48:50 core1-chi /kernel: DFW_PFE: add/change for filter fw-
KD> to-lan failed due to lack of memory space.
KD> Jul 6 00:48:50 core1-chi ssb DFW: firewall addition failed (No memory)
KD> Jul 6 00:48:50 core1-chi ssb DFW: jtree cutover failed (memory
KD> allocation failure) for filter (1) change!
KD>
KD>
KD> admin at core1-chi# show firewall |match "term" |count
KD> Count: 249 lines
KD>
KD> SSB status:
KD> Slot 0 information:
KD> State Master
KD> Temperature 40 degrees C / 104 degrees F
KD> CPU utilization 7 percent
KD> Interrupt utilization 0 percent
KD> Heap utilization 78 percent
KD> Buffer utilization 52 percent
KD> Total CPU DRAM 64 MB
KD> Internet Processor II Version 1, Foundry IBM, Part
KD> number 9
KD> Start time: 2006-07-05 16:40:10 CDT
KD> Uptime: 8 hours, 18 minutes, 59 seconds
KD>
KD>
KD>
KD> I seem to have hit some limit in my firewall config - I have 249
KD> active terms right now. If I add 1 or 2 more, I get the above
KD> message. Once I pass 250, either my commit has no effect, or it
KD> silently turns some of my firewall rules into "accept" which is kinda
KD> scary. Is there a limit of 250 terms that I'm missing somewhere?
KD> Which memory am I exceeding? Is there any way to boost this up any,
KD> or is it a hard limit?
KD>
KD>
KD> Failing that, is there an accounting system that can do things more
KD> efficiently than:
KD>
KD> term inhost160 {
KD> from {
KD> destination-address {
KD> xx.xx.xx.160/32;
KD> }
KD> }
KD> then {
KD> count inhost160;
KD> accept;
KD> }
KD> }
KD> term inhost161 {
KD> from {
KD> destination-address {
KD> xx.xx.xx.161/32;
KD> }
KD> }
KD> then {
KD> count inhost161;
KD> accept;
KD> }
KD> }
KD>
KD>
KD> to generate counters for every IP passing through within a certain
KD> range? I only need to monitor about a /27 worth, but we need to track
KD> in/out on each IP. Or any way to make that more memory efficient?
KD>
KD> We're doing too much traffic for the RE to handle any decent
KD> percentage of traffic for generating netflow records, and an AS or MS
KD> pic is a bit out of our budget.
KD>
KD>
KD>
KD>
KD> _______________________________________________
KD> juniper-nsp mailing list juniper-nsp at puck.nether.net
KD> http://puck.nether.net/mailman/listinfo/juniper-nsp
KD>
KD>
KD>
More information about the juniper-nsp
mailing list